Skip to main content

Showing 1–19 of 19 results for author: Korczyński, M

.
  1. WHOIS Right? An Analysis of WHOIS and RDAP Consistency

    Authors: Simon Fernandez, Olivier Hureau, Andrzej Duda, Maciej Korczynski

    Abstract: Public registration information on domain names, such as the accredited registrar, the domain name expiration date, or the abusecontact is crucial for many security tasks, from automated abuse notifications to botnet or phishing detection and classification systems. Various domain registration data is usually accessible through the WHOIS or RDAP protocols-a priori they provide the same data but us… ▽ More

    Submitted 4 June, 2024; originally announced June 2024.

    Journal ref: International Conference on Passive and Active Network Measurement, Mar 2024, Virtual Event, United States. pp.206-231

  2. Don't Get Hijacked: Prevalence, Mitigation, and Impact of Non-Secure DNS Dynamic Updates

    Authors: Yevheniya Nosyk, Maciej Korczyński, Carlos H. Gañán, Michał Król, Qasim Lone, Andrzej Duda

    Abstract: DNS dynamic updates represent an inherently vulnerable mechanism deliberately granting the potential for any host to dynamically modify DNS zone files. Consequently, this feature exposes domains to various security risks such as domain hijacking, compromise of domain control validation, and man-in-the-middle attacks. Originally devised without the implementation of authentication mechanisms, non-s… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  3. Guardians of DNS Integrity: A Remote Method for Identifying DNSSEC Validators Across the Internet

    Authors: Yevheniya Nosyk, Maciej Korczyński, Andrzej Duda

    Abstract: DNS Security Extensions (DNSSEC) provide the most effective way to fight DNS cache poisoning attacks. Yet, very few DNS resolvers perform DNSSEC validation. Identifying such systems is non-trivial and the existing methods are not suitable for Internet-scale measurements. In this paper, we propose a novel remote technique for identifying DNSSEC-validating resolvers. The proposed method consists of… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  4. The Cloud Strikes Back: Investigating the Decentralization of IPFS

    Authors: Leonhard Balduf, Maciej Korczyński, Onur Ascigil, Navin V. Keizer, George Pavlou, Björn Scheuermann, Michał Król

    Abstract: Interplanetary Filesystem (IPFS) is one of the largest peer-to-peer filesystems in operation. The network is the default storage layer for Web3 and is being presented as a solution to the centralization of the web. In this paper, we present a large-scale, multi-modal measurement study of the IPFS network. We analyze the topology, the traffic, the content providers and the entry points from the cla… ▽ More

    Submitted 30 September, 2023; v1 submitted 28 September, 2023; originally announced September 2023.

    Comments: To be presented at IMC'23

  5. arXiv:2309.10463  [pdf, other

    cs.CR cs.AI

    Exploring the Dark Side of AI: Advanced Phishing Attack Design and Deployment Using ChatGPT

    Authors: Nils Begou, Jeremy Vinoy, Andrzej Duda, Maciej Korczynski

    Abstract: This paper explores the possibility of using ChatGPT to develop advanced phishing attacks and automate their large-scale deployment. We make ChatGPT generate the following parts of a phishing attack: i) cloning a targeted website, ii) integrating code for stealing credentials, iii) obfuscating code, iv) automating website deployment on a hosting provider, v) registering a phishing domain name, and… ▽ More

    Submitted 19 September, 2023; originally announced September 2023.

    Journal ref: Proceedings of the IEEE Conference on Communications and Network Security (CNS), 2023

  6. Security Reputation Metrics

    Authors: Maciej Korczyński, Arman Noroozian

    Abstract: Security reputation metrics (aka. security metrics) quantify the security levels of organization (e.g., hosting or Internet access providers) relative to comparable entities. They enable benchmarking and are essential tools for decision and policy-making in security, and may be used to govern and steer responsible parties towards investing in security when economic or other decision-making factors… ▽ More

    Submitted 14 February, 2023; originally announced February 2023.

    Journal ref: Encyclopedia of Cryptography, Security and Privacy. Springer, Berlin, Heidelberg, 2021

  7. Source Address Validation

    Authors: Maciej Korczyński, Yevheniya Nosyk

    Abstract: Source address validation (SAV) is a standard formalized in RFC 2827 aimed at discarding packets with spoofed source IP addresses. The absence of SAV has been known as a root cause of reflection distributed denial-of-service (DDoS) attacks. Outbound SAV (oSAV): filtering applied at the network edge to traffic coming from inside the customer network to the outside. Inbound SAV (iSAV): filtering app… ▽ More

    Submitted 24 January, 2023; originally announced January 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2006.05277, arXiv:2002.00441

    Journal ref: Encyclopedia of Cryptography, Security and Privacy (2021)

  8. Study on Domain Name System (DNS) Abuse: Technical Report

    Authors: Jan Bayer, Yevheniya Nosyk, Olivier Hureau, Simon Fernandez, Ivett Paulovics, Andrzej Duda, Maciej Korczyński

    Abstract: A safe and secure Domain Name System (DNS) is of paramount importance for the digital economy and society. Malicious activities on the DNS, generally referred to as "DNS abuse" are frequent and severe problems affecting online security and undermining users' trust in the Internet. The proposed definition of DNS abuse is as follows: Domain Name System (DNS) abuse is any activity that makes use of d… ▽ More

    Submitted 17 December, 2022; originally announced December 2022.

  9. Early Detection of Spam Domains with Passive DNS and SPF

    Authors: Simon Fernandez, Maciej Korczyński, Andrzej Duda

    Abstract: Spam domains are sources of unsolicited mails and one of the primary vehicles for fraud and malicious activities such as phishing campaigns or malware distribution. Spam domain detection is a race: as soon as the spam mails are sent, taking down the domain or blacklisting it is of relative use, as spammers have to register a new domain for their next campaign. To prevent malicious actors from send… ▽ More

    Submitted 4 May, 2022; originally announced May 2022.

    Journal ref: Passive and Active Measurement, 13210, Springer International Publishing, pp.30-49, 2022, Lecture Notes in Computer Science

  10. Semantic Identifiers and DNS Names for IoT

    Authors: Simon Fernandez, Michele Amoretti, Fabrizio Restori, Maciej Korczynski, Andrzej Duda

    Abstract: In this paper, we propose a scheme for representing semantic metadata of IoT devices in compact identifiers and DNS names to enable simple discovery and search with standard DNS servers. Our scheme defines a binary identifier as a sequence of bits: a Context to use and several bits of fields corresponding to semantic properties specific to the Context. The bit string is then encoded as base32 char… ▽ More

    Submitted 22 October, 2021; originally announced October 2021.

    Journal ref: 2021 International Conference on Computer Communications and Networks (ICCCN), 2021, pp. 1-9

  11. The Closed Resolver Project: Measuring the Deployment of Source Address Validation of Inbound Traffic

    Authors: Yevheniya Nosyk, Maciej Korczyński, Qasim Lone, Marcin Skwarek, Baptiste Jonglez, Andrzej Duda

    Abstract: Source Address Validation (SAV) is a standard aimed at discarding packets with spoofed source IP addresses. The absence of SAV for outgoing traffic has been known as a root cause of Distributed Denial-of-Service (DDoS) attacks and received widespread attention. While less obvious, the absence of inbound filtering enables an attacker to appear as an internal host of a network and may reveal valuabl… ▽ More

    Submitted 15 March, 2023; v1 submitted 9 June, 2020; originally announced June 2020.

    Journal ref: IEEE/ACM Transactions on Networking (2023)

  12. Don't Forget to Lock the Front Door! Inferring the Deployment of Source Address Validation of Inbound Traffic

    Authors: Maciej Korczyński, Yevheniya Nosyk, Qasim Lone, Marcin Skwarek, Baptiste Jonglez, Andrzej Duda

    Abstract: This paper concerns the problem of the absence of ingress filtering at the network edge, one of the main causes of important network security issues. Numerous network operators do not deploy the best current practice - Source Address Validation (SAV) that aims at mitigating these issues. We perform the first Internet-wide active measurement study to enumerate networks not filtering incoming packet… ▽ More

    Submitted 2 February, 2020; originally announced February 2020.

    Journal ref: Proceedings of the Passive and Active Network Measurement Conference, 2020

  13. arXiv:1806.01633  [pdf, other

    cs.NI

    Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists

    Authors: Oliver Gasser, Quirin Scheitle, Pawel Foremski, Qasim Lone, Maciej Korczynski, Stephen D. Strowes, Luuk Hendriks, Georg Carle

    Abstract: Network measurements are an important tool in understanding the Internet. Due to the expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6. In recent years, several studies have proposed the use of target lists of IPv6 addresses, called IPv6 hitlists. In this paper, we show that addresses in IPv6 hitlists are heavily clustered. We present novel techniques that… ▽ More

    Submitted 28 September, 2018; v1 submitted 5 June, 2018; originally announced June 2018.

    Comments: See https://ipv6hitlist.github.io for daily IPv6 hitlists, historical data, and additional analyses

    Journal ref: Proceedings of the 2018 Internet Measurement Conference (IMC '18)

  14. Tranco: A Research-Oriented Top Sites Ranking Hardened Against Manipulation

    Authors: Victor Le Pochat, Tom Van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczyński, Wouter Joosen

    Abstract: In order to evaluate the prevalence of security and privacy practices on a representative sample of the Web, researchers rely on website popularity rankings such as the Alexa list. While the validity and representativeness of these rankings are rarely questioned, our findings show the contrary: we show for four main rankings how their inherent properties (similarity, stability, representativeness,… ▽ More

    Submitted 17 December, 2018; v1 submitted 4 June, 2018; originally announced June 2018.

    Comments: Our online service providing the Tranco ranking is available at https://tranco-list.eu

    Journal ref: Proceedings of the 26th Annual Network and Distributed System Security Symposium (NDSS), 2019

  15. arXiv:1708.06693  [pdf, other

    cs.CR

    Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting

    Authors: Samaneh Tajalizadehkhoob, Tom van Goethem, Maciej Korczyński, Arman Noroozian, Rainer Böhme, Tyler Moore, Wouter Joosen, Michel van Eeten

    Abstract: Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers. {\em Shared} hosting, offers a unique perspective since customers operate under restricted privileges and providers retain more control over configurations. We present the first empirical analysis of the distribution of web security featu… ▽ More

    Submitted 22 August, 2017; originally announced August 2017.

  16. arXiv:1702.01624  [pdf, other

    cs.CR

    Rotten Apples or Bad Harvest? What We Are Measuring When We Are Measuring Abuse

    Authors: Samaneh Tajalizadehkhoob, Rainer Böhme, Carlos Gañán, Maciej Korczyński, Michel Van Eeten

    Abstract: Internet security and technology policy research regularly uses technical indicators of abuse in order to identify culprits and to tailor mitigation strategies. As a major obstacle, readily available data are often misaligned with actual information needs. They are subject to measurement errors relating to observation, aggregation, attribution, and various sources of heterogeneity. More precise in… ▽ More

    Submitted 6 February, 2017; originally announced February 2017.

  17. arXiv:1612.03641  [pdf, other

    cs.CR

    Develo** Security Reputation Metrics for Hosting Providers

    Authors: Arman Noroozian, Maciej Korczyński, Samaneh TajalizadehKhoob, Michel van Eeten

    Abstract: Research into cybercrime often points to concentrations of abuse at certain hosting providers. The implication is that these providers are worse in terms of security; some are considered `bad' or even `bullet proof'. Remarkably little work exists on systematically comparing the security performance of providers. Existing metrics typically count instances of abuse and sometimes normalize these coun… ▽ More

    Submitted 12 December, 2016; originally announced December 2016.

    Comments: Usenix CSET'15 (8th Workshop on Cyber Security Experimentation and Test), Aug. 10 2015, Washington D.C

  18. arXiv:1612.03101  [pdf, other

    cs.CR cs.CY

    Evaluating the Impact of AbuseHUB on Botnet Mitigation

    Authors: Michel van Eeten, Qasim Lone, Giovane Moura, Hadi Asghari, Maciej Korczyński

    Abstract: This documents presents the final report of a two-year project to evaluate the impact of AbuseHUB, a Dutch clearinghouse for acquiring and processing abuse data on infected machines. The report was commissioned by the Netherlands Ministry of Economic Affairs, a co-funder of the development of AbuseHUB. AbuseHUB is the initiative of 9 Internet Service Providers, SIDN (the registry for the .nl top-l… ▽ More

    Submitted 9 December, 2016; originally announced December 2016.

  19. No domain left behind: is Let's Encrypt democratizing encryption?

    Authors: Maarten Aertsen, Maciej Korczyński, Giovane C. M. Moura, Samaneh Tajalizadehkhoob, Jan van den Berg

    Abstract: The 2013 National Security Agency revelations of pervasive monitoring have lead to an "encryption rush" across the computer and Internet industry. To push back against massive surveillance and protect users privacy, vendors, hosting and cloud providers have widely deployed encryption on their hardware, communication links, and applications. As a consequence, the most of web traffic nowadays is enc… ▽ More

    Submitted 9 December, 2016; originally announced December 2016.