The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges

被引:8
|
作者
Thomas, Kurt [1 ]
Amira, Rony [1 ]
Ben-Yoash, Adi [1 ]
Folger, Ori [1 ]
Hardon, Amir [1 ]
Berger, Ari [1 ]
Bursztein, Elie [1 ]
Bailey, Michael [2 ]
机构
[1] Google Inc, Mountain View, CA 94043 USA
[2] Univ Illinois, Champaign, IL USA
关键词
Threat exchanges; Reputation systems; Underground specialization;
D O I
10.1007/978-3-319-45719-2_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The underground commoditization of compromised hosts suggests a tacit capability where miscreants leverage the same machine-subscribed by multiple criminal ventures-to simultaneously profit from spam, fake account registration, malicious hosting, and other forms of automated abuse. To expedite the detection of these commonly abusive hosts, there are now multiple industry-wide efforts that aggregate abuse reports into centralized threat exchanges. In this work, we investigate the potential benefit of global reputation tracking and the pitfalls therein. We develop our findings from a snapshot of 45 million IP addresses abusing six Google services including Gmail, YouTube, and ReCaptcha between April 7 April 21, 2015. We estimate the scale of end hosts controlled by attackers, expose underground biases that skew the abuse perspectives of individual web services, and examine the frequency that criminals re-use the same infrastructure to attack multiple, heterogeneous services. Our results indicate that an average Google service can block 14% of abusive traffic based on threats aggregated from seemingly unrelated services, though we demonstrate that outright blacklisting incurs an untenable volume of false positives.
引用
收藏
页码:143 / 164
页数:22
相关论文
共 50 条
  • [31] Consumer-to-consumer product exchanges for original fashion brands in the sharing economy: Good or bad for fashion knockoffs?
    Wang, Yingjia
    Fan, Di
    Fung, Yi-Ning
    Luo, Suyuan
    [J]. TRANSPORTATION RESEARCH PART E-LOGISTICS AND TRANSPORTATION REVIEW, 2022, 158
  • [32] Abuse of thermodynamic limits
    Ochs, LR
    [J]. CHEMICAL & ENGINEERING NEWS, 2001, 79 (42) : 4 - 4
  • [33] OCLC COPYRIGHT - A THREAT TO SHARING
    BISHOP, DF
    [J]. JOURNAL OF ACADEMIC LIBRARIANSHIP, 1985, 11 (04): : 202 - 203
  • [34] Expanding Exchanges, Promote Understanding
    $$$$Wu Xingtang
    [J]. International Understanding, 1997, (01) : 3 - 5
  • [35] Sharing economy workers: selling, not sharing
    Ravenelle, Alexandrea J.
    [J]. CAMBRIDGE JOURNAL OF REGIONS ECONOMY AND SOCIETY, 2017, 10 (02) : 281 - 295
  • [36] Sharing economy - the space of sharing or consumption?
    Orsolya, Lazanyi
    Tamas, Veress
    Fanni, Barsony
    [J]. TER ES TARSADALOM, 2020, 34 (02): : 67 - 87
  • [37] Limits to a cyber-threat
    Emerson, R. Guy
    [J]. CONTEMPORARY POLITICS, 2016, 22 (02) : 178 - 196
  • [38] Threat analysis - stretching the limits
    [J]. Netw. Secur., 2006, 9 (6-8):
  • [39] The limits of trust-free systems: A literature review on blockchain technology and trust in the sharing economy
    Hawlitschek, Florian
    Notheisen, Benedikt
    Teubner, Timm
    [J]. ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2018, 29 : 50 - 63
  • [40] How sustainable is the sharing economy? On the sustainability connotations of sharing economy platforms
    Geissinger, Andrea
    Laurell, Christofer
    Oberg, Christina
    Sandstrom, Christian
    [J]. JOURNAL OF CLEANER PRODUCTION, 2019, 206 : 419 - 429