Reputation Block Lists: Difference between revisions
Applied modification ruleset: References normalization |
Applied modification ruleset: Automated workflow |
||
| Line 1: | Line 1: | ||
'''Reputation Block Lists''', or RBLs, are lists of [[Domain Name]]s, Universal Resource Locators ([[URL]]s), and/or Internet Protocol ([[IP]]) addresses that have been identified as posing security threats.<ref>[https://www.icann.org/en/blogs/details/reputation-block-lists-protecting-users-everywhere-1-11-2017-en Reputation Block Lists Protect Users, ICANN Blog]</ref> DNS reputation systems can detect [[Malicious Domain|malicious domains]] at the registration time (with PREDATOR) or domain activity phase (with EXPOSURE). They classify domains as either malicious or benign; however, they do not consider [[Compromised Domain|compromised domains]]. The blocklists represent activity such as spam, malware distribution, command-and-control, phishing, and/or intellectual property rights infringement. Intermediaries, such as | '''Reputation Block Lists''', or RBLs, are lists of [[Domain Name]]s, Universal Resource Locators ([[URL]]s), and/or Internet Protocol ([[IP]]) addresses that have been identified as posing security threats.<ref>[https://www.icann.org/en/blogs/details/reputation-block-lists-protecting-users-everywhere-1-11-2017-en Reputation Block Lists Protect Users, ICANN Blog]</ref> DNS reputation systems can detect [[Malicious Domain|malicious domains]] at the registration time (with PREDATOR) or domain activity phase (with EXPOSURE). They classify domains as either malicious or benign; however, they do not consider [[Compromised Domain|compromised domains]]. The blocklists represent activity such as spam, malware distribution, command-and-control, phishing, and/or intellectual property rights infringement. Intermediaries, such as Internet service providers, use them to block malicious communications. | ||
==Overview== | ==Overview== | ||