TU Darmstadt / ULB / TUprints

Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet

Maass, Max ; Clement, Marc-Pascal ; Hollick, Matthias (2022)
Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet.
ARES 2021: The 16th International Conference on Availability, Reliability and Security. Vienna, Austria (17.08.2021-20.08.2021)
doi: 10.26083/tuprints-00021794
Conference or Workshop Item, Secondary publication, Postprint

[img] Text
2106.08024.pdf
Copyright Information: In Copyright.

Download (2MB)
Item Type: Conference or Workshop Item
Type of entry: Secondary publication
Title: Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet
Language: English
Date: 2022
Place of Publication: Darmstadt
Year of primary publication: 2021
Publisher: Association for Computing Machinery
Book Title: The 16th International Conference on Availability, Reliability and Security
Series: ARES 2021
Collation: 13 Seiten
Event Title: ARES 2021: The 16th International Conference on Availability, Reliability and Security
Event Location: Vienna, Austria
Event Dates: 17.08.2021-20.08.2021
DOI: 10.26083/tuprints-00021794
Corresponding Links:
Origin: Secondary publication service
Abstract:

In the era of large-scale internet scanning, misconfigured websites are a frequent cause of data leaks and security incidents. Previous research has investigated sending automated email notifications to operators of insecure or compromised websites, but has often met with limited success due to challenges in address data quality, spam filtering, and operator distrust and disinterest. While several studies have investigated the design and phrasing of notification emails in a bid to increase their effectiveness, the use of other contact channels has remained almost completely unexplored due to the required effort and cost. In this paper, we investigate two methods to increase notification success: the use of letters as an alternative delivery medium, and the description of attack scenarios to incentivize remediation. We evaluate these factors as part of a notification campaign utilizing manually-collected address information from 1359 German website operators and focusing on unintentional information leaks from web servers. We find that manually collected addresses lead to large increases in delivery rates compared to previous work, and letters were markedly more effective than emails, increasing remediation rates by up to 25 percentage points. Counterintuitively, providing detailed descriptions of possible attacks can actually decrease remediation rates, highlighting the need for more research into how notifications are perceived by recipients.

Uncontrolled Keywords: information leakage, web security, notification study
Status: Postprint
URN: urn:nbn:de:tuda-tuprints-217946
Classification DDC: 000 Generalities, computers, information > 004 Computer science
Divisions: 20 Department of Computer Science > Sichere Mobile Netze
Date Deposited: 29 Jul 2022 13:12
Last Modified: 25 Nov 2022 07:55
URI: https://tuprints.ulb.tu-darmstadt.de/id/eprint/21794
PPN: 499051459
Export:
Actions (login required)
View Item View Item