{"id":"https://openalex.org/W4391306279","doi":"https://doi.org/10.1109/ficloud58648.2023.00056","title":"Evaluating IP Blacklists Effectiveness","display_name":"Evaluating IP Blacklists Effectiveness","publication_year":2023,"publication_date":"2023-08-14","ids":{"openalex":"https://openalex.org/W4391306279","doi":"https://doi.org/10.1109/ficloud58648.2023.00056"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ficloud58648.2023.00056","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2308.08356","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052609277","display_name":"Luca Deri","orcid":null},"institutions":[],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Luca Deri","raw_affiliation_strings":["ntop, Pisa, Italy"],"affiliations":[{"raw_affiliation_string":"ntop, Pisa, Italy","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063888848","display_name":"Francesco Fusco","orcid":"https://orcid.org/0000-0003-1186-5555"},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"Francesco Fusco","raw_affiliation_strings":["IBM Research, Zurich, Switzerland"],"affiliations":[{"raw_affiliation_string":"IBM Research, Zurich, Switzerland","institution_ids":["https://openalex.org/I4210126328"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":69},"biblio":{"volume":"9","issue":null,"first_page":"336","last_page":"343"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Machine Learning for Internet Traffic Classification","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Machine Learning for Internet Traffic Classification","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Intrusion Detection and Defense Mechanisms","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Characterization and Detection of Android Malware","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.7126792},{"id":"https://openalex.org/keywords/internet-traffic","display_name":"Internet Traffic","score":0.532836},{"id":"https://openalex.org/keywords/botnet-detection","display_name":"Botnet Detection","score":0.521415},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security Analysis","score":0.512319},{"id":"https://openalex.org/keywords/intrusion-detection","display_name":"Intrusion Detection","score":0.506211}],"concepts":[{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.7126792},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.66511536},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.66184753},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5565521},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5227166},{"id":"https://openalex.org/C2985371682","wikidata":"https://www.wikidata.org/wiki/Q11135","display_name":"Ip address","level":2,"score":0.48143762},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.44097137},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34478787},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16874883}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/ficloud58648.2023.00056","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2308.08356","pdf_url":"https://arxiv.org/pdf/2308.08356","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://arxiv.org/abs/2308.08356","pdf_url":"https://arxiv.org/pdf/2308.08356","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":["Cornell University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":23,"referenced_works":["https://openalex.org/W1536589781","https://openalex.org/W1756665610","https://openalex.org/W178883471","https://openalex.org/W1965245408","https://openalex.org/W2040393847","https://openalex.org/W2081835387","https://openalex.org/W2096273775","https://openalex.org/W2151629470","https://openalex.org/W2160353917","https://openalex.org/W2170862365","https://openalex.org/W22566950","https://openalex.org/W2395908694","https://openalex.org/W2587328895","https://openalex.org/W2731865152","https://openalex.org/W2766516664","https://openalex.org/W2901431764","https://openalex.org/W2951975875","https://openalex.org/W3007418556","https://openalex.org/W3042009420","https://openalex.org/W3198051278","https://openalex.org/W4249297852","https://openalex.org/W4301629317","https://openalex.org/W4312712436"],"related_works":["https://openalex.org/W4286859165","https://openalex.org/W3212927647","https://openalex.org/W2391477130","https://openalex.org/W2361650029","https://openalex.org/W2360075860","https://openalex.org/W2353452694","https://openalex.org/W2352199719","https://openalex.org/W2158220440","https://openalex.org/W2149305257","https://openalex.org/W1852121458"],"abstract_inverted_index":{"IP":[0,46,81,117],"blacklists":[1,30,47,92,135],"are":[2,21,93,108],"widely":[3],"used":[4],"to":[5,84,115],"increase":[6],"network":[7,62],"security":[8,138],"by":[9,32,141],"preventing":[10],"communications":[11],"with":[12,98,124],"peers":[13],"that":[14,91,101],"have":[15],"been":[16],"marked":[17],"as":[18,25,27,106],"malicious.":[19],"There":[20],"several":[22,28,78],"commercial":[23],"offerings":[24],"well":[26],"free-of-charge":[29],"maintained":[31],"volunteers":[33],"on":[34],"the":[35,41,44,70,99,132,137,142],"web.":[36],"Despite":[37],"their":[38],"wide":[39],"adoption,":[40],"effectiveness":[42,71],"of":[43,72,134,144],"different":[45],"in":[48],"real-world":[49],"scenarios":[50],"is":[51,122],"still":[52],"not":[53],"clear.":[54],"In":[55],"this":[56],"paper,":[57],"we":[58],"conduct":[59],"a":[60],"large-scale":[61],"monitoring":[63],"study":[64],"which":[65],"provides":[66],"insightful":[67],"findings":[68],"regarding":[69],"blacklists.":[73],"The":[74,111],"results":[75],"collected":[76],"over":[77],"hundred":[79],"thousand":[80],"hosts":[82],"belonging":[83],"three":[85],"distinct":[86],"large":[87],"production":[88],"networks":[89],"highlight":[90],"often":[94],"tuned":[95],"for":[96],"precision,":[97],"result":[100],"many":[102],"malicious":[103],"activities,":[104],"such":[105],"scanning,":[107],"completely":[109],"undetected.":[110],"proposed":[112],"instrumentation":[113],"approach":[114],"detect":[116],"scanning":[118],"and":[119,126],"suspicious":[120],"activities":[121],"implemented":[123],"home-grown":[125],"open-source":[127],"software.":[128],"Our":[129],"tools":[130],"enable":[131],"creation":[133],"without":[136],"risks":[139],"posed":[140],"deployment":[143],"honeypots.":[145]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4391306279","counts_by_year":[],"updated_date":"2024-11-12T07:46:42.471515","created_date":"2024-01-30"}