Corpus ID: 52050588

Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens

@inproceedings{etin2018LetMO,
  title={Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens},
  author={Orçun Çetin and Carlos Ga{\~n}{\'a}n and L. Altena and Samaneh Tajalizadehkhoob and M. Eeten},
  booktitle={SOUPS @ USENIX Security Symposium},
  year={2018}
}
In the fight to clean up malware-infected machines, notifications from Internet Service Providers (ISPs) to their customers play a crucial role. [...] Key Result Notwithstanding this easy way out, we find that 71% of these users have actually cleaned up the infection during their first quarantine period and, of the recidivists, 48% are cleaned after their second quarantining. Users who do not self-release either contact customer support (30%) or are released automatically after 30 days (3%). They have even…Expand
8 Citations
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai
  • 20
  • PDF
Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine Networks
  • 2
  • PDF
Understanding the role of IoT end users in Miria-Like bot remediation
  • Highly Influenced
Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support
  • Highly Influenced
  • PDF
Dark Matter: Uncovering the DarkComet RAT Ecosystem
  • 1
  • Highly Influenced
  • PDF
Measuring the changing cost of cybercrime
  • 19
  • PDF
Remedying Security Concerns at an Internet Scale
  • F. Li
  • Computer Science
  • 2019
  • PDF
Detecting Dynamic IP Addresses and Cloud Blocks Using the Sequential Characteristics of PTR Records
  • 1

References

SHOWING 1-10 OF 22 REFERENCES
Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications
  • 28
  • PDF
Post-Mortem of a Zombie: Conficker Cleanup After Six Years
  • 31
  • PDF
Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup
  • 34
  • PDF
The role of web hosting providers in detecting compromised websites
  • 58
  • PDF
Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension
  • 37
  • PDF
Your Reputation Precedes You: History, Reputation, and the Chrome Malware Warning
  • 32
  • PDF
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks
  • 152
  • PDF
Don't work. Can't work? Why it's time to rethink security warnings
  • 58
  • PDF
The Emperor's New Security Indicators
  • 432
  • PDF
...
1
2
3
...