Search Results - "Fazzion, Elverton"

  • Showing 1 - 11 results of 11
Refine Results
  1. 1

    The Evolution of Bashlite and Mirai IoT Botnets by Marzano, Artur, Alexander, David, Fonseca, Osvaldo, Fazzion, Elverton, Hoepers, Cristine, Steding-Jessen, Klaus, Chaves, Marcelo H. P. C., Cunha, Italo, Guedes, Dorgival, Meira, Wagner

    “…Vulnerable IoT devices are powerful platforms for building botnets that cause billion-dollar losses every year. In this work, we study Bashlite botnets and…”
    Get full text
    Conference Proceeding
  2. 2

    Identifying and Characterizing Bashlite and Mirai C&C Servers by Bastos, Gabriel, Marzano, Artur, Fonseca, Osvaldo, Fazzion, Elverton, Hoepers, Cristine, Steding-Jessen, Klaus, Marcelo H. P. C., Chaves, Cunha, Italo, Guedes, Dorgival, Meira, Wagner

    “…IoT devices are often a vector for assembling massive botnets, as a consequence of being broadly available, having limited security protections, and…”
    Get full text
    Conference Proceeding
  3. 3
  4. 4

    Identifying Networks Vulnerable to IP Spoofing by Fonseca, Osvaldo, Cunha, Italo, Fazzion, Elverton, Meira, Wagner, Silva, Brivaldo Alves da, Ferreira, Ronaldo A., Katz-Bassett, Ethan

    “…The lack of authentication in the Internet's data plane allows hosts to falsify ( spoof ) the source IP address in packet headers. IP source spoofing is the…”
    Get full text
    Journal Article
  5. 5

    Measuring, Characterizing, and Avoiding Spam Traffic Costs by Fonseca, Osvaldo, Fazzion, Elverton, Cunha, Italo, Bragioni Las-Casas, Pedro Henrique, Guedes, Dorgival, Meira, Wagner, Hoepers, Cristine, Steding-Jessen, Klaus, Chaves, Marcelo H. P.

    Published in IEEE internet computing (01-07-2016)
    “…Spam messages propagate malware, disseminate phishing exploits, and advertise illegal products. Those messages generate costs for users and network operators,…”
    Get full text
    Journal Article
  6. 6

    Neighborhoods and bands: an analysis of the origins of spam by Fonseca, Osvaldo, Fazzion, Elverton, B Las-Casas, Pedro Henrique, Guedes, Dorgival, Meira, Wagner, Hoepers, Cristine, Steding-Jessen, Klaus, Chaves, Marcelo HP

    “…Despite the continuous efforts to mitigate spam, the volume of such messages continues to grow and identifying spammers is still a challenge. Spam traffic…”
    Get full text
    Journal Article
  7. 7

    SpamBands: a Methodology to Identify Sources of Spam Acting in Concert by Fazzion, Elverton, Fonseca, Osvaldo, Henrique B. Las Casas, Pedro, Guedes, Dorgival, Meira Jr, Wagner, Hoepers, Cristine, Steding Jessen, Klaus, H. P. Chaves, Marcelo

    Published in Revista IEEE América Latina (01-06-2016)
    “…In 2012, estimates indicated that 68.8% of all e-mail traffic was spam, what suggests this is still a relevant problem. Recently, some works have focused on…”
    Get full text
    Journal Article
  8. 8

    Tracking Down Sources of Spoofed IP Packets by Fonseca, Osvaldo, Cunha, Italo, Fazzion, Elverton, Meira, Wagner, Junior, Brivaldo, Ferreira, Ronaldo A., Katz-Bassett, Ethan

    “…The lack of authentication in the Internet's data plane allows hosts to falsify (spoof) the source IP address in packet headers, which forms the basis for…”
    Get full text
    Conference Proceeding
  9. 9

    A quantum-dot cellular automata processor design by Fazzion, Elverton, Fonseca, Osvaldo L. H. M., Nacif, Jose Augusto M., Vilela Neto, Omar P., Fernandes, Antonio Otavio, Silva, Douglas S.

    “…This paper describes the complete implementation of a robust SUBNEG (subtract and branch if negative) processor using quantum-dot cellular automata (QCA)…”
    Get full text
    Conference Proceeding
  10. 10

    A Spam Traffic Cost Analysis for Network Operators by Fonseca, Osvaldo, Fazzion, Elverton, Cunha, Italo, Las-Casas, Pedro, Guedes, Dorgival, Meira, Wagner, Hoepers, Cristine, Steding-Jessen, Klaus, Chaves, Marcelo H. P. C.

    “…Spam messages are used to disseminate malware, make phishing attacks, and advertise illegal products. Spam generates costs to users, e.g., victims of phishing,…”
    Get full text
    Conference Proceeding
  11. 11

    Neighborhoods or Condominiums: An Analysis of the Origin of Spam Based on the Organization of Autonomous Systems by Fonseca, Osvaldo, Las-Casas, Pedro, Fazzion, Elverton, Guedes, Dorgival, Meira, Wagner, Hoepers, Cristine, Steding-Jessen, Klaus, Chaves, Marcelo H.P.

    “…Despite the continuous efforts to mitigate spam, the volume of messages is huge and identifying spammers is still a challenge. Spam traffic analysis has been…”
    Get full text
    Conference Proceeding