Active Probing-Based Schemes and Data Analytics for Investigating Malicious Fast-Flux Web-Cloaking Based Domains

@article{Guo2018ActivePS,
  title={Active Probing-Based Schemes and Data Analytics for Investigating Malicious Fast-Flux Web-Cloaking Based Domains},
  author={Ziji Guo and Yong Guan},
  journal={2018 27th International Conference on Computer Communication and Networks (ICCCN)},
  year={2018},
  pages={1-9}
}
There have been increasing levels of sophistication in the continuous battles between cyber criminals and law enforcement/cybersecurity practitioners. For example, Darknet operators often take advantage of the evasion techniques to hide their criminal activities, such as hosting illegal content, selling illegal materials, or terror-information exchanges. Web cloaking and fast-fluxing are the two common ones. Fast-fluxing constantly changes the host IP addresses and offers higher degree… CONTINUE READING

Similar Papers

References

Publications referenced by this paper.
SHOWING 1-10 OF 18 REFERENCES

Detecting hybrid botnets with web command

C. Chen, M. Huang, Y. Ou
  • vol. 5, no. 2, 2014.
  • 2014
VIEW 1 EXCERPT

Detection of Fast-Flux Networks using various DNS feature sets

  • 2013 IEEE Symposium on Computers and Communications (ISCC)
  • 2013
VIEW 1 EXCERPT

Cloak and dagger: dynamics of web search cloaking

  • ACM Conference on Computer and Communications Security
  • 2011
VIEW 1 EXCERPT

A Normalized Levenshtein Distance Metric

  • IEEE Trans. Pattern Anal. Mach. Intell.
  • 2007
VIEW 1 EXCERPT