Understanding and Defending against Internet Infrastructures Supporting Cybercrime Operations

نویسندگان

  • Maria Konte
  • Roberto Perdisci
  • Manos Antonakakis
چکیده

To those who help others. iii ACKNOWLEDGEMENTS I would like to thank my advisor Prof. Nick Feamster, for all his support, enthusiasm, and optimism, which have been an invaluable source of inspiration for me. Nick has been a great mentor, who has had an incredible impact on my path. Also, I would like to thank Prof. Roberto Perdisci, for all his support, boundless positive energy, and persistence. I feel extremely fortunate, that I have had the chance to work with him.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyber Risk Exposure and Prospects for Cyber Insurance

This study draws attention to the ubiquitous and borderless nature of cybercrime. It examines the prospect of introducing customized cyber insurance policy in the Nigerian market. As secondary data was not available, the study conducted a survey by administering three sets of questionnaire to purposively selected top executives in four Trade Groups that rely heavily on Internet transactions for...

متن کامل

On Developing Tomorrow’s “Cyber Warriors”

Threats of cyber-warfare attacks (and counter attacks) by countries with the largest economies in the world, massive losses of financial and personal data on millions of Americans to cybercrime, and the potential to disrupt Americas critical infrastructures, should be on the minds of all Americans. Why? Because those who design, build, operate and defend the computer systems and networks that o...

متن کامل

Special issue on measure, detect and mitigate-challenges and trends in network security

Cybercrime has developed rapidly during the last decade, and recent years in particular have seen an unprecedented number of cyber attacks. Despite increased national and international efforts against cybercrime, cybercrime still has double-digit annual growth rates. As the number of services and systems connected to the Internet and migrating to cloud infrastructures increases, the ability to ...

متن کامل

Chapter 2 CYBERSPACE POLICY FOR CRITICAL INFRASTRUCTURES

The first step in preparing any battlespace is to define the domain for attack and maneuver. The various military service components have directed authority to focus their efforts in specific domains of operations (e.g., naval operations are mainly in the maritime domain). However, cyberspace operations pose challenges because they span multiple operational domains. This paper focuses on U.S. c...

متن کامل

Key Challenges in Defending Against Malicious Socialbots

The ease with which we adopt online personas and relationships has created a soft spot that cyber criminals are willing to exploit. Advances in artificial intelligence make it feasible to design bots that sense, think and act cooperatively in social settings just like human beings. In the wrong hands, these bots can be used to infiltrate online communities, build up trust over time and then sen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015