Shades of Grey: On the effectiveness of reputation-based "blacklists"

被引:0
|
作者
Sinha, Sushant [1 ]
Bailey, Michael [1 ]
Jahanian, Farnam [1 ]
机构
[1] Univ Michigan, Dept Elect Engn & Comp Sci, Ann Arbor, MI 48109 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malicious code, or malware, executed on compromised hosts provides a platform for a wide variety of attacks against the availability of the network and the privacy and confidentiality of its users. Unfortunately, the most popular techniques for detecting and preventing malware ham been shown to be significantly, flawed [11], and it is widely believed that a significant fraction of the Internet consists of malware infected machines [17]. In response, defenders have turned to coarse-grained, reputation-based techniques, such as real time blackhole lists, for blocking large numbers of potentially malicious hosts and network blocks. hi this paper, we perform a preliminary study of a type of reputation-based blacklist, namely those used to block unsolicited email, or spam. We show that, for the network studied, these blacklists exhibit non-trivial false positives and false negatives. We investigate a number of possible causes for this low accuracy, and discuss the implications for other types of reputation-based blacklists.
引用
下载
收藏
页码:65 / 72
页数:8
相关论文
共 50 条
  • [41] On the formal modelling of trust in reputation-based systems
    Nielsen, M
    Krukow, K
    THEORY IS FOREVER: ESSAYS DEDICATED TO ARTO SALOMAA ON THE OCCASION OF HIS 70TH BIRTHDAY, 2004, 3113 : 192 - 204
  • [42] Reputation-based partition scheme for IoT security
    Chen, Zhikui
    Haider, Muhammad Zeeshan
    Luo, Naiwen
    Yu, Shuo
    Yuan, Xu
    Zhang, Yaochen
    Noreen, Tayyaba
    SECURITY AND PRIVACY, 2023, 6 (03)
  • [43] Reputation-based Estimation of Individual Performance in Grids
    Papaioannou, Thanasis G.
    Stamoulis, George D.
    CCGRID 2008: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID, VOLS 1 AND 2, PROCEEDINGS, 2008, : 500 - 509
  • [44] The Credibility of Financial Reporting: A Reputation-Based Approach
    Liang, Ying
    Marinovic, Ivan
    Varas, Felipe
    ACCOUNTING REVIEW, 2018, 93 (01): : 317 - 333
  • [45] A Reputation-based Collaborative Approach for Spam Filtering
    Shi, Wenxuan
    Xie, Maoqiang
    2013 AASRI CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND SYSTEMS, 2013, 5 : 220 - 227
  • [46] Collaborative Reputation-based Voice Spam Filtering
    Zhang, Ruishan
    Gurtov, Andrei
    PROCEEDINGS OF THE 20TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATION, 2009, : 33 - +
  • [47] Permissionless reputation-based consensus algorithm for blockchain
    Abdo, Jacques Bou
    El Sibai, Rayane
    Kambhampaty, Krishna
    Demerjian, Jacques
    INTERNET TECHNOLOGY LETTERS, 2020, 3 (03)
  • [48] Reputation-based Trust Update in Network Environment
    Peng, Shufen
    He, Jingsha
    Meng, Yao
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 118 - +
  • [49] Reputation-based Provider Incentivisation for Provenance Provision
    Barakat, Lina
    Mahmoud, Samhar
    Taylor, Phillip
    Griffiths, Nathan
    Miles, Simon
    AAMAS'16: PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS, 2016, : 1429 - 1430
  • [50] Reputation-based Scheme for Delay Tolerant Networks
    Zhang, Xi
    Wang, Xiaofei
    Liu, Anna
    Zhang, Quan
    Tang, Chaojing
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 974 - 978