No plan survives contact: experience with cybercrime measurement

  • Authors:
  • Chris Kanich;Neha Chachra;Damon McCoy;Chris Grier;David Y. Wang;Marti Motoyama;Kirill Levchenko;Stefan Savage;Geoffrey M. Voelker

  • Affiliations:
  • Department of Computer Science and Engineering, University of California, San Diego;Department of Computer Science and Engineering, University of California, San Diego;Department of Computer Science and Engineering, University of California, San Diego;Computer Science Division, University of California, Berkeley;Department of Computer Science and Engineering, University of California, San Diego;Department of Computer Science and Engineering, University of California, San Diego;Department of Computer Science and Engineering, University of California, San Diego;Department of Computer Science and Engineering, University of California, San Diego;Department of Computer Science and Engineering, University of California, San Diego

  • Venue:
  • CSET'11 Proceedings of the 4th conference on Cyber security experimentation and test
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

An important mode of empirical security research involves analyzing the behavior, capabilities, and motives of adversaries. By definition, such measurements cannot be conducted in controlled settings and require "engagement" directly with adversaries, their infrastructure or their ecosystem. However, the operational complexities required to successfully carry out such measurements are significant and rarely documented; blacklisting, payment instruments, fraud controls and contact management all represent real challenges in such studies. In this paper, we document our experiences conducting such measurements over five years (covering a range of distinct studies) and distill effective operational practices for others who might conduct similar experiments in the future.