5,312 Hits in 3.5 sec

Spam mitigation using spatio-temporal reputations from blacklist history

Andrew G. West, Adam J. Aviv, Jian Chang, Insup Lee
2010 Proceedings of the 26th Annual Computer Security Applications Conference on - ACSAC '10  
IP blacklists are a spam filtering tool employed by a large number of email providers.  ...  However, spammers can vary which hosts send spam (often in intelligent ways), and as a result, some percentage of spamming IPs are not actively listed on any blacklist.  ...  The authors would like to thank Wenke Lee and David Dagon, both of Georgia Tech, for their initial guidance on this project.  ... 
doi:10.1145/1920261.1920287 dblp:conf/acsac/WestACL10 fatcat:lqourwub5zgctnimoccvb6y6ee

QoS-Aware Cloud Service Composition Using Time Series [chapter]

Zhen Ye, Athman Bouguettaya, Xiaofang Zhou
2013 Lecture Notes in Computer Science  
Finally, experiments and their results are presented to show the performance of the proposed composition approach.  ...  Given an IaaS provider IP , the reputation of its IaaS − −−−− → q rt (IP ) = [q CP U rt (IP ),q Net rt (IP ), q Sto rt (IP ) ] is a three-attribute vector, where q CP U rt (IP ) (q Net rt (IP ), q Sto  ...  rt (IP )) is the reputation for processing a computation (data transfer, storage) request.  ... 
doi:10.1007/978-3-642-45005-1_2 fatcat:ef2td7zibbahvcob72uxuqzpku

FHSD: An Improved IP Spoof Detection Method for Web DDoS Attacks

S. N. Shiaeles, M. Papadaki
2014 Computer journal  
FHSD uses fuzzy empirical rules and fuzzy largest of maximum operator to identify offensive IPs and mitigate offending traffic.  ...  The most common target is web services, the downtime of which could lead to significant monetary costs and loss of reputation.  ...  The use of information such as the subnet and geographical location of the IP helps to shrink a little the area of IPs. But for better results, a good database with IP hops should be maintained.  ... 
doi:10.1093/comjnl/bxu007 fatcat:xdamzbvgynhedddxhl4vibsmce

Developing Security Reputation Metrics for Hosting Providers [article]

Arman Noroozian, Maciej Korczyński, Samaneh TajalizadehKhoob, Michel van Eeten
2016 arXiv   pre-print
Existing metrics typically count instances of abuse and sometimes normalize these counts by taking into account the advertised address space of the provider.  ...  Research into cybercrime often points to concentrations of abuse at certain hosting providers.  ...  This overlap constitutes 9% of the MLAT feed. In comparison, 124 2LD, IP pairs represents 17% of the MELD feed.  ... 
arXiv:1612.03641v1 fatcat:hjg22rgovrgy3fyvuleaem6o24

Secured Creditor Control in Bankruptcy: Costs and Conflict

Andrea Polo
2012 Social Science Research Network  
The residual claimants here are the unsecured creditors about whom the IPs have no reputational concerns. Unsecured creditors are neither the appointers of the IPs nor repeat players in bankruptcy.  ...  Having access to a database of insolvency in the UK and, in particular, to data on the secured and unsecured debt recovery rates we are in a unique position to empirically assess this trade-off and analyse  ... 
doi:10.2139/ssrn.2084881 fatcat:o3v7r5jpbregbjp6lws5y4fxsy

Toward a standard benchmark for computer security research

Tudor Dumitras, Darren Shou
2011 Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security - BADGERS '11  
WINE includes representative field data, collected worldwide from 240,000 sensors, for new empirical studies, and it will enable the validation of research on all the phases in the lifecycle of security  ...  In this paper, we review the unique characteristics of the WINE data, we discuss why rigorous benchmarking will provide fresh insights on the security arms race and we propose a research agenda for this  ...  These data sets enable two research directions: (i) empirical studies for understanding each phase in the lifecycle of cyberattacks, and (ii) quantitative evaluations and comparisons of attack prevention  ... 
doi:10.1145/1978672.1978683 dblp:conf/badgers/DumitrasS11 fatcat:jwikl2e6bnhr7mmwwvarngynjq

Are university rankings useful to improve research? A systematic review

Marlo M. Vernon, E. Andrew Balas, Shaher Momani, Lutz Bornmann
2018 PLoS ONE  
Resistance to bias is also assessed by degree of reliance on empirical or qualitative survey data (majority percent of total score), as reputation surveys are not factors that institutions can control  ...  Income Not specified 2.25% Student/Faculty Ratio Not specified, self- reported 20% 8% 4.5% X Reputation Survey- Employer Independent 6urvey 10% Doctoral Degrees Conferred IPEDS, Self  ...  Reputation Surveys Author Contributions Conceptualization: E.  ... 
doi:10.1371/journal.pone.0193762 pmid:29513762 pmcid:PMC5841788 fatcat:lhkliuc3u5guflpgyj4qkse3ka

An Analytical Study of Impact of International Merger and Acquisitions on the Financial Performance for Higher Education Institution in the United States

Duane T. Frederick, Karina Kasztelnik
2020 Financial Markets Institutions and Risks  
manner to this database.  ...  Department of Education's National Center for Education Statistics for higher education institutions database system, called the Integrated Postsecondary Education Data System. This U.S.  ...  IPEDS charges no fees nor does it place any restrictions regarding the usage of this database.  ... 
doi:10.21272/fmir.4(4).5-30.2020 fatcat:nz2il2wlgnd6namishegqxnmau

A Voice Spam Filter to Clean Subscribers' Mailbox [chapter]

Seyed Amir Iranmanesh, Hemant Sengar, Haining Wang
2013 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
In particular, based on Dynamic Time Warping (DTW), we develop a speaker independent speech recognition system to make content comparison of speech messages.  ...  Using our system, the voice messages left on the media server by callers are matched against a set of spam filtering rules involving the study of call behavioral pattern and the analysis of message content  ...  Hence, it is empirically found that the similarity score using DTW is tightly related to the size of speech words.  ... 
doi:10.1007/978-3-642-36883-7_21 fatcat:nclskh6w55ggjh5r3cej52becu

An Integrated Approach to Studying Multiplexity in Entrepreneurial Networks

Martin J. Bliemel, Ian P. McCarthy, Elicia M.A. Maine
2014 Entrepreneurship Research Journal  
our understanding of entrepreneurial networks.  ...  In this study, we apply the concept of multiplexity to the level of the entrepreneur's network by defining network multiplexity as the interaction of flows within and across relationships.  ...  cash, reputation>, <entrepreneur, cash, IP, materials>} 0 1 0 {<entrepreneur, investors, equity, cash, reputation, advice, financing>, <entrepreneur, licensees, cash, reputation, IP, materials, licensing  ... 
doi:10.1515/erj-2014-0007 fatcat:rp5tcharjffhronictkzrfsc6u

AS-TRUST: A Trust Quantification Scheme for Autonomous Systems in BGP [chapter]

Jian Chang, Krishna K. Venkatasubramanian, Andrew G. West, Sampath Kannan, Boon Thau Loo, Oleg Sokolsky, Insup Lee
2011 Lecture Notes in Computer Science  
AS-TRUST quantifies trust using the notion of AS reputation. To compute reputation, AS-TRUST analyzes updates received in the past.  ...  reputation mechanism provides multi-fold improvement in the ability of ASes to operate in the presence of BA violations.  ...  The value of thresholds T l P r and T l P s are set to 1% of the observation window and one hour, respectively. These values are established empirically based on comparison with a set of AS-links D.  ... 
doi:10.1007/978-3-642-21599-5_20 fatcat:vqy6zzdl4zhnvhqhazkxtcs2nm

Genetic Algorithm Based QoS-Aware Service Compositions in Cloud Computing [chapter]

Zhen Ye, Xiaofang Zhou, Athman Bouguettaya
2011 Lecture Notes in Computer Science  
Contributions of this paper include: 1) An extensible QoS model is proposed to calculate the QoS values of services in cloud computing. 2) A genetic-algorithm-based approach is proposed to compose services  ...  in cloud computing. 3) A comparison is presented between the proposed approach and other algorithms, i.e., exhaustive search algorithms and random selection algorithms.  ...  The IP approach is implemented using LPSolve [11] , which is an open source integer programming system. Comparisons with IP approach show the scalability of the proposed approach.  ... 
doi:10.1007/978-3-642-20152-3_24 fatcat:2uiwmt3ds5chdmoj4rxnxlc2l4

The Empirical Study of the Evolution of the Next Generation Firewalls

Manisha Patil, Savita Mohurle
2017 International Journal of Trend in Scientific Research and Development  
This paper gives the empirical study of tradition firewalls, and its evolution to Next Generation firewall like NGFW, UTM, Threat focused, its features and advantages.  ...  Even after adoption of network security policies and practices, unauthorized intrusion occurs.  ...  INTRODUCTION A computer network consists of two or more computers that are connected to share resources such as printers, scanner, databases, files, application.  ... 
doi:10.31142/ijtsrd2259 fatcat:mbh66nda6ffrpdaswxjr53tsde

Detecting Spammers via Aggregated Historical Data Set [article]

Eitan Menahem, Rami Puzis
2012 arXiv   pre-print
Therefore, the effectiveness of the proposed method is much higher than of previously reported reputation mechanisms, which rely on emails logs.  ...  In this work we propose a new sender reputation mechanism that is based on an aggregated historical data-set which encodes the behavior of mail transfer agents over time.  ...  The authors would like to thank Yevgenia Gorodtzki, Igor Dvorkin, and Polina Zilberman for coding first versions of HDS and to Danny Hendler and Yuval Elovici for useful remarks.  ... 
arXiv:1205.1357v1 fatcat:y6m76aegv5drxkcf2tabw5gxqa

How is e-mail sender authentication used and misused?

Tatsuya Mori, Kazumichi Sato, Yousuke Takahashi, Keisuke Ishibashi
2011 Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference on - CEAS '11  
reputation lists.  ...  Next, we present empirically why and how spammers leverage the SPF mechanism in an attempt to pass a simple SPF authentication test.  ...  IP reputation lists This work uses publicly available IP reputation lists to understand the characteristics of senders that pass/fail SPF authentication.  ... 
doi:10.1145/2030376.2030380 dblp:conf/ceas/MoriSTI11 fatcat:xwur5vesjrbr3guowpu73wmruu
« Previous Showing results 1 — 15 out of 5,312 results