Recent PostsCTN Issue: December 2016 Thomas Hazlett & Michael Honig, The Price of Freedom: How to Charge for Spectrum as WiFi and Cellular Collide IEEE ComSoc Technology News (Dec. 2016) Al[...]Thomas Hazlett recently reviewed two new volumes on the Information Economy for the International Journal of Economics of Business. Both Martin Campbell-Kelly and Daniel D. Garcia-Swartz, [...]My new research shows that more Internet access funding doesn't help students. And almost all U.S. schools are already online. By Thomas Hazlett 08/23/16 09:27 AM EDT Even during[...]How an early telephone silencer took on AT&T. By Lauren Young via Atlas Obscura It's not unusual today to overhear strangers' intimate phone conversations while comm[...]
Why IP Alerts May Require New Technology
Copyright Compromises, Mini-Conference Presentation, October 12, 2011. Nick Feamster, Associate Professor of Computer Science, Georgia Tech.
ISPs Already Help Users Fight Malware, Comcast “Constant Guard”: Observes user traffic and notifies user about possible compromise. Notifying a user about possible piracy: Significantly different! Malware and Spam Detection: No Content Inspection Necessary! Domains: Can detect using lookup features, Spam: Can detect using sending behavior, Source ISP of sender, Geography (distance traveled), Time of day, Malware: Can detect using network statistics, Coordinated behavior across “bots”, Correlation with attack traffic. DNS Domain Reputation (How Constant Guard Works), Domain registration and resource record establishment occur before attacks take place.
GDE Error: Error retrieving file - if necessary turn off error checking (404:Not Found)