Star 0

Abstract

Throughout the history of security we've used many forms of reputation to identify adversaries. The recent trend of using IP reputation for various systems has proven successful in many cases. However, cybercriminals have learned to game our reputation systems. We will review several examples of IP reputation failures from recent findings and suggest ways to get back ahead of the cybercriminals.