Skip to main content

Showing 1–11 of 11 results for author: Paxson, V

.
  1. arXiv:2105.13442  [pdf, other

    cs.CR

    Hopper: Modeling and Detecting Lateral Movement (Extended Report)

    Authors: Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner

    Abstract: In successful enterprise attacks, adversaries often need to gain access to additional machines beyond their initial point of compromise, a set of internal movements known as lateral movement. We present Hopper, a system for detecting lateral movement based on commonly available enterprise logs. Hopper constructs a graph of login activity among internal machines and then identifies suspicious seque… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

    Comments: Usenix Security Symposium 2021

  2. arXiv:1910.00790  [pdf, other

    cs.CR cs.SI

    Detecting and Characterizing Lateral Phishing at Scale

    Authors: Grant Ho, Asaf Cidon, Lior Gavish, Marco Schweighauser, Vern Paxson, Stefan Savage, Geoffrey M. Voelker, David Wagner

    Abstract: We present the first large-scale characterization of lateral phishing attacks, based on a dataset of 113 million employee-sent emails from 92 enterprise organizations. In a lateral phishing attack, adversaries leverage a compromised enterprise account to send phishing emails to other users, benefitting from both the implicit trust and the information in the hijacked user's account. We develop a cl… ▽ More

    Submitted 2 October, 2019; originally announced October 2019.

    Comments: Extended report of conference paper presented at the 26th USENIX Security Symposium (USENIX Security 19). USENIX Association, 2019

  3. arXiv:1806.00459  [pdf, other

    cs.NI

    A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability

    Authors: Sadia Afroz, Mobin Javed, Vern Paxson, Shoaib Asif Qazi, Shaarif Sajid, Michael Carl Tschantz

    Abstract: This paper examines different reasons the websites may vary in their availability by location. Prior works on availability mostly focus on censorship by nation states. We look at three forms of server-side blocking: blocking visitors from the EU to avoid GDPR compliance, blocking based upon the visitor's country, and blocking due to security concerns. We argue that these and other forms of blockin… ▽ More

    Submitted 1 June, 2018; originally announced June 2018.

  4. arXiv:1805.11606  [pdf, other

    cs.NI

    Exploring Server-side Blocking of Regions

    Authors: Sadia Afroz, Michael Carl Tschantz, Shaarif Sajid, Shoaib Asif Qazi, Mobin Javed, Vern Paxson

    Abstract: One of the Internet's greatest strengths is the degree to which it facilitates access to any of its resources from users anywhere in the world. However, users in the develo** world have complained of websites blocking their countries. We explore this phenomenon using a measurement study. With a combination of automated page loads, manual checking, and traceroutes, we can say, with high confidenc… ▽ More

    Submitted 29 May, 2018; originally announced May 2018.

  5. Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation

    Authors: Greg Durrett, Jonathan K. Kummerfeld, Taylor Berg-Kirkpatrick, Rebecca S. Portnoff, Sadia Afroz, Damon McCoy, Kirill Levchenko, Vern Paxson

    Abstract: One weakness of machine-learned NLP models is that they typically perform poorly on out-of-domain data. In this work, we study the task of identifying products being bought and sold in online cybercrime forums, which exhibits particularly challenging cross-domain effects. We formulate a task that represents a hybrid of slot-filling information extraction and named entity recognition and annotate d… ▽ More

    Submitted 31 August, 2017; originally announced August 2017.

    Comments: To appear at EMNLP 2017

    ACM Class: I.2.7

    Journal ref: EMNLP (2017) 2598-2607

  6. A Multi-perspective Analysis of Carrier-Grade NAT Deployment

    Authors: Philipp Richter, Florian Wohlfart, Narseo Vallina-Rodriguez, Mark Allman, Randy Bush, Anja Feldmann, Christian Kreibich, Nicholas Weaver, Vern Paxson

    Abstract: As ISPs face IPv4 address scarcity they increasingly turn to network address translation (NAT) to accommodate the address needs of their customers. Recently, ISPs have moved beyond employing NATs only directly at individual customers and instead begun deploying Carrier-Grade NATs (CGNs) to apply address translation to many independent and disparate endpoints spanning physical locations, a phenomen… ▽ More

    Submitted 13 September, 2016; v1 submitted 18 May, 2016; originally announced May 2016.

    Journal ref: Proceedings of ACM IMC 2016

  7. arXiv:1510.01419  [pdf, other

    cs.NI

    Haystack: A Multi-Purpose Mobile Vantage Point in User Space

    Authors: Abbas Razaghpanah, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Christian Kreibich, Phillipa Gill, Mark Allman, Vern Paxson

    Abstract: Despite our growing reliance on mobile phones for a wide range of daily tasks, their operation remains largely opaque. A number of previous studies have addressed elements of this problem in a partial fashion, trading off analytic comprehensiveness and deployment scale. We overcome the barriers to large-scale deployment (e.g., requiring rooted devices) and comprehensiveness of previous efforts by… ▽ More

    Submitted 29 October, 2016; v1 submitted 5 October, 2015; originally announced October 2015.

    Comments: 13 pages incl. figures

  8. arXiv:1507.08309  [pdf, other

    cs.CR

    Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners

    Authors: Frank Li, Richard Shin, Vern Paxson

    Abstract: The k-nearest neighbors (k-NN) algorithm is a popular and effective classification algorithm. Due to its large storage and computational requirements, it is suitable for cloud outsourcing. However, k-NN is often run on sensitive data such as medical records, user images, or personal information. It is important to protect the privacy of data in an outsourced k-NN system. Prior works have all ass… ▽ More

    Submitted 29 July, 2015; originally announced July 2015.

  9. arXiv:1411.2649  [pdf, ps, other

    cs.NI

    A Primer on IPv4 Scarcity

    Authors: Philipp Richter, Mark Allman, Randy Bush, Vern Paxson

    Abstract: With the ongoing exhaustion of free address pools at the registries serving the global demand for IPv4 address space, scarcity has become reality. Networks in need of address space can no longer get more address allocations from their respective registries. In this work we frame the fundamentals of the IPv4 address exhaustion phenomena and connected issues. We elaborate on how the current ecosys… ▽ More

    Submitted 27 February, 2015; v1 submitted 10 November, 2014; originally announced November 2014.

    Comments: ACM CCR 45(2), 11 pages, editorial contribution

    ACM Class: C.2.3; C.2.2

    Journal ref: ACM Computer Communication Review 45(2), April 2015

  10. arXiv:1409.3211  [pdf, other

    cs.CR

    On Modeling the Costs of Censorship

    Authors: Michael Carl Tschantz, Sadia Afroz, Vern Paxson, J. D. Tygar

    Abstract: We argue that the evaluation of censorship evasion tools should depend upon economic models of censorship. We illustrate our position with a simple model of the costs of censorship. We show how this model makes suggestions for how to evade censorship. In particular, from it, we develop evaluation criteria. We examine how our criteria compare to the traditional methods of evaluation employed in pri… ▽ More

    Submitted 10 September, 2014; originally announced September 2014.

  11. arXiv:cs/9809030  [pdf, ps

    cs.NI

    Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic

    Authors: Vern Paxson

    Abstract: Recent network traffic studies argue that network arrival processes are much more faithfully modeled using statistically self-similar processes instead of traditional Poisson processes [LTWW94,PF95]. One difficulty in dealing with self-similar models is how to efficiently synthesize traces (sample paths) corresponding to self-similar traffic. We present a fast Fourier transform method for synthe… ▽ More

    Submitted 18 September, 1998; originally announced September 1998.

    Comments: 14 pages

    Report number: LBL-36750/UC-405 ACM Class: C.2.m

    Journal ref: Computer Communication Review 27(5) (1997) 5-18