Reputation Block Lists: Difference between revisions
Applied modification ruleset: Automated workflow |
|||
| (3 intermediate revisions by 3 users not shown) | |||
| Line 1: | Line 1: | ||
'''Reputation Block Lists''', or RBLs, are lists of [[Domain Name]]s, Universal Resource Locators ([[URL]]s), and/or Internet Protocol ([[IP]]) addresses that have been identified as posing security threats.<ref>[https://www.icann.org/en/blogs/details/reputation-block-lists-protecting-users-everywhere-1-11-2017-en Reputation Block Lists Protect Users, ICANN Blog]</ref> DNS reputation systems can detect [[Malicious Domain|malicious domains]] at the registration time (with PREDATOR) or domain activity phase (with EXPOSURE). They classify domains as either malicious or benign; however, they do not consider [[Compromised Domain|compromised domains]]. The blocklists represent activity such as spam, malware distribution, command-and-control, phishing, and/or intellectual property rights infringement. Intermediaries, such as | '''Reputation Block Lists''', or RBLs, are lists of [[Domain Name]]s, Universal Resource Locators ([[URL]]s), and/or Internet Protocol ([[IP]]) addresses that have been identified as posing security threats.<ref>[https://www.icann.org/en/blogs/details/reputation-block-lists-protecting-users-everywhere-1-11-2017-en Reputation Block Lists Protect Users, ICANN Blog]</ref> DNS reputation systems can detect [[Malicious Domain|malicious domains]] at the registration time (with PREDATOR) or domain activity phase (with EXPOSURE). They classify domains as either malicious or benign; however, they do not consider [[Compromised Domain|compromised domains]]. The blocklists represent activity such as spam, malware distribution, command-and-control, phishing, and/or intellectual property rights infringement. Intermediaries, such as Internet service providers, use them to block malicious communications. | ||
==Overview== | ==Overview== | ||
| Line 12: | Line 12: | ||
* [[Abuse.ch]] is an anti-malware non-profit organization working with ISPs and network operators that runs [[URLHaus]], which focuses on maliciously registered domains, and [[ThreatFox]], which focuses on compromised websites. | * [[Abuse.ch]] is an anti-malware non-profit organization working with ISPs and network operators that runs [[URLHaus]], which focuses on maliciously registered domains, and [[ThreatFox]], which focuses on compromised websites. | ||
* [[Spamhaus]]'s blocklist provides malicious domains obtained from URLs enumerated in spam email payloads, spammers, phishing, malware-related websites, or suspicious domain names that share patterns with domains involved in technical or content abuse.<ref>[https://www.spamhaus.org/dbl/ Spamhaus DBL]</ref> | * [[Spamhaus]]'s blocklist provides malicious domains obtained from URLs enumerated in spam email payloads, spammers, phishing, malware-related websites, or suspicious domain names that share patterns with domains involved in technical or content abuse.<ref>[https://www.spamhaus.org/dbl/ Spamhaus DBL]</ref> | ||
* [https://urlabuse.com URLAbuse] is a community-based URL blocklist. It operates as a blocklist, compiles URLs linked to various online threats, encompassing phishing, malware delivery attacks, and compromised websites. All the URLs undergo manual verification to minimize the likelihood of false positives. Additionally, the blocklist includes metadata such as screenshots and MISP structures. | |||
==History== | ==History== | ||
| Line 22: | Line 23: | ||
As of April 2021, [[Intra2net]]'s Blacklist Monitor ranked [[Distributed Checksum Clearinghouses]] or (DCC) as showing the highest rate of accuracy in filtering spam.<ref>[https://www.intra2net.com/en/support/antispam/blacklist.php_dnsbl=dcc_check.html Intra2net Blacklist Monitor]</ref> | As of April 2021, [[Intra2net]]'s Blacklist Monitor ranked [[Distributed Checksum Clearinghouses]] or (DCC) as showing the highest rate of accuracy in filtering spam.<ref>[https://www.intra2net.com/en/support/antispam/blacklist.php_dnsbl=dcc_check.html Intra2net Blacklist Monitor]</ref> | ||
==References== | == References == | ||
{{reflist}} | |||
[[Category:Cybersecurity]] | [[Category:Cybersecurity]] | ||