Abuse Reporting and the Fight Against Cybercrime

@article{Jhaveri2017AbuseRA,
  title={Abuse Reporting and the Fight Against Cybercrime},
  author={Mohammad Hanif Jhaveri and Orçun Çetin and Carlos Ga{\~n}{\'a}n and T. Moore and M. Eeten},
  journal={ACM Computing Surveys (CSUR)},
  year={2017},
  volume={49},
  pages={1 - 27}
}
Cybercriminal activity has exploded in the past decade, with diverse threats ranging from phishing attacks to botnets and drive-by-downloads afflicting millions of computers worldwide. In response, a volunteer defense has emerged, led by security companies, infrastructure operators, and vigilantes. This reactionary force does not concern itself with making proactive upgrades to the cyber infrastructure. Instead, it operates on the front lines by remediating infections as they appear. We… Expand
25 Citations
Systematically Understanding the Cyber Attack Business
  • 19
  • PDF
Deviant security: the technical computer security practices of cyber criminals
  • 1
Beyond the pretty penny: the Economic Impact of Cybercrime
  • 5
  • PDF
Examination of cybercrime and its effects on corporate stock value
  • 2
...
1
2
3
...

References

SHOWING 1-4 OF 4 REFERENCES
The Matter of Heartbleed
  • 478
  • Highly Influential
  • PDF
The role of web hosting providers in detecting compromised websites
  • 58
  • Highly Influential
  • PDF
Google Developers—Safe Browsing API. Retrieved 2016 from https://developers.google.com/ safe-browsing
  • Google Developers—Safe Browsing API. Retrieved 2016 from https://developers.google.com/ safe-browsing
  • 2016
Targeted takedowns: Minimizing collateral damage using passive DNS
  • In Black Hat USA
  • 2015