The Landscape of Domain Name Typosquatting

Total Page:16

File Type:pdf, Size:1020Kb

The Landscape of Domain Name Typosquatting The Landscape of Domain Name Typosquatting: Techniques and Countermeasures Jeffrey Spaulding Shambhu Upadhyaya Aziz Mohaisen SUNY Buffalo SUNY Buffalo SUNY Buffalo Buffalo, NY, USA Buffalo, NY, USA Buffalo, NY, USA Email: [email protected] Email: [email protected] Email: [email protected] Abstract—With more than 294 million registered domain over their domain names and pay Facebook up to $1.34 million names as of late 2015, the domain name ecosystem has evolved in damages. to become a cornerstone for the operation of the Internet. As we will discuss in subsequent sections, other forms of Domain names today serve everyone, from individuals for their online presence to big brands for their business operations. Such domain squatting have emerged that not only uses common ty- ecosystem that facilitated legitimate business and personal uses pographical mistakes, but employs the use of (among others): has also fostered “creative” cases of misuse, including phishing, visually-similar letters [18], similar-sounding words [26] or the spam, hit and traffic stealing, online scams, among others. As a exploitation of hardware errors that store domain names [28]. first step towards this misuse, the registration of a legitimately- In addition, it has been shown that not only are the most looking domain is often required. For that, domain typosquatting provides a great avenue to cybercriminals to conduct their crimes. popular domain names targeted by typosquatters, the “long In this paper, we review the landscape of domain name tail” of the popularity distribution has also come under their typosquatting, highlighting models and advanced techniques sights as potential targets for exploitation [30]. By providing for typosquatted domain names generation, models for their a comprehensive treatment of typosquatting, we hope that this monetization, and the existing literature on countermeasures. paper will catapult research on mitigating this problem. We further highlight potential fruitful directions on technical countermeasures that are lacking in the literature. Organization. In §II we review the anatomy of typosquatting. Keywords. Domain Names, Typosquatting, Defenses. In §III we review the monetization techniques of typosquat- ting. In §IV we review the countermeasures to typosquatting. I. INTRODUCTION In §V we provide concluding remarks and open directions. Ever since the process of the domain name registration be- II. TYPOSQUATTING ANATOMY gan in the 1990’s, cybercriminals have seized the opportunity to profit on the backs of others by misusing such process in While typosquatting as a phenomenon is perhaps known so many ways [24], [33], [31]. As Internet commerce quickly for many years, the term itself has been in use for almost two rose and more companies began registering domain names to decades. Several studies have been conducted to understand get a foothold on the action, certain individuals realized that models of typosquatting, including advanced techniques and they could preemptively register these domain names on a first- squatted domains features. In the following, we briefly review come first-serve basis. These so called “cybersquatters” would the historical background of typosquatting, and follow it by a purchase domain names in the hopes of selling them back technical anatomy of models, techniques and features. arXiv:1603.02767v1 [cs.CR] 9 Mar 2016 to companies and trademark owners for a substantial profit. As these popular domain names attracted more users to their A. Historical Background websites, it was not long before cybercriminals recognized The term typosquatter may have been coined as far back that people often made mistakes when typing URLs into as 1998 by R. C. Cumbow in The New York Law Journal their browsers–thus sparking a new form of domain name (NYLJ) [17], who was one of the first to write about this new exploitation called typosquatting. trend of cybersquatting. One of the first large-scale studies In this paper, we survey the landscape of typosquatting, on typosquatting was conducted in 2003 by Edelman [15], which is the deliberate registration of a domain name that uses who located more than 8,800 registered domains that were typographical variants of other target domain names. Typically, minor typographical variations of popular domain names. these variant domain names are generated in such a way as Surprisingly, most of these domain names were traced back to exploit common typographical errors made by users that to one individual, John Zuccarini, who often redirected users manually type URLs into web browsers. For example, the to sexually-explicit content and even used nefarious tactics to popular social networking site Facebook was the target of “mousetrap” these users from leaving these sites (e.g. blocking several typosquatters who registered domain names such as the ordinary operation of a browser’s Back and Close com- www.fagebook.com and www.facewbook.com [29]. Unfortu- mands). Some of these typosquatted domain names went so nately for these typosquatters, they were ordered to transfer far as to target websites frequentDly visited by children, such as disenystore.com (a typo on disneystore.com) 8) 1-mod-inflate: this typo happens when a typosquatter which redirected to a website with sexually-explicit content. increases the length of a domain name (or URL) by one character. Unlike in [32] characters are added based B. Identifying Typo Domains: Models on distance (e.g., using a keyboard layout), this work considers all characters as potential candidates. Prior experiments conducted on the subject of typosquatting Certain aspects of the techniques proposed in [9] can be typically began their data collection phase by first identifying a viewed as generalization of the techniques proposed in [32]. set of domain names and then generating a list of possible typo For example, rather than substituting adjacent characters on a variations on those domain names. Often these experiments keyboard as shown by Wang et al.’s fourth model, Banerjee et used a subset of the top-ranking domain names according to al. substituted all possible alphabet characters when generating some domain ranking websites, such as Alexa. The rationale of typo domains. In addition, they also experimented with two using such domains is that typosquatters will naturally target and three character modifications for their inplace, inflate the most popular domain names to increase the chances of and deflate schemes thereby generating roughly three million obtaining unsuspecting visitors. Table I summarizes these sev- possible typo domain names starting with a corpus of 900 eral approaches of which authoritative domains they studied, original domain names. the number of possible typosquatted domains they generated, After probing for the existence of a possible typo do- and what percentage of them were active (i.e. resolved to main, Banerjee et al. observed that approximately 99% of an IP address hosting a website). In the following section, the “phony” typosquatted sites they identified utilized a one- we describe the models that generated typos variations of an character modification of the popular domain names they authoritative domain. targeted. Essentially, these are domain names that have a Typo-Generation Models. One of the first and widely cited Damerau-Levenshtein distance [22] of one from the domains approaches in this area was introduced by Wang et al. [32] they target. The Damerau-Levenshtein distance is the mini- where given a target domain (e.g. www.example.com), the mum number of operations needed to transform one string into following five typo-generation models are commonly used: another, where an operation is defined as an insertion, deletion, 1) Missing-dot typos: this typo happens when the dot or substitution of a single character, or a transposition of two following “www” is forgotten, e.g., wwwexample.com adjacent characters (a generalization of Hamming distance). 2) Character-omission typos: this typo happens when one C. Advanced Squatting Techniques character in the original domain name is omitted, e.g., While the two representative studies discussed in §II-B www.exmple.com present examples of systematic typosquatting techniques, other 3) Character-permutation typos: this typo happens when techniques that exploit visual, hardware, and sound similarities two consecutive characters are swapped in the original have been explored as well. In the following, we review those domain name, e.g., www.examlpe.com techniques and their use. 4) Character-substitution typos: this typo happens when 1) Homograph Attacks: Per Holgers et al. [18], the ho- characters are replaced in the original domain name by mograph attack relies on the visual similarity of letters or their adjacent ones on a specific keyboard layout, e.g., strings that might be confused with one another. For example, www.ezample.com , where “x” was replaced by the an attacker can exploit the fact that the lower-case letter ‘L’ QWERTY-adjacent character “z”. (l) is visually confusable with the upper-case letter ‘i’ (I) in 5) Character-duplication typos: this typo happens when sans-serif fonts and register www.paypai.com which targets characters are mistakenly typed twice (where they the popular payment site PayPal. The end result, in san-serif appear once in the original domain name), e.g., font, looks very similar to the original: www.paypal.com vs www.exaample.com www.paypaI.com. Alarming as it may seem, the measure- While this previous study presented the first attempt to ment results of Holgers et al. shows that these homograph systematically understand techniques for typosquatting that are attacks are rare and not severe in nature. However, these most prevalent based on certain usage aspects, later studies types of attacks may continue to be an attractive choice looked at exhaustively generating typo domains using other for would-be cyber-criminals since it can fool most users– methods. For example, a similar approach in 2008 by Banerjee as demonstrated in the user study “Why Phishing Works” et al. [9] suggested the following methods for generating by Dhamija et al.
Recommended publications
  • Passive Monitoring of DNS Anomalies Bojan Zdrnja1, Nevil Brownlee1, and Duane Wessels2
    Passive Monitoring of DNS Anomalies Bojan Zdrnja1, Nevil Brownlee1, and Duane Wessels2 1 University of Auckland, New Zealand, b.zdrnja,nevil @auckland.ac.nz { } 2 The Measurement Factory, Inc., [email protected] Abstract. We collected DNS responses at the University of Auckland Internet gateway in an SQL database, and analyzed them to detect un- usual behaviour. Our DNS response data have included typo squatter domains, fast flux domains and domains being (ab)used by spammers. We observe that current attempts to reduce spam have greatly increased the number of A records being resolved. We also observe that the data locality of DNS requests diminishes because of domains advertised in spam. 1 Introduction The Domain Name System (DNS) service is critical for the normal functioning of almost all Internet services. Although the Internet Protocol (IP) does not need DNS for operation, users need to distinguish machines by their names so the DNS protocol is needed to resolve names to IP addresses (and vice versa). The main requirements on the DNS are scalability and availability. The DNS name space is divided into multiple zones, which are a “variable depth tree” [1]. This way, a particular DNS server is authoritative only for its (own) zone, and each organization is given a specific zone in the DNS hierarchy. A complete domain name for a node is called a Fully Qualified Domain Name (FQDN). An FQDN defines a complete path for a domain name starting on the leaf (the host name) all the way to the root of the tree. Each node in the tree has its label that defines the zone.
    [Show full text]
  • Monthly Cybersecurity Newsletter April 2018 Issue
    Monthly Cybersecurity Newsletter April 2018 Issue Enterprise Security and Risk Management Office (ESRMO) From the Desk of the State Chief Risk Officer – Maria Thompson Be Careful What You Type You should be careful when typing a web address into your browser. It is very easy to enter a similar but incorrect domain name and end up somewhere you do not want to be. Unscrupulous individuals use domain names similar to more popular ones on the Internet in order to entice individuals who mistakenly type the wrong web address. This practice of using similar domain names and relying on individuals to type the wrong address is called typosquatting. A typosquatter’s URL will usually be one of several kinds: a common misspelling of the known name (e.g. exemple.com), a differently phrased name (e.g. examples.com), a different top-level domain name (e.g. example.org), or an abuse of a country code (example.cm). In fact, a report published in December 2009 by McAfee found that .cm was the riskiest domain in the world, with 36.7% of the sites posing a security risk to users. Once on a typosquatter’s site, the user may be tricked into thinking he or she is on the intended site, through the use of similar logos, website layouts or content. Visiting such a site, however, may result in malicious software (malware) to be downloaded and installed on the end user’s machine, or it may entice the end user to disclose private information. Most typosquatters are probably just aiming to make money by taking advantage of your errors.
    [Show full text]
  • Dispute Resolution Mechanisms and Trademark Cybersquatting in Gtlds Old Style, Cctld Style and Gtld New Style
    Dispute Resolution Mechanisms and Trademark Cybersquatting In ccTLD, Old Style gTLD and New Style gTLD Systems COMPARATIVE ANALYSIS OF THE US, EU AND INTERNATIONAL APPROACHES By Waddah Al-rawashdedh University of Szeged Faculty of Law and Political Sciences Graduate School Hungary 2017 Spring Dispute Resolution Mechanisms & Trademark Cybersquatting Table of Contents Page DEDICATION ............................................................................................ 8 ACKNOWLEDGMENTS ......................................................................... 9 LIST OF ABBREVIATIONS ................................................................... 10 ABSTRACT ................................................................................................ 12 INTRODUCTION ...................................................................................... 14 CHAPTER 1 DOMAIN NAMES AND TRADEMARKS ................................................ 22 1.1. Overview ....................................................................................... 22 1.2. Meaning of Domain Names and Domain Name System (DNS) ............................................................................................. 22 1.3. The Need and Importance of Domain Names ........................... 25 1.4. Types of Domain Names ............................................................. 26 1.4.1. “Country-code” TLDs ............................................................................... 26 1.4.2. “generic” TLDs ........................................................................................
    [Show full text]
  • Proactive Cyberfraud Detection Through Infrastructure Analysis
    PROACTIVE CYBERFRAUD DETECTION THROUGH INFRASTRUCTURE ANALYSIS Andrew J. Kalafut Submitted to the faculty of the Graduate School in partial fulfillment of the requirements for the degree Doctor of Philosophy in Computer Science Indiana University July 2010 Accepted by the Graduate Faculty, Indiana University, in partial fulfillment of the requirements of the degree of Doctor of Philosophy. Doctoral Minaxi Gupta, Ph.D. Committee (Principal Advisor) Steven Myers, Ph.D. Randall Bramley, Ph.D. July 19, 2010 Raquel Hill, Ph.D. ii Copyright c 2010 Andrew J. Kalafut ALL RIGHTS RESERVED iii To my family iv Acknowledgements I would first like to thank my advisor, Minaxi Gupta. Minaxi’s feedback on my research and writing have invariably resulted in improvements. Minaxi has always been supportive, encouraged me to do the best I possibly could, and has provided me many valuable opportunities to gain experience in areas of academic life beyond simply doing research. I would also like to thank the rest of my committee members, Raquel Hill, Steve Myers, and Randall Bramley, for their comments and advice on my research and writing, especially during my dissertation proposal. Much of the work in this dissertation could not have been done without the help of Rob Henderson and the rest of the systems staff. Rob has provided valuable data, and assisted in several other ways which have ensured my experiments have run as smoothly as possible. Several members of the departmental staff have been very helpful in many ways. Specifically, I would like to thank Debbie Canada, Sherry Kay, Ann Oxby, and Lucy Battersby.
    [Show full text]
  • D-FENS: DNS Filtering & Extraction Network System for Malicious Domain Names
    University of Central Florida STARS Electronic Theses and Dissertations, 2004-2019 2018 D-FENS: DNS Filtering & Extraction Network System for Malicious Domain Names Jeffrey Spaulding University of Central Florida Part of the Computer Sciences Commons Find similar works at: https://stars.library.ucf.edu/etd University of Central Florida Libraries http://library.ucf.edu This Doctoral Dissertation (Open Access) is brought to you for free and open access by STARS. It has been accepted for inclusion in Electronic Theses and Dissertations, 2004-2019 by an authorized administrator of STARS. For more information, please contact [email protected]. STARS Citation Spaulding, Jeffrey, "D-FENS: DNS Filtering & Extraction Network System for Malicious Domain Names" (2018). Electronic Theses and Dissertations, 2004-2019. 6378. https://stars.library.ucf.edu/etd/6378 D-FENS: DNS FILTERING & EXTRACTION NETWORK SYSTEM FOR MALICIOUS DOMAIN NAMES by JEFFREY SPAULDING B.S. Clarkson University, 2003 M.S. SUNY Polytechnic Institute, 2013 A dissertation submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the College of Engineering and Computer Science at the University of Central Florida Orlando, Florida Summer Term 2018 Major Professor: Aziz Mohaisen c 2018 Jeffrey Spaulding ii ABSTRACT While the DNS (Domain Name System) has become a cornerstone for the operation of the Internet, it has also fostered creative cases of maliciousness, including phishing, typosquatting, and botnet communication among others. To address this problem, this dissertation focuses on identifying and mitigating such malicious domain names through prior knowledge and machine learning. In the first part of this dissertation, we explore a method of registering domain names with deliberate typographical mistakes (i.e., typosquatting) to masquerade as popular and well-established domain names.
    [Show full text]
  • Brief of Internet Commerce Association
    No. 19-46 IN THE Supreme Court of the United States U.S. PATENT AND TRADEMARK OFFICE, ET AL., Petitioners, v. BOOKING.COM B.V., Respondent. ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT BRIEF OF THE INTERNET COMMERCE ASSOCIATION AS AMICUS CURIAE IN SUPPORT OF RESPONDENT Megan L. Brown Counsel of Record David E. Weslow Ari S. Meltzer Jeremy J. Broggi WILEY REIN LLP 1776 K Street NW Washington, DC 20006 (202) 719-7000 [email protected] February 19, 2020 Counsel for Amicus Curiae - i - TABLE OF CONTENTS Page TABLE OF CITED AUTHORITIES .......................... ii INTEREST OF AMICUS CURIAE ............................1 SUMMARY OF ARGUMENT .....................................3 ARGUMENT ...............................................................7 I. The Government Seeks A Bright-Line Rule That Would Devalue Registered Domain Names As A Class Of Intellectual Property Assets. ...............................................................7 II. The Government’s Rule Would Discourage Investment In The Internet Economy By Precluding Trademark Protection For New Types of Domain Names. ............................... 13 III. The Government’s Rule Would Eliminate A Critical Consumer Protection And Anti-Fraud Tool, Opening The Door To More Domain Name Abuse. ................................................... 15 A. Cybercriminals Abuse Domain Names Through Typosquatting And Domain Name Hijacking To Perpetrate Fraud And Proliferate Malware. .................... 16 B. Companies Rely On Trademark Protection To Combat Domain Name Abuse. ................................................... 20 C. Non-Trademark Remedies Do Not Provide A Sufficient Means For Combatting Domain Name Abuse. ..... 26 CONCLUSION .......................................................... 28 - ii - TABLE OF CITED AUTHORITIES Page(s) Cases Central Source LLC v. annaulcreditreports.com, No. 20-CV-84 (E.D. Va.) ....................................... 23 Central Source LLC v. aabbualcreditreport.com, No. 14-CV-918 (E.D.
    [Show full text]
  • The Trend Towards Enhancing Trademark Owners' Rights-A Comparative Study of U.S. and German Trademark Law, 7 J
    Journal of Intellectual Property Law Volume 7 | Issue 2 Article 2 March 2000 The rT end Towards Enhancing Trademark Owners' Rights-A Comparative Study of U.S. and German Trademark Law Rudolf Rayle the University of Iowa Follow this and additional works at: https://digitalcommons.law.uga.edu/jipl Part of the Comparative and Foreign Law Commons, and the Intellectual Property Law Commons Recommended Citation Rudolf Rayle, The Trend Towards Enhancing Trademark Owners' Rights-A Comparative Study of U.S. and German Trademark Law, 7 J. Intell. Prop. L. 227 (2000). Available at: https://digitalcommons.law.uga.edu/jipl/vol7/iss2/2 This Article is brought to you for free and open access by Digital Commons @ Georgia Law. It has been accepted for inclusion in Journal of Intellectual Property Law by an authorized editor of Digital Commons @ Georgia Law. Please share how you have benefited from this access For more information, please contact [email protected]. Rayle: The Trend Towards Enhancing Trademark Owners' Rights-A Comparativ JOURNAL OF INTELLECTUAL PROPERTY LAW VOLUME 7 SPRING 2000 NUMBER 2 ARTICLES THE TREND TOWARDS ENHANCING TRADEMARK OWNERS' RIGHTS-A COMPARATIVE STUDY OF U.S. AND GERMAN TRADEMARK LAW Rudolf Rayle* I. INTRODUCTION Conventionally trademarks are said to serve primarily as source identifiers. They are the medium through which consumers identify a particular product with a specific source (i.e., serve an identification or origin function). The origin function is therefore claimed to be the main function of trademarks and at first glance the definitions of trademarks in the Lanham Act as well as in the German Trademark Act, seem to confirm this traditional view.' * Rudi Rayle attended the Universities of Bonn and Tuebingen, Germany.
    [Show full text]
  • Vol. 93 TMR 1035
    Vol. 93 TMR 1035 RECONSIDERING INITIAL INTEREST CONFUSION ON THE INTERNET By David M. Klein and Daniel C. Glazer∗ I. INTRODUCTION Courts developed the theory of initial interest confusion (or “pre-sale confusion”) to address the unauthorized use of a trademark in a manner that captures consumer attention, even though no sale is ultimately completed as a result of any initial confusion. During the last few years, the initial interest confusion doctrine has become a tool frequently used to resolve Internet- related disputes.1 Indeed, some courts have characterized initial interest confusion on the Internet as a “distinct harm, separately actionable under the Lanham Act.”2 This article considers whether the initial interest confusion doctrine is necessary in the context of the Internet. Courts typically have found actionable initial interest confusion when Internet users, seeking a trademark owner’s website, are diverted by identical or confusingly similar domain names to websites in competition with, or critical of, the trademark owner. A careful analysis of these decisions, however, leads to the conclusion that a distinct initial interest confusion theory may be unnecessary to resolve cases involving the unauthorized use of a trademark as a domain name. In fact, traditional notions of trademark infringement law and multi-factor likelihood of confusion tests may adequately address the balancing of interests required in cases where courts must define the boundaries of trademark owners’ protection against the use of their marks in the domain names of competing websites. The Federal Trademark Dilution Act (FTDA)3 and the Anticybersquatting Consumer Protection Act (ACPA)4 provide additional protection against the unauthorized use of domain names that dilute famous marks or evidence a bad ∗ Mr.
    [Show full text]
  • From WHOIS to WHOWAS: a Large-Scale Measurement Study of Domain Registration Privacy Under the GDPR
    From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR Chaoyi Lu∗†, Baojun Liu∗†¶B, Yiming Zhang∗†, Zhou Li§, Fenglu Zhang∗, Haixin Duan∗¶B, Ying Liu∗, Joann Qiongna Chen§, Jinjin LiangY, Zaifeng ZhangY, Shuang Hao∗∗ and Min Yang†† ∗Tsinghua University, †Beijing National Research Center for Information Science and Technology, flcy17, zhangyim17, zfl[email protected], flbj, [email protected], [email protected] §University of California, Irvine, fzhou.li, [email protected], ¶Qi An Xin Group, Y360 Netlab, fliangjinjin, [email protected], ∗∗University of Texas at Dallas, [email protected], ††Fudan University, m [email protected] Abstract—When a domain is registered, information about the [39], online advertising [55], [96], [103], [102] and usability registrants and other related personnel is recorded by WHOIS of privacy notices [104], [78], [79], [90], [50], [49], [27], [72]. databases owned by registrars or registries (called WHOIS providers jointly), which are open to public inquiries. However, Due to its broad scope, not only does the GDPR protect due to the enforcement of the European Union’s General Data normal users browsing websites, users setting up websites and Protection Regulation (GDPR), certain WHOIS data (i.e., the the associated infrastructure are also protected. One example records about EEA, or the European Economic Area, registrants) is domain registration. After a user registers a domain name, needs to be redacted before being released to the public. Anec- e.g., example.com, its sponsoring registrar and upper-stream dotally, it was reported that actions have been taken by some registry will store his/her personal information like name and WHOIS providers.
    [Show full text]
  • Master of the Domain (Name)
    Santa Clara High Technology Law Journal Volume 17 | Issue 2 Article 5 January 2001 Master of the Domain (Name): A History of Domain Name Litigation and the Emergence of the Anticybersquatting Consumer Protection Act and Uniform Dispute Resolution Policy Colby B. Springer Follow this and additional works at: http://digitalcommons.law.scu.edu/chtlj Part of the Law Commons Recommended Citation Colby B. Springer, Master of the Domain (Name): A History of Domain Name Litigation and the Emergence of the Anticybersquatting Consumer Protection Act and Uniform Dispute Resolution Policy, 17 Santa Clara High Tech. L.J. 315 (2000). Available at: http://digitalcommons.law.scu.edu/chtlj/vol17/iss2/5 This Comment is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara High Technology Law Journal by an authorized administrator of Santa Clara Law Digital Commons. For more information, please contact [email protected]. Master of the Domain (Name): A History of Domain Name Litigation and the Emergence of the Anticybersquatting Consumer Protection Act and Uniform Dispute Resolution Policy Colby B. Springer" TABLE OF CONTENTS I. Introduction ......................................................................................... 316 II. Internet Fundamentals ......................................................................... 317 III. The Domain Name System: IP Addresses and Domain Names .......... 318 IV. Getting Stuck in the Web: Domain Name Registration
    [Show full text]
  • Fast-Flux Networks While Considering Domain-Name Parking
    Proceedings Learning from Authoritative Security Experiment Results LASER 2017 Arlington, VA, USA October 18-19, 2017 Proceedings of LASER 2017 Learning from Authoritative Security Experiment Results Arlington, VA, USA October 18–19, 2017 ©2017 by The USENIX Association All Rights Reserved This volume is published as a collective work. Rights to individual papers remain with the author or the author’s employer. Permission is granted for the noncommercial reproduction of the complete work for educational or research purposes. Permission is granted to print, primarily for one person’s exclusive use, a single copy of these Proceedings. USENIX acknowledges all trademarks herein. ISBN 978-1-931971-41-6 Table of Contents Program . .. v Organizing Committee . vi Program Committee . vi Workshop Sponsors . vii Message from the General Chair . viii Program Understanding Malware’s Network Behaviors using Fantasm . 1 Xiyue Deng, Hao Shi, and Jelena Mirkovic, USC/Information Sciences Institute Open-source Measurement of Fast-flux Networks While Considering Domain-name Parking . 13 Leigh B. Metcalf, Dan Ruef, and Jonathan M. Spring, Carnegie Mellon University Lessons Learned from Evaluating Eight Password Nudges in the Wild . 25 Karen Renaud and Joseph Maguire, University of Glasgow; Verena Zimmerman, TU Darmstadt; Steve Draper, University of Glasgow An Empirical Investigation of Security Fatigue: The Case of Password Choice after Solving a CAPTCHA . 39 Kovila P.L. Coopamootoo and Thomas Gross, Newcastle University; Muhammad F. R. Pratama Dead on Arrival: Recovering from Fatal Flaws in Email Encryption Tools . 49 Juan Ramón Ponce Mauriés, University College London; Kat Krol, University of Cambridge; Simon Parkin, Ruba Abu-Salma, and M.
    [Show full text]
  • Cybersquatting: Threat to Domain Name
    International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8, Issue- 6S4, April 2019 Cybersquatting: Threat to Domain Name Sukrut Deo, Sapna Deo Abstract— The present article deals with conflicts arising out cybersquatters use combination of illicit and legal work. The of registration of domain names of existing trade names with the end results in the legitimate owner suffering a huge loss. intention to resell it and/or encash the goodwill. Such practice is known as ‘Cybersquatting’. Registration of Domain names and METHODOLOGY acquiring a domain name of choice has become a rage over the time. It is the first come first get thing for getting registered. In The methodology opted by the researcher is “doctrinal”. this paper the researcher has explained what a cybersqatting is Such Doctrinal legal research has been carried out through alongwith various types of cybersquatting and its prevention and following sources such as International Treaties, Covenants targets. This paper also suggests remedial measures to deal with and Conventions; Constitutional Provisions; Information cybersquatting. The Anti Cybersquatting Consumer Protection Act (ACPA), an enactment by United States, needs a special Technology Act, 2000; Trademarks Act, 1999; Copyrights applaud for being the first country to have introduced a special Act, 1957; ICANN, WIPO, UNDRP etc.; Reported act for dealing with the menace of cybersquatting which was the decisions of the courts and Secondary Sources such as need of the hour. It so happens that people opt to buy the domain Commentaries and reference books; Journals; Magazines; name from squatters as it being cheap instead of seeking remedy Newspaper articles; Official Statistics; Internet sources.
    [Show full text]