An assessment of overt malicious activity manifest in residential networks

17Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.
Get full text

Abstract

While conventional wisdom holds that residential users experience a high degree of compromise and infection, this presumption has seen little validation in the way of an in-depth study. In this paper we present a first step towards an assessment based on monitoring network activity (anonymized for user privacy) of 20,000 residential DSL customers in a European urban area, roughly 1,000 users of a community network in rural India, and several thousand dormitory users at a large US university. Our study focuses on security issues that overtly manifest in such data sets, such as scanning, spamming, payload signatures, and contact to botnet rendezvous points. We analyze the relationship between overt manifestations of such activity versus the "security hygiene" of the user populations (anti-virus and OS software updates) and potential risky behavior (accessing blacklisted URLs). We find that hygiene has little correlation with observed behavior, but risky behavior - which is quite prevalent - more than doubles the likelihood that a system will manifest security issues. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Maier, G., Feldmann, A., Paxson, V., Sommer, R., & Vallentin, M. (2011). An assessment of overt malicious activity manifest in residential networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6739 LNCS, pp. 144–163). https://doi.org/10.1007/978-3-642-22424-9_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free