Search results for "Blacklist"

showing 4 items of 4 documents

Detection of algorithmically generated malicious domain names using masked N-grams

2019

Abstract Malware detection is a challenge that has increased in complexity in the last few years. A widely adopted strategy is to detect malware by means of analyzing network traffic, capturing the communications with their command and control (C&C) servers. However, some malware families have shifted to a stealthier communication strategy, since anti-malware companies maintain blacklists of known malicious locations. Instead of using static IP addresses or domain names, they algorithmically generate domain names that may host their C&C servers. Hence, blacklist approaches become ineffective since the number of domain names to block is large and varies from time to time. In this paper, we i…

0209 industrial biotechnologyDomain generation algorithmComputer scienceGeneral Engineering02 engineering and technologycomputer.software_genreBlacklistComputer Science ApplicationsRandom forestDomain (software engineering)020901 industrial engineering & automationArtificial IntelligenceServer0202 electrical engineering electronic engineering information engineeringMalware020201 artificial intelligence & image processingData miningcomputerHost (network)Block (data storage)Expert Systems with Applications
researchProduct

Toward Optimal LSTM Neural Networks for Detecting Algorithmically Generated Domain Names

2021

Malware detection is a problem that has become particularly challenging over the last decade. A common strategy for detecting malware is to scan network traffic for malicious connections between infected devices and their command and control (C&C) servers. However, malware developers are aware of this detection method and begin to incorporate new strategies to go unnoticed. In particular, they generate domain names instead of using static Internet Protocol addresses or regular domain names pointing to their C&C servers. By using a domain generation algorithm, the effectiveness of the blacklisting of domains is reduced, as the large number of domain names that must be blocked g…

Feature engineeringGeneral Computer ScienceArtificial neural networkComputer sciencebusiness.industrymalwareDeep learningGeneral EngineeringDeep learningdomain generation algorithmscomputer.software_genreBlacklistDomain (software engineering)TK1-9971ServerMalwareGeneral Materials ScienceNetwork performanceArtificial intelligenceData miningElectrical engineering. Electronics. Nuclear engineeringbusinessLSTMcomputerIEEE Access
researchProduct

Between Local and Global: the ‘Ndrangheta’s Drug Trafficking Route

2017

AbstractAccording to the last United Nations Office on Drugs and Crime report (2016), 247 million people aged between 15 and 64 years used drugs at least once in the past year, with cocaine being the best-selling of the goods from the ‘Ndrangheta. In this case, the drugs trade is 60% of the systemic gain due to illicit trafficking that allowed the spreading of the Calabrian criminal organization across five continents. Nevertheless, this sometimes little-known apparently harmless organization, which comes from the Aspromonte heartland in Calabria, was included by the United States in the blacklist of the 75 most dangerous drug-trafficking organizations only in 2008. Therefore, this investig…

Political science05 social sciences050501 criminologyDrug traffickingCriminologyBlacklistCriminal organizationStrengths and weaknesses0505 lawInternational Annals of Criminology
researchProduct

Assisted labeling for spam account detection on twitter

2019

Online Social Networks (OSNs) have become increasingly popular both because of their ease of use and their availability through almost any smart device. Unfortunately, these characteristics make OSNs also target of users interested in performing malicious activities, such as spreading malware and performing phishing attacks. In this paper we address the problem of spam detection on Twitter providing a novel method to support the creation of large-scale annotated datasets. More specifically, URL inspection and tweet clustering are performed in order to detect some common behaviors of spammers and legitimate users. Finally, the manual annotation effort is further reduced by grouping similar u…

Social network021110 strategic defence & security studiesInformation retrievalSocial networkbusiness.industryComputer scienceSpam detectionSmart device0211 other engineering and technologies020206 networking & telecommunicationsUsability02 engineering and technologycomputer.software_genrePhishinglaw.inventionManual annotationlawComputer security0202 electrical engineering electronic engineering information engineeringBlacklistingMalwarebusinessCluster analysiscomputer
researchProduct