Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Under the Shadow of Sunshine - Understanding and Detecting Bulletproof Hosting

IEEE via YouTube

Overview

Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore the emerging trend of Bulletproof Hosting (BPH) services utilizing legitimate service provider networks in this 15-minute IEEE conference talk. Delve into the challenges posed by this shift in criminal infrastructure and learn about a novel approach to detect malicious sub-allocated network blocks. Discover how the researchers analyzed vast amounts of data, including Whois snapshots, passive DNS data, and blacklist feeds, to identify unique features characterizing BPH on sub-allocations. Examine the effectiveness of their classifier, which achieved a 98% recall and 1.5% false discovery rate. Gain insights into the underground BPH ecosystem, including patterns of network block recycling and client migration. Understand the implications of this agile BPH trend and potential methods for detecting and mitigating this evolving security threat.

Syllabus

Introduction
Detecting Bulletproof Hosting
Using New Features
Our Study
Clients
Limitations

Taught by

IEEE Symposium on Security and Privacy

Reviews

Start your review of Under the Shadow of Sunshine - Understanding and Detecting Bulletproof Hosting

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.