Behaviors and Patterns of Bulletproof and Anonymous Hosting Providers - USENIX Enigma Conference - 2017
USENIX Enigma Conference via YouTube
Overview
The course aims to educate participants on the behaviors and patterns of bulletproof and anonymous hosting providers, which are crucial for ransomware, phishing, and cybercrime operations. Participants will learn about the technology used by these hosting providers, how to detect threats, identify relevant features, understand tax havens and payment methods, and navigate the jurisdictional complexities involved. The teaching method involves presenting research findings on criminal hosting in the Dutch IP space. The course is intended for threat analysts, security researchers, and law enforcement professionals looking to enhance their understanding of illegal and malicious content on the Internet.
Syllabus
Introduction
Hosting Provider Technology
Outline
Threat Detection Model
Identifying Relevant Features
Tax Havens
Payment Methods
The Netherlands
Abuse complaints
Challenges
Evidence
Jurisdictional Complexity
Business Perspective
What can we do
Conclusion
Taught by
USENIX Enigma Conference