Mostrar el registro sencillo del ítem

Ponencia

dc.contributor.editorVarela Vaca, Ángel Jesúses
dc.contributor.editorCeballos Guerrero, Rafaeles
dc.contributor.editorReina Quintero, Antonia Maríaes
dc.creatorLiebergen, Kevin vanes
dc.creatorGómez, Gibranes
dc.creatorMatic, Srdjanes
dc.creatorCaballero, Juanes
dc.date.accessioned2024-06-03T09:38:59Z
dc.date.available2024-06-03T09:38:59Z
dc.date.issued2024
dc.identifier.citationLiebergen, K.v., Gómez, G., Matic, S. y Caballero, J. (2024). (Work in Progress): Clustering-Based Characterization of Database Server Ransom Scams. En Jornadas Nacionales de Investigación en Ciberseguridad (JNIC) (9ª.2024. Sevilla) (60-67), Sevilla: Universidad de Sevilla. Escuela Técnica Superior de Ingeniería Informática.
dc.identifier.isbn978-84-09-62140-8es
dc.identifier.urihttps://hdl.handle.net/11441/159596
dc.description.abstractWe perform the first study of database server ransom scams, a class of attacks where attackers scan for database servers, log in by leveraging the lack of authentication or by using guessed credentials, drop the database contents, and demand a ransom to return the deleted data. To enable our study, we leverage 5,792 unique ransom notes collected by an Internet scanning engine from 27,750 compromised ElasticSearch and MySQL database servers over a period of two years. We propose a novel automated three-step clustering approach. First, it leverages similarity of the ransom notes text to identify servers infected by the same campaign. Then, it identifies campaigns run by the same threat group by merging note similarity clusters that reuse IOCs (i.e., Bitcoin payment addresses, email addresses, Tor onion addresses). Finally, it merges IOC reuse clusters whose notes contain Bitcoin addresses co-spent in Bitcoin transactions. This process groups the 27,750 database server infections into 94 clusters, identifying a dominant threat group that is responsible for 49% of the infectionses
dc.formatapplication/pdfes
dc.format.extent8es
dc.language.isoenges
dc.publisherUniversidad de Sevilla. Escuela Técnica Superior de Ingeniería Informáticaes
dc.relation.ispartofJornadas Nacionales de Investigación en Ciberseguridad (JNIC) (9ª.2024. Sevilla) (2024), pp. 60-67.
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectDatabase serverses
dc.subjectRansomware attackses
dc.subjectRansom Scamses
dc.subjectClusteringes
dc.title(Work in Progress): Clustering-Based Characterization of Database Server Ransom Scamses
dc.typeinfo:eu-repo/semantics/conferenceObjectes
dc.type.versioninfo:eu-repo/semantics/publishedVersiones
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses
dc.publication.initialPage60es
dc.publication.endPage67es
dc.eventtitleJornadas Nacionales de Investigación en Ciberseguridad (JNIC) (9ª.2024. Sevilla)es
dc.eventinstitutionSevillaes
dc.relation.publicationplaceSevillaes

FicherosTamañoFormatoVerDescripción
JNIC24_78.pdf493.8KbIcon   [PDF] Ver/Abrir  

Este registro aparece en las siguientes colecciones

Mostrar el registro sencillo del ítem

Attribution-NonCommercial-NoDerivatives 4.0 Internacional
Excepto si se señala otra cosa, la licencia del ítem se describe como: Attribution-NonCommercial-NoDerivatives 4.0 Internacional