TU Darmstadt / ULB / TUbiblio

Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet

Maass, Max ; Clement, Marc-Pascal ; Hollick, Matthias (2022)
Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet.
ARES 2021: The 16th International Conference on Availability, Reliability and Security. Vienna, Austria (17.08.2021-20.08.2021)
doi: 10.26083/tuprints-00021794
Konferenzveröffentlichung, Zweitveröffentlichung, Postprint

WarnungEs ist eine neuere Version dieses Eintrags verfügbar.

Kurzbeschreibung (Abstract)

In the era of large-scale internet scanning, misconfigured websites are a frequent cause of data leaks and security incidents. Previous research has investigated sending automated email notifications to operators of insecure or compromised websites, but has often met with limited success due to challenges in address data quality, spam filtering, and operator distrust and disinterest. While several studies have investigated the design and phrasing of notification emails in a bid to increase their effectiveness, the use of other contact channels has remained almost completely unexplored due to the required effort and cost. In this paper, we investigate two methods to increase notification success: the use of letters as an alternative delivery medium, and the description of attack scenarios to incentivize remediation. We evaluate these factors as part of a notification campaign utilizing manually-collected address information from 1359 German website operators and focusing on unintentional information leaks from web servers. We find that manually collected addresses lead to large increases in delivery rates compared to previous work, and letters were markedly more effective than emails, increasing remediation rates by up to 25 percentage points. Counterintuitively, providing detailed descriptions of possible attacks can actually decrease remediation rates, highlighting the need for more research into how notifications are perceived by recipients.

Typ des Eintrags: Konferenzveröffentlichung
Erschienen: 2022
Autor(en): Maass, Max ; Clement, Marc-Pascal ; Hollick, Matthias
Art des Eintrags: Zweitveröffentlichung
Titel: Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet
Sprache: Englisch
Publikationsjahr: 2022
Ort: Darmstadt
Publikationsdatum der Erstveröffentlichung: 2021
Verlag: Association for Computing Machinery
Buchtitel: The 16th International Conference on Availability, Reliability and Security
Kollation: 13 Seiten
Veranstaltungstitel: ARES 2021: The 16th International Conference on Availability, Reliability and Security
Veranstaltungsort: Vienna, Austria
Veranstaltungsdatum: 17.08.2021-20.08.2021
DOI: 10.26083/tuprints-00021794
URL / URN: https://tuprints.ulb.tu-darmstadt.de/21794
Zugehörige Links:
Herkunft: Zweitveröffentlichungsservice
Kurzbeschreibung (Abstract):

In the era of large-scale internet scanning, misconfigured websites are a frequent cause of data leaks and security incidents. Previous research has investigated sending automated email notifications to operators of insecure or compromised websites, but has often met with limited success due to challenges in address data quality, spam filtering, and operator distrust and disinterest. While several studies have investigated the design and phrasing of notification emails in a bid to increase their effectiveness, the use of other contact channels has remained almost completely unexplored due to the required effort and cost. In this paper, we investigate two methods to increase notification success: the use of letters as an alternative delivery medium, and the description of attack scenarios to incentivize remediation. We evaluate these factors as part of a notification campaign utilizing manually-collected address information from 1359 German website operators and focusing on unintentional information leaks from web servers. We find that manually collected addresses lead to large increases in delivery rates compared to previous work, and letters were markedly more effective than emails, increasing remediation rates by up to 25 percentage points. Counterintuitively, providing detailed descriptions of possible attacks can actually decrease remediation rates, highlighting the need for more research into how notifications are perceived by recipients.

Freie Schlagworte: information leakage, web security, notification study
Status: Postprint
URN: urn:nbn:de:tuda-tuprints-217946
Sachgruppe der Dewey Dezimalklassifikatin (DDC): 000 Allgemeines, Informatik, Informationswissenschaft > 004 Informatik
Fachbereich(e)/-gebiet(e): 20 Fachbereich Informatik
20 Fachbereich Informatik > Sichere Mobile Netze
Hinterlegungsdatum: 29 Jul 2022 13:12
Letzte Änderung: 02 Aug 2022 07:18
PPN:
Export:
Suche nach Titel in: TUfind oder in Google

Verfügbare Versionen dieses Eintrags

Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen