PREDATOR - Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration
Association for Computing Machinery (ACM) via YouTube
Overview
Syllabus
Intro
Domain Abuse in Practice
Case Study Introduction
Lazy: Batch Registration
Parasitic: Domain Reuse
Ground Truth Labeling Errors
Raw Data Overview
Registration History Features
Batch Correlation Features
Feature Vectorization
Detection Performance
Detection Latency Measurement
Evasion Robustness
PREDATOR Key Results Registration Detection
Taught by
ACM CCS