Clustering and the Weekend Effect: Recommendations for the Use of Top Domain Lists in Security Research.

作者: Walter Rweyemamu , Tobias Lauinger , Christo Wilson , William Robertson , Engin Kirda

DOI: 10.1007/978-3-030-15986-3_11

关键词:

摘要: Top domain rankings (e.g., Alexa) are commonly used in security research, such as to survey features or vulnerabilities of “relevant” websites. Due their central role selecting a sample sites study, an inappropriate choice use can introduce unwanted biases into research results. We quantify various characteristics three top lists that have not been reported before. For example, the weekend effect Alexa and Umbrella causes these change geographical diversity between workweek weekend. Furthermore, up 91% ranked domains appear alphabetically sorted clusters containing 87k presumably equivalent popularity. discuss practical implications findings, propose novel best practices regarding community.

参考文章(20)
Mario Heiderich, Tilman Frosch, Thorsten Holz, IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM Lecture Notes in Computer Science. pp. 281- 300 ,(2011) , 10.1007/978-3-642-23644-0_15
Zhou Li, Kehuan Zhang, Yinglian Xie, Fang Yu, XiaoFeng Wang, Knowing your enemy Proceedings of the 2012 ACM conference on Computer and communications security - CCS '12. pp. 674- 686 ,(2012) , 10.1145/2382196.2382267
Leyla Bilge, Sevil Sen, Davide Balzarotti, Engin Kirda, Christopher Kruegel, Exposure: A Passive DNS Analysis Service to Detect and Report Malicious Domains ACM Transactions on Information and System Security. ,vol. 16, pp. 14- ,(2014) , 10.1145/2584679
Andreas Pitsillidis, Chris Kanich, Geoffrey M. Voelker, Kirill Levchenko, Stefan Savage, Taster's choice: a comparative analysis of spam feeds internet measurement conference. pp. 427- 440 ,(2012) , 10.1145/2398776.2398821
Zakir Durumeric, James Kasten, Michael Bailey, J Alex Halderman, None, Analysis of the HTTPS certificate ecosystem internet measurement conference. pp. 291- 304 ,(2013) , 10.1145/2504730.2504755
Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee, Connected Colors: Unveiling the Structure of Criminal Networks recent advances in intrusion detection. pp. 390- 410 ,(2013) , 10.1007/978-3-642-41284-4_20
Jong Kim, Sangho Lee, WarningBird: Detecting Suspicious URLs in Twitter Stream. network and distributed system security symposium. ,(2012)
Qi Alfred Chen, Eric Osterweil, Matthew Thomas, Z. Morley Mao, MitM Attack by Name Collision: Cause Analysis and Vulnerability Assessment in the New gTLD Era 2016 IEEE Symposium on Security and Privacy (SP). pp. 675- 690 ,(2016) , 10.1109/SP.2016.46
Steven Englehardt, Arvind Narayanan, Online Tracking: A 1-million-site Measurement and Analysis computer and communications security. pp. 1388- 1401 ,(2016) , 10.1145/2976749.2978313