MK
MacIej Korczyński
9 records found
1
hishing on the web is a model of social engineering and an attack vector for getting access to sensitive and financial data of individ- uals and corporations. Phishing has been identified as one of the prime cyber threats in recent years. With the goal to effectively identifying
...
Phishing on the web is a model of social engineering and an attack vector for getting access to sensitive and financial data of individuals and corporations. Phishing has been identified as one of the prime cyber threats in recent years. With the goal to effectively identifying a
...
hishing on the web is a model of social engineering and an attack vector for getting access to sensitive and financial data of individ- uals and corporations. Phishing has been identified as one of the prime cyber threats in recent years. With the goal to effectively identifying
...
Intercept and Inject
DNS Response Manipulation in the Wild
DNS is a protocol responsible for translating human-readable domain names into IP addresses. Despite being essential for many Internet services to work properly, it is inherently vulnerable to manipulation. In November 2021, users from Mexico received bogus DNS responses when res
...
Deployment of Source Address Validation by Network Operators
A Randomized Control Trial
IP spoofing, sending IP packets with a false source IP address, continues to be a primary attack vector for large-scale Denial of Service attacks. To combat spoofing, various interventions have been tried to increase the adoption of source address validation (SAV) among network o
...
This paper concerns the problem of the absence of ingress filtering at the network edge, one of the main causes of important network security issues. Numerous network operators do not deploy the best current practice—Source Address Validation (SAV) that aims at mitigating these i
...
This paper reports on the first Internet-wide active measurement study to enumerate networks not filtering incoming packets based on their source address. Our method identifies closed and open DNS resolvers handling requests from the outside of the network with the source address
...
Cybercrime after the sunrise
A statistical analysis of DNS abuse in new gTLDs
To enhance competition and choice in the domain name system, ICANN introduced the new gTLD program, which added hundreds of new gTLDs (e.g. .nyc, .io) to the root DNS zone. While the program arguably increased the range of domain names available to consumers, it might also have c
...
Using Crowdsourcing Marketplaces for Network Measurements
The Case of Spoofer
Internet measurement tools are used to make inferences about network policies and practices across the Internet, such as censorship, traffic manipulation, bandwidth, and security measures. Some tools must be run from vantage points within individual networks, so are dependent on
...