Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens
@inproceedings{etin2018LetMO, title={Let Me Out! Evaluating the Effectiveness of Quarantining Compromised Users in Walled Gardens}, author={Orçun Çetin and Carlos Ga{\~n}{\'a}n and L. Altena and Samaneh Tajalizadehkhoob and M. Eeten}, booktitle={SOUPS @ USENIX Security Symposium}, year={2018} }
In the fight to clean up malware-infected machines, notifications from Internet Service Providers (ISPs) to their customers play a crucial role. [...] Key Result Notwithstanding this easy way out, we find that 71% of these users have actually cleaned up the infection during their first quarantine period and, of the recidivists, 48% are cleaned after their second quarantining. Users who do not self-release either contact customer support (30%) or are released automatically after 30 days (3%). They have even…Expand
Figures, Tables, and Topics from this paper
8 Citations
Cleaning Up the Internet of Evil Things: Real-World Evidence on ISP and Consumer Efforts to Remove Mirai
- Computer Science
- NDSS
- 2019
- 20
- PDF
Tell Me You Fixed It: Evaluating Vulnerability Notifications via Quarantine Networks
- Computer Science
- 2019 IEEE European Symposium on Security and Privacy (EuroS&P)
- 2019
- 2
- PDF
Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support
- Computer Science
- ArXiv
- 2020
- Highly Influenced
- PDF
Detecting Dynamic IP Addresses and Cloud Blocks Using the Sequential Characteristics of PTR Records
- Computer Science
- J. Inf. Process.
- 2019
- 1
References
SHOWING 1-10 OF 22 REFERENCES
Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications
- Computer Science
- NDSS
- 2018
- 28
- PDF
Post-Mortem of a Zombie: Conficker Cleanup After Six Years
- Computer Science
- USENIX Security Symposium
- 2015
- 31
- PDF
Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup
- Business, Computer Science
- WEIS
- 2015
- 34
- PDF
Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension
- Computer Science
- WWW
- 2016
- 37
- PDF
Your Reputation Precedes You: History, Reputation, and the Chrome Malware Warning
- Computer Science
- SOUPS
- 2014
- 32
- PDF
Exit from Hell? Reducing the Impact of Amplification DDoS Attacks
- Computer Science
- USENIX Security Symposium
- 2014
- 152
- PDF
Don't work. Can't work? Why it's time to rethink security warnings
- Computer Science
- 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS)
- 2012
- 58
- PDF
The Emperor's New Security Indicators
- Computer Science
- 2007 IEEE Symposium on Security and Privacy (SP '07)
- 2007
- 432
- PDF