Understanding the Country-Level Security of Free Content Websites and their Hosting Infrastructure

05/23/2023
by   Mohammed Alqadhi, et al.
0

This paper examines free content websites (FCWs) and premium content websites (PCWs) in different countries, comparing them to general websites. The focus is on the distribution of malicious websites and their correlation with the national cyber security index (NCSI), which measures a country's cyber security maturity and its ability to deter the hosting of such malicious websites. By analyzing a dataset comprising 1,562 FCWs and PCWs, along with Alexa's top million websites dataset sample, we discovered that a majority of the investigated websites are hosted in the United States. Interestingly, the United States has a relatively low NCSI, mainly due to a lower score in privacy policy development. Similar patterns were observed for other countries With varying NCSI criteria. Furthermore, we present the distribution of various categories of FCWs and PCWs across countries. We identify the top hosting countries for each category and provide the percentage of discovered malicious websites in those countries. Ultimately, the goal of this study is to identify regional vulnerabilities in hosting FCWs and guide policy improvements at the country level to mitigate potential cyber threats.

READ FULL TEXT
research
03/16/2020

Correlation between Content and Traffic of the Universities Website

The purpose of this study is to analyse the correlation between content ...
research
05/01/2019

A Comparative Analysis of the Cyber Security Strategy of Bangladesh

Technology is an endless evolving expression in modern era, which increa...
research
06/27/2019

A Sweet Recipe for Consolidated Vulnerabilities: Attacking a Live Website by Harnessing a Killer Combination of Vulnerabilities

The recent emergence of new vulnerabilities is an epoch-making problem i...
research
01/25/2023

SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation

Every attack begins with gathering information about the target. The ent...
research
09/03/2021

Leveraging Open Threat Exchange (OTX) to Understand Spatio-Temporal Trends of Cyber Threats: Covid-19 Case Study

Understanding the properties exhibited by Spatial-temporal evolution of ...
research
05/09/2023

Generating Phishing Attacks using ChatGPT

The ability of ChatGPT to generate human-like responses and understand c...
research
08/08/2014

An Evasion and Counter-Evasion Study in Malicious Websites Detection

Malicious websites are a major cyber attack vector, and effective detect...

Please sign up or login with your details

Forgot password? Click here to reset