Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup

@article{etin2015UnderstandingTR,
  title={Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup},
  author={Orçun Çetin and Mohammad Hanif Jhaveri and Carlos Ga{\~n}{\'a}n and M. Eeten and T. Moore},
  journal={J. Cybersecur.},
  year={2015},
  volume={2},
  pages={83-98}
}
  • Orçun Çetin, Mohammad Hanif Jhaveri, +2 authors T. Moore
  • Published 2015
  • Business, Computer Science
  • J. Cybersecur.
  • Motivation: Participants on the front lines of abuse reporting have a variety of options to notify intermediaries and resource owners about abuse of their systems and services. These can include emails to personal messages to blacklists to machine-generated feeds. Recipients of these reports have to voluntarily act on this information. We know remarkably little about the factors that drive higher response rates to abuse reports. One such factor is the reputation of the sender. In this article… CONTINUE READING
    34 Citations
    Measuring the Impact of Sharing Abuse Data with Web Hosting Providers
    • 11
    • PDF
    Didn't You Hear Me? - Towards More Successful Web Vulnerability Notifications
    • 27
    • Highly Influenced
    • PDF
    Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse
    • 11
    • PDF
    You've Got Vulnerability: Exploring Effective Vulnerability Notifications
    • 64
    • PDF
    Effective Notification Campaigns on the Web: A Matter of Trust, Framing, and Support
    • Highly Influenced
    • PDF
    Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension
    • 37
    • PDF
    Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification
    • 48
    • PDF

    References

    SHOWING 1-10 OF 29 REFERENCES
    Do Malware Reports Expedite Cleanup? An Experimental Study
    • 29
    • PDF
    The role of web hosting providers in detecting compromised websites
    • 58
    • PDF
    Exit from Hell? Reducing the Impact of Amplification DDoS Attacks
    • 150
    • PDF
    Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
    • 76
    • PDF
    Apples, oranges and hosting providers: Heterogeneity and security in the hosting market
    • 21
    • PDF
    The Matter of Heartbleed
    • 471
    • PDF
    An Empirical Analysis of ZeuS C&C Lifetime
    • 22
    What's in a Name?
    • 532
    • PDF
    Proceedings of the 2014 Conference on Internet Measurement Conference
    • 19