Documents

  • main

    Final published version, 6.53 MB, PDF document

DOI

In theory, hosting providers can play an important role in fighting cybercrime and misuse. This is because many online threats, be they high-profile or mundane, use online storage infrastructure maintained by hosting providers at the core of their criminal operations.
However, in practice, we see large differences in the security measures taken by hosting providers. Some providers implement an array of actions to protect their customers. Others lack even the capacity to detect cybercrime, are negligent of cybercrime, or even willfully facilitate it.
This book answers a series of questions that collectively aim to understand the underlying differences in security incentives and policies of hosting providers: How do we define a hosting provider? How are they distributed? To what extent do their individual properties or security measures affect the volume of incident in their networks?
We expect this book to provide useful insights for hosting providers about the effectiveness of their security policies and to serve as a an input for development of evidence-based policies by the government.
Original languageEnglish
Awarding Institution
Supervisors/Advisors
Award date5 Feb 2018
Print ISBNs978-94-6366-007-5
DOIs
Publication statusPublished - 2018

    Research areas

  • cybersecurity, hosting provider, metrics, incentives, shared hosting, patching, vulnerability scan, data analysis, statistical models, machine learning, blacklist data

ID: 36751620