Главная
Study mode:
on
1
Intro
2
Cyber Threat Landscape
3
Categories of Hosting Providers
4
Threat Intelligence Cycle
5
Threat Intel Ecosystem Focus Areas
6
Requirements
7
Our stakeholders
8
Collection
9
Umbrella Investigate Intel Production Cycle
10
Processing
11
Autonomous System Number (ASN)
12
Analysis
13
Leaf (Stub) ASN or leaf ASNs chain
14
Indicator: Offshore Business Registration
15
Anonymous Payment Methods
16
Helping customers to maintain operations
17
Sample Rogue Hosters with a Dutch footprint (April 2018)
18
Dissemination
19
Law enforcement: Cross Jurisdictional Business Model
20
Law enforcement: Taking Down Bad Content
21
Law Enforcement Recommendations
22
Security Community Recommendations
23
Policy makers: Recommendations
24
Hosting Community Recommendations
25
Summary
26
References
27
Additional Related Work
Description:
Explore the behaviors and patterns of rogue hosting providers in this 39-minute conference talk from the Hack In The Box Security Conference. Delve into the critical role hosting providers play in enabling online businesses globally, while also being exploited by cybercriminals for ransomware, phishing, and other attacks. Learn about the challenges posed by legitimate-but-abused and bulletproof hosters, particularly relevant to The Netherlands with its major hosting infrastructures. Discover how threat intelligence efforts can identify and combat illegal and malicious content on the Internet. Examine the cyber threat intelligence cycle, including stakeholder identification, collection, processing, analysis, and dissemination. Gain insights into the Dutch hosting space and the multi-layered approach needed to address abused hosting providers. Understand the technical perspective on large-scale threat detection and threat intelligence using proven collection, analysis, and correlation techniques. Read more

Behaviors and Patterns of Rogue Hosting Providers

Hack In The Box Security Conference
Add to list
0:00 / 0:00