509 research outputs found
"Reminder: please update your details": Phishing Trends
Spam messes up users inbox, consumes resources and spread attacks like DDoS,
MiM, Phishing etc., Phishing is a byproduct of email and causes financial loss
to users and loss of reputation to financial institutions. In this paper we
study the characteristics of phishing and technology used by phishers. In order
to counter anti phishing technology, phishers change their mode of operation;
therefore continuous evaluation of phishing helps us to combat phishers
effectively. We have collected seven hundred thousand spam from a corporate
server for a period of 13 months from February 2008 to February 2009. From the
collected date, we identified different kinds of phishing scams and mode of
their operation. Our observation shows that phishers are dynamic and depend
more on social engineering techniques rather than software vulnerabilities. We
believe that this study would be useful to develop more efficient anti phishing
methodologies.Comment: 6 pages, 6 Figures, NETCOM 2009, IEEE C
The Dark Menace: Characterizing Network-based Attacks in the Cloud
ABSTRACT As the cloud computing market continues to grow, the cloud platform is becoming an attractive target for attackers to disrupt services and steal data, and to compromise resources to launch attacks. In this paper, using three months of NetFlow data in 2013 from a large cloud provider, we present the first large-scale characterization of inbound attacks towards the cloud and outbound attacks from the cloud. We investigate nine types of attacks ranging from network-level attacks such as DDoS to application-level attacks such as SQL injection and spam. Our analysis covers the complexity, intensity, duration, and distribution of these attacks, highlighting the key challenges in defending against attacks in the cloud. By characterizing the diversity of cloud attacks, we aim to motivate the research community towards developing future security solutions for cloud systems
Recommended from our members
A survey on security issues and solutions at different layers of Cloud computing
Cloud computing offers scalable on-demand services to consumers with greater flexibility and lesser infrastructure investment. Since Cloud services are delivered using classical network protocols and formats over the Internet, implicit vulnerabilities existing in these protocols as well as threats introduced by newer architectures raise many security and privacy concerns. In this paper, we survey the factors affecting Cloud computing adoption, vulnerabilities and attacks, and identify relevant solution directives to strengthen security and privacy in the Cloud environment
Bayesian Based Comment Spam Defending Tool
Spam messes up user's inbox, consumes network resources and spread worms and
viruses. Spam is flooding of unsolicited, unwanted e mail. Spam in blogs is
called blog spam or comment spam.It is done by posting comments or flooding
spams to the services such as blogs, forums,news,email archives and guestbooks.
Blog spams generally appears on guestbooks or comment pages where spammers fill
a comment box with spam words. In addition to wasting user's time with unwanted
comments, spam also consumes a lot of bandwidth. In this paper, we propose a
software tool to prevent such blog spams by using Bayesian Algorithm based
technique. It is derived from Bayes' Theorem. It gives an output which has a
probability that any comment is spam, given that it has certain words in it.
With using our past entries and a comment entry, this value is obtained and
compared with a threshold value to find if it exceeds the threshold value or
not. By using this concept, we developed a software tool to block comment spam.
The experimental results show that the Bayesian based tool is working well.
This paper has the major findings and their significance of blog spam filter.Comment: 14 Pages,4 Figures, International Journal of Network Security & Its
Applications (IJNSA), Vol.2, No.4, October 201
Bayesian Based Comment Spam Defending Tool
Spam messes up user's inbox, consumes network resources and spread worms and
viruses. Spam is flooding of unsolicited, unwanted e mail. Spam in blogs is
called blog spam or comment spam.It is done by posting comments or flooding
spams to the services such as blogs, forums,news,email archives and guestbooks.
Blog spams generally appears on guestbooks or comment pages where spammers fill
a comment box with spam words. In addition to wasting user's time with unwanted
comments, spam also consumes a lot of bandwidth. In this paper, we propose a
software tool to prevent such blog spams by using Bayesian Algorithm based
technique. It is derived from Bayes' Theorem. It gives an output which has a
probability that any comment is spam, given that it has certain words in it.
With using our past entries and a comment entry, this value is obtained and
compared with a threshold value to find if it exceeds the threshold value or
not. By using this concept, we developed a software tool to block comment spam.
The experimental results show that the Bayesian based tool is working well.
This paper has the major findings and their significance of blog spam filter.Comment: 14 Pages,4 Figures, International Journal of Network Security & Its
Applications (IJNSA), Vol.2, No.4, October 201
- …