Low-cost active cyber defence

作者: Karlis Podins , Varis Teivans , Iveta Skujina

DOI: 10.1109/CYCON.2014.6916412

关键词:

摘要: The authors of this paper investigated relatively simple active strategies against selected popular cyber threat vectors. When attacks are analysed for their severity and occurrence, many incidents usually classifi ed as minor, e.g. spam or phishing. We interested in the various types low-end (as opposed to high-end state- sponsored advanced persistent threats) two reasons: • being least complicated incidents, we expect fi nd response proposed from security economics point view determine why how these might be effective. also discuss legal aspects strategies.

参考文章(10)
Geoffrey M. Voelker, Vern Paxson, Brandon Enright, Chris Kanich, Christian Kreibich, Kirill Levchenko, Stefan Savage, On the spam campaign trail LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. pp. 1- ,(2008)
Zulfikar Ramzan, Phishing Attacks and Countermeasures Handbook of Information and Communication Security. pp. 433- 448 ,(2010) , 10.1007/978-3-642-04117-4_23
Justin M Rao, David H Reiley, The Economics of Spam Journal of Economic Perspectives. ,vol. 26, pp. 87- 110 ,(2012) , 10.1257/JEP.26.3.87
Chris Kanich, Christian Kreibich, Kirill Levchenko, Brandon Enright, Geoffrey M. Voelker, Vern Paxson, Stefan Savage, Spamalytics Proceedings of the 15th ACM conference on Computer and communications security - CCS '08. pp. 3- 14 ,(2008) , 10.1145/1455770.1455774
Ripan Shah, Jarrod Trevathan, Wayne Read, Hossein Ghodosi, A Proactive Approach to Preventing Phishing Attacks Using Pshark international conference on information technology: new generations. pp. 915- 921 ,(2009) , 10.1109/ITNG.2009.302
Felix Leder, Christian Czosseck, Gabriel Klein, On the arms race around botnets - Setting up and taking down botnets international conference on cyber conflict. pp. 1- 14 ,(2011)
Russell G. Smith, Michael N. Holmes, Philip Kaufmann, Nigerian Advance Fee Fraud Australian Institute of Criminology. ,(1999)
David Dittrich, So you want to take over a botnet usenix conference on large scale exploits and emergent threats. pp. 6- 6 ,(2012)
Orin S Kerr, Virtual Crime, Virtual Deterrence: A Skeptical View of Self-Help, Architecture, and Civil Liability Journal of Law, Economics & Policy. ,vol. 1, pp. 197- ,(2005)