Domain Names Abuse and Tlds:\\From Monetization Towards

Total Page:16

File Type:pdf, Size:1020Kb

Domain Names Abuse and Tlds:\\From Monetization Towards Domain names abuse and TLDs: from monetization towards mitigation Giovane C. M. Moura, Moritz Muller,¨ Marco Davids, Maarten Wullink, and Cristian Hesselman SIDN Labs Stichting Internet Domeinregistratie Nederland (SIDN) Arnhem, The Netherlands Email: {firstname.lastname}@sidn.nl Abstract—Hidden behind domain names, there are lucrative Domain Registration Domain Resolution (and ingenious) business models that misuse/abuse the DNS Authori- Registrar Zone tative DNS namespace and employ a diversified form of monetization. To Registrant Registry User / Reseller File Name Resolvers curb some of those abuses, many research works have been pro- Servers posed. However, while having a clear contribution and advancing the state-of-the-art, these works are constrained by their limited Active Scans datasets and none of them present a survey on the forms of DNS abuse. In this paper, we address these limitations by presenting a case study in one top-level domain (TLD) operator (.nl) with RegDB Records AuthDNS diverse longitudinal datasets. We then cover eight business models Datasets that DNS abusers employ and their respective monetization form, and discuss how TLD operators can employ these datasets to Fig. 1. TLD Operations: registration (left), domain name resolution (right), detect these forms of abuse. and derived datasets. I. INTRODUCTION Domain names have long been misused for different types of curb each form of abuse. The main contribution of this paper abuse: phishing, malware distribution, spamming, and botnet is, therefore, a survey of domain related abuses including their command-and-control (C&C) are just some of them. Underly- underlying business models, and a discussion on how TLD ing each of these forms of abuse, we find profitable business operators can use their datasets to mitigate them. models, which provide the incentives for these abusers to The remainder of this paper is divided as follows: we cover continue with such activities. the two basic services provided by TLDs (domain registration To curb such practices, the research community has been and name resolution) in §II. Then, we introduce in §III the active in proposing various solutions, such as [1], [2], [3], datasets we used . Following that, we present in §IV a survey [4], [5], [6]. While these works advance the state-of-the art on the types of DNS abuse and their underlying business and have a clear contribution, they are faced with two main models and their respective implications on the datasets. shortcomings: (i) they are constrained by type and/or duration Finally, conclusions and future work are discussed in §V. of their respectively available datasets (due to the difficulty in obtaining such datasets) and (ii) while these solutions cover II. BACKGROUND different sorts of abuse, we lack a survey on domain-related A. Domain Registration abuses, which leaves the question of how much ground has Domain registration consists of creating a unique domain not been covered yet unanswered. name that ultimately is added to the zone file of a DNS This paper addresses both issues: by carrying out a case zone. Typically, it involves the so-called triple-R: registrant, study on the top-level domain (TLD) of the Netherlands (.nl), registrar (or reseller), and registry (or TLD operator). Figure 1 we address the first issue by analyzing three longitudinal summarizes the process (left part). To register a domain in a datasets readily available to TLD operators ( III): historical § specific TLD, first a registrant (a user) choses a registrar (e.g: registration database (as opposed to hard-to-parse [7] and GoDaddy) that is accredited by the TLD of his/her choice. yet incomplete whois records), traffic to authoritative name Once the requirements of the registrar are fulfilled (personal servers (centralized view instead of DNS resolvers traffic), and data, payment), it contacts the registry and registers the the infrastructure used by the domains (obtained using DNS requested domain on behalf of the user1. Different registrars scans). have different registration interfaces, but the communications We address the second issue by presenting a survey on between the registrar and registry are typically performed domain abuses ( IV) and discuss their underlying business § using the Extensible Provisioning Protocol (EPP, RFC 5730). models and respective monetization methods. We demonstrate how they create patterns in our datasets, and discuss how TLD 1Some registries allow domain tasting, in which a user may try a domain operators [8] can leverage these to develop methods tailored to for a few days for free (domain tasting), but is not the case for .nl. 978-3-901882-89-0 @2017 IFIP 1077 Business Spam RegDB AuthDNS Records Lit Domains are registered for a certain period of time (de- Phishing(0-day) Yes Weak Strong Weak [3], [6] pending on the registry), and after expiration, they can enter Phishing(comp.) Yes None Strong Weak [17] Parking (Ads) No Strong Weak Strong [18], [19] a Redemption Grade Period (RGP), in which the former Parking (Mal) No Strong Weak Strong [18], [19] registrant can still renew the domain. After this period has Fake Goods Yes Weak Weak Medium [6], [20] expired, the domain is deleted and other registrants can register Drop-Catch No Medium Medium Weak [21] Botnet C&C No Medium Strong ? [22] it (this depends on the policy of the registry and .nl domains Blackhat SEO No Medium Medium Strong [23], [24] are made available after 40 days of the expiration date). TABLE I Each registry, in turn, maintains its own registration BUSINESS MODELS AND DATASETS/SIGNAL “STRENGTH”, AND database, which then is used to generate a Zone File (Figure 1) RESEARCH WORKS THAT COVER THOSE. that contains the list of all active and delegated domains sampled view (due to caching on the resolvers [13]) of all under the respective TLD and their respective DNS records. queries issued to .nl. Similarly to the registration database, Ultimately, the zone files are used as input files on the 2 researchers usually do not have access to this type of data – authoritative name servers for the particular TLD . These when they have it typically covers a snapshot of it. We, on the zone files are also frequently updated, and each TLD operator other hand, have been continuously storing this data since May chooses how often–.nl updates its zone files every hour. 2014. We use our open-source Hadoop-based ENTRADA [14] B. Domain Resolution to store and process this dataset. Records: last, .nl zone files contains information about all Domain name resolution consists of resolving a domain active domains, but not all the DNS records [11]. To obtain name into, ultimately, its IP addresses or other specific types such information and types of records, we utilize the daily of DNS records [11]. We summarize this process on the right scans (Figure 1) to our zone [15]. side of Figure 1. First a user attempts to access a web site Access to these datasets is regulated by our publicly avail- (e.g,: example.nl). The stub DNS resolver on his/her computer able data privacy framework that conforms to both EU and sends a DNS request to its DNS resolver, typically provided Dutch legislation [16]. We refer the interested reader to [8] for by the ISP. The DNS resolver, in turn, contacts one of the a discussion on a security and stability role of TLDs, including root.hints Root DNS servers [12] (as provided by file) to privacy management. obtain the authoritative name server for .nl. Then, it will send another request to one of the authoritative servers of .nl, which IV. MONETIZATION METHODS AND MITIGATION respond for example.nl. Caching on DNS resolvers [13] may eliminate some of these steps. Finally, the resolver responds How can one monetize using domain names? Answering to the user with the required DNS record. this question allows us to understand the underlying business models employed by domain name abusers. These business III. DATASETS AND TLDS VANTAGE POINT models vary significantly, leaving an, often distinctive, “trace” RegDB: at domain registration side (Figure 1), we have ac- on different types of data sets we discussed in §III, which can, cess to the historical database of .nl, which contains historical in turn, be used to mitigate such abuses. Table I summarizes information about registration and removal of domains from the relationship between commonly observed business models its respective zone files. We refer to this dataset as RegDB. and the three datasets we covered in §III, and whether they This dataset contains complete information about registrant use spam to advertise their domains. and registrar (and resellers, if applicable), as well as some There are, however, other business models that can be used of the DNS records of the respective domain (NS, DS, and to monetize on DNS – such as compromising a registrar or DNS glue [11]) for a period of 20+ years. Due to privacy registrant, hijacking a domain. However, we primarily focus reasons, TLDs do not share this information. However, they on abuses that we observe more often and discuss them in the make part of it available through a whois service, which is next subsections. typically what researchers outside TLDs rely upon. However, A. Phishing (0-day) this service has several shortcomings: incomplete data in comparison with RegDB, lack of historical data (only the Phishing is used to convince Internet users to “perform current status is shown), lack of a standard data format3(thus certain actions for the attacker’s benefit” [25]. Attackers use hard to parse [7]), and it is usually rate-limited (therefore hard phishing to steal banking/credit card/ID credentials, and may to perform analysis on large number of domains). use them themselves or re-sell them in bulk. AuthDNS: the other passive dataset is AuthDNS, which There are two types of phishing, from a TLD point-of- contains the incoming queries issued by resolvers to our .nl view: 0-day and compromised.
Recommended publications
  • Click Trajectories: End-To-End Analysis of the Spam Value Chain
    Click Trajectories: End-to-End Analysis of the Spam Value Chain ∗ ∗ ∗ ∗ z y Kirill Levchenko Andreas Pitsillidis Neha Chachra Brandon Enright Mark´ Felegyh´ azi´ Chris Grier ∗ ∗ † ∗ ∗ Tristan Halvorson Chris Kanich Christian Kreibich He Liu Damon McCoy † † ∗ ∗ Nicholas Weaver Vern Paxson Geoffrey M. Voelker Stefan Savage ∗ y Department of Computer Science and Engineering Computer Science Division University of California, San Diego University of California, Berkeley z International Computer Science Institute Laboratory of Cryptography and System Security (CrySyS) Berkeley, CA Budapest University of Technology and Economics Abstract—Spam-based advertising is a business. While it it is these very relationships that capture the structural has engendered both widespread antipathy and a multi-billion dependencies—and hence the potential weaknesses—within dollar anti-spam industry, it continues to exist because it fuels a the spam ecosystem’s business processes. Indeed, each profitable enterprise. We lack, however, a solid understanding of this enterprise’s full structure, and thus most anti-spam distinct path through this chain—registrar, name server, interventions focus on only one facet of the overall spam value hosting, affiliate program, payment processing, fulfillment— chain (e.g., spam filtering, URL blacklisting, site takedown). directly reflects an “entrepreneurial activity” by which the In this paper we present a holistic analysis that quantifies perpetrators muster capital investments and business rela- the full set of resources employed to monetize spam email— tionships to create value. Today we lack insight into even including naming, hosting, payment and fulfillment—using extensive measurements of three months of diverse spam data, the most basic characteristics of this activity. How many broad crawling of naming and hosting infrastructures, and organizations are complicit in the spam ecosystem? Which over 100 purchases from spam-advertised sites.
    [Show full text]
  • Passive Monitoring of DNS Anomalies Bojan Zdrnja1, Nevil Brownlee1, and Duane Wessels2
    Passive Monitoring of DNS Anomalies Bojan Zdrnja1, Nevil Brownlee1, and Duane Wessels2 1 University of Auckland, New Zealand, b.zdrnja,nevil @auckland.ac.nz { } 2 The Measurement Factory, Inc., [email protected] Abstract. We collected DNS responses at the University of Auckland Internet gateway in an SQL database, and analyzed them to detect un- usual behaviour. Our DNS response data have included typo squatter domains, fast flux domains and domains being (ab)used by spammers. We observe that current attempts to reduce spam have greatly increased the number of A records being resolved. We also observe that the data locality of DNS requests diminishes because of domains advertised in spam. 1 Introduction The Domain Name System (DNS) service is critical for the normal functioning of almost all Internet services. Although the Internet Protocol (IP) does not need DNS for operation, users need to distinguish machines by their names so the DNS protocol is needed to resolve names to IP addresses (and vice versa). The main requirements on the DNS are scalability and availability. The DNS name space is divided into multiple zones, which are a “variable depth tree” [1]. This way, a particular DNS server is authoritative only for its (own) zone, and each organization is given a specific zone in the DNS hierarchy. A complete domain name for a node is called a Fully Qualified Domain Name (FQDN). An FQDN defines a complete path for a domain name starting on the leaf (the host name) all the way to the root of the tree. Each node in the tree has its label that defines the zone.
    [Show full text]
  • Sidekick Suspicious Domain Classification in the .Nl Zone
    Master Thesis as part of the major in Security & Privacy at the EIT Digital Master School SIDekICk SuspIcious DomaIn Classification in the .nl Zone delivered by Moritz C. M¨uller [email protected] at the University of Twente 2015-07-31 Supervisors: Andreas Peter (University of Twente) Maarten Wullink (SIDN) Abstract The Domain Name System (DNS) plays a central role in the Internet. It allows the translation of human-readable domain names to (alpha-) numeric IP addresses in a fast and reliable manner. However, domain names not only allow Internet users to access benign services on the Internet but are used by hackers and other criminals as well, for example to host phishing campaigns, to distribute malware, and to coordinate botnets. Registry operators, which are managing top-level domains (TLD) like .com, .net or .nl, disapprove theses kinds of usage of their domain names because they could harm the reputation of their zone and would consequen- tially lead to loss of income and an insecure Internet as a whole. Up to today, only little research has been conducted with the intention to fight malicious domains from the view of a TLD registry. This master thesis focuses on the detection of malicious domain names for the .nl country code TLD. Therefore, we analyse the characteristics of known malicious .nl domains which have been used for phishing and by botnets. We confirm findings from previous research in .com and .net and evaluate novel characteristics including query patterns for domains in quar- antine and recursive resolver relations. Based on this analysis, we have developed a prototype of a detection system called SIDekICk.
    [Show full text]
  • Proactive Cyberfraud Detection Through Infrastructure Analysis
    PROACTIVE CYBERFRAUD DETECTION THROUGH INFRASTRUCTURE ANALYSIS Andrew J. Kalafut Submitted to the faculty of the Graduate School in partial fulfillment of the requirements for the degree Doctor of Philosophy in Computer Science Indiana University July 2010 Accepted by the Graduate Faculty, Indiana University, in partial fulfillment of the requirements of the degree of Doctor of Philosophy. Doctoral Minaxi Gupta, Ph.D. Committee (Principal Advisor) Steven Myers, Ph.D. Randall Bramley, Ph.D. July 19, 2010 Raquel Hill, Ph.D. ii Copyright c 2010 Andrew J. Kalafut ALL RIGHTS RESERVED iii To my family iv Acknowledgements I would first like to thank my advisor, Minaxi Gupta. Minaxi’s feedback on my research and writing have invariably resulted in improvements. Minaxi has always been supportive, encouraged me to do the best I possibly could, and has provided me many valuable opportunities to gain experience in areas of academic life beyond simply doing research. I would also like to thank the rest of my committee members, Raquel Hill, Steve Myers, and Randall Bramley, for their comments and advice on my research and writing, especially during my dissertation proposal. Much of the work in this dissertation could not have been done without the help of Rob Henderson and the rest of the systems staff. Rob has provided valuable data, and assisted in several other ways which have ensured my experiments have run as smoothly as possible. Several members of the departmental staff have been very helpful in many ways. Specifically, I would like to thank Debbie Canada, Sherry Kay, Ann Oxby, and Lucy Battersby.
    [Show full text]
  • I Wish to Thank the United States Department of Commerce's
    Comments from Danny Younger Introduction: I wish to thank the United States Department of Commerce’s National Telecommunications and Information Administration for this opportunity to comment on the continuation of the transition of the technical coordination and management of the Internet’s domain name and addressing system to the private sector. As a member of the public that has had the honor of serving as an elected Chair of the General Assembly of the Domain Name Supporting Organization of the Internet Corporation for Assigned Names and Numbers, I sincerely appreciate your posting of a Notice of Inquiry and wish to share with you my thoughts on the transition process as an individual that has tracked ICANN-related matters on a regular basis for the last six years. It has been said that “ICANN may not be the world’s most unpopular organization, but if it had consciously set out to make itself loathed it could hardly have been more successful.”1 I share that assessment. ICANN, the organization selected to embody the principles set forth in the White Paper2 is almost universally reviled. From my vantage point as a long-time ICANN participant, I have come to conclude that this passionate loathing has a single root cause: we detest ICANN because it has not remained true to the White Paper’s noble vision – rather than striving to become an organization committed to private, bottom-up coordination operating for the benefit of the Internet community as a whole, ICANN has chosen instead to focus its attention exclusively upon that select stakeholder community that feeds its coffers – it has become primarily a registry-registrar Guild Manager.
    [Show full text]
  • Fast-Flux Botnet Detection Based on Traffic Response and Search Engines Credit Worthiness
    ISSN 1330-3651 (Print), ISSN 1848-6339 (Online) https://doi.org/10.17559/TV-20161012115204 Original scientific paper Fast-Flux Botnet Detection Based on Traffic Response and Search Engines Credit Worthiness Davor CAFUTA, Vlado SRUK, Ivica DODIG Abstract: Botnets are considered as the primary threats on the Internet and there have been many research efforts to detect and mitigate them. Today, Botnet uses a DNS technique fast-flux to hide malware sites behind a constantly changing network of compromised hosts. This technique is similar to trustworthy Round Robin DNS technique and Content Delivery Network (CDN). In order to distinguish the normal network traffic from Botnets different techniques are developed with more or less success. The aim of this paper is to improve Botnet detection using an Intrusion Detection System (IDS) or router. A novel classification method for online Botnet detection based on DNS traffic features that distinguish Botnet from CDN based traffic is presented. Botnet features are classified according to the possibility of usage and implementation in an embedded system. Traffic response is analysed as a strong candidate for online detection. Its disadvantage lies in specific areas where CDN acts as a Botnet. A new feature based on search engine hits is proposed to improve the false positive detection. The experimental evaluations show that proposed classification could significantly improve Botnet detection. A procedure is suggested to implement such a system as a part of IDS. Keywords: Botnet; fast-flux; IDS 1 INTRODUCTION locations DoS attack against the web site becomes very difficult as it must be effective on every server in the field The Domain Name System (DNS) is a hierarchical [7, 8].
    [Show full text]
  • Outcomes Report of the GNSO Ad Hoc Group on Domain Tasting
    GNSO Outcomes Report on Domain Tasting Doc. No.: Date: 2007/02/04 4 October, 2007 OUTCOMES REPORT OF THE GNSO AD HOC GROUP ON DOMAIN NAME TASTING 4 October 2007 Group Chair: Mike Rodenbaugh ICANN Staff: Olof Nordling, Patrick Jones STATUS OF THIS DOCUMENT This is the final version of the Outcomes Report from the GNSO ad hoc group on Domain Name Tasting, submitted to the GNSO Council on 4 October, 2007. GNSO Outcomes Report on Domain Tasting v1.6 Authors: Mike Rodenbaugh, [email protected] , Olof Nordling, [email protected] , Patrick Jones, [email protected], Page 1 of 144 GNSO Outcomes Report on Domain Tasting Doc. No.: Date: 2007/02/04 4 October, 2007 TABLE OF CONTENTS 1 EXECUTIVE SUMMARY 3 2 OBJECTIVE 5 3 BACKGROUND 7 4 OUTCOMES 10 5 NEXT STEPS 32 ANNEX 1 - SUBSCRIBERS TO THE DT LIST 33 ANNEX 2 - RFI RESPONSES 34 ANNEX 3 - EXPERIENCES FROM CCTLDS 97 ANNEX 4 - COMMENTS FROM UDRP PROVIDERS 104 ANNEX 5 – IPC CONSTITUENCY SUPPLEMENTAL RFI116 ANNEX 6 – REQUEST TO VERISIGN 144 GNSO Outcomes Report on Domain Tasting v1.6 Authors: Mike Rodenbaugh, [email protected] , Olof Nordling, [email protected] , Patrick Jones, [email protected], Page 2 of 144 GNSO Outcomes Report on Domain Tasting Doc. No.: Date: 2007/02/04 4 October, 2007 1 Executive summary 1.1 Background Following a request from the At-Large Advisory Committee in spring 2007, the GNSO Council called for an Issues Report on Domain Tasting from ICANN Staff in May 2007. This Issues Report, available at http://gnso.icann.org/issues/domain- tasting/gnso-domain-tasting-report-14jun07.pdf was discussed at the ICANN San Juan meeting, where the GNSO Council on 27 June 2007 (minutes at http://gnso.icann.org/meetings/minutes-gnso-27jun07.shtml) resolved to establish an ad hoc group for further fact-finding on the practice of domain tasting.
    [Show full text]
  • The Secondary Market for Domain Names”, OECD Digital Economy Papers, No
    Please cite this paper as: OECD (2006-04-12), “The Secondary Market for Domain Names”, OECD Digital Economy Papers, No. 111, OECD Publishing, Paris. http://dx.doi.org/10.1787/231550251200 OECD Digital Economy Papers No. 111 The Secondary Market for Domain Names OECD Unclassified DSTI/ICCP/TISP(2005)9/FINAL Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 12-Apr-2006 ___________________________________________________________________________________________ _____________ English - Or. English DIRECTORATE FOR SCIENCE, TECHNOLOGY AND INDUSTRY COMMITTEE FOR INFORMATION, COMPUTER AND COMMUNICATIONS POLICY Unclassified DSTI/ICCP/TISP(2005)9/FINAL Working Party on Telecommunication and Information Services Policies THE SECONDARY MARKET FOR DOMAIN NAMES English - Or. English JT03207431 Document complet disponible sur OLIS dans son format d'origine Complete document available on OLIS in its original format DSTI/ICCP(2005)9/FINAL FOREWORD This report was presented to the Working Party on Telecommunications and Information Services Policies (TISP) in December 2005 and was declassified by the Committee for Information, Computer and Communications Policies (ICCP) in March 2006. This report was prepared by Ms. Karine Perset, with the participation of Mr. Dimitri Ypsilanti, both of the OECD's Directorate for Science, Technology and Industry. This report is published on the responsibility of the Secretary-General of the OECD. 2 DSTI/ICCP(2005)9/FINAL © OECD/OCDE 2006 3 DSTI/ICCP(2005)9/FINAL
    [Show full text]
  • From WHOIS to WHOWAS: a Large-Scale Measurement Study of Domain Registration Privacy Under the GDPR
    From WHOIS to WHOWAS: A Large-Scale Measurement Study of Domain Registration Privacy under the GDPR Chaoyi Lu∗†, Baojun Liu∗†¶B, Yiming Zhang∗†, Zhou Li§, Fenglu Zhang∗, Haixin Duan∗¶B, Ying Liu∗, Joann Qiongna Chen§, Jinjin LiangY, Zaifeng ZhangY, Shuang Hao∗∗ and Min Yang†† ∗Tsinghua University, †Beijing National Research Center for Information Science and Technology, flcy17, zhangyim17, zfl[email protected], flbj, [email protected], [email protected] §University of California, Irvine, fzhou.li, [email protected], ¶Qi An Xin Group, Y360 Netlab, fliangjinjin, [email protected], ∗∗University of Texas at Dallas, [email protected], ††Fudan University, m [email protected] Abstract—When a domain is registered, information about the [39], online advertising [55], [96], [103], [102] and usability registrants and other related personnel is recorded by WHOIS of privacy notices [104], [78], [79], [90], [50], [49], [27], [72]. databases owned by registrars or registries (called WHOIS providers jointly), which are open to public inquiries. However, Due to its broad scope, not only does the GDPR protect due to the enforcement of the European Union’s General Data normal users browsing websites, users setting up websites and Protection Regulation (GDPR), certain WHOIS data (i.e., the the associated infrastructure are also protected. One example records about EEA, or the European Economic Area, registrants) is domain registration. After a user registers a domain name, needs to be redacted before being released to the public. Anec- e.g., example.com, its sponsoring registrar and upper-stream dotally, it was reported that actions have been taken by some registry will store his/her personal information like name and WHOIS providers.
    [Show full text]
  • GNSO Final Report on Domain Tasting Date
    GNSO Final Report on Domain Tasting Date: 4 April 2008 GNSO Final Report on Domain Tasting STATUS OF THIS DOCUMENT This is the Final Report on the pending Domain Tasting Policy Development Process, prepared by ICANN staff for submission to the GNSO Council following public comments on the Initial Report of 7 January 2008 and draft Final Report of 8 February 2008. SUMMARY This report is submitted to the GNSO Council following public comments to the Initial Report and draft Final Report, as a required step in this GNSO Policy Development Process on Domain Tasting. Final Report on Domain Tasting Author:, Liz Gasster, [email protected] Page 1 of 83 GNSO Final Report on Domain Tasting Date: 4 April 2008 TABLE OF CONTENTS 1 EXECUTIVE SUMMARY 3 2 OBJECTIVE AND NEXT STEPS 9 3 BACKGROUND 10 4 DISCUSSION OF ISSUES 18 5 CONCLUSION 38 ANNEX 1 - CONSTITUENCY STATEMENTS 39 ANNEX 2 - UPDATED CONSTITUENCY STATEMENTS 72 Final Report on Domain Tasting Author:, Liz Gasster, [email protected] Page 2 of 83 GNSO Final Report on Domain Tasting Date: 4 April 2008 1 Executive summary The practice of domain tasting (using the add grace period to register domain names in order to test their profitability) has escalated significantly in the last two years. ICANN community stakeholders are increasingly concerned about the negative effects of domain tasting and in the spring of 2007 the At Large Advisory Committee (ALAC) asked that the domain tasting issue be studied further by the GNSO Council. The ALAC request enumerated five areas of potential concern for Internet users: 1.
    [Show full text]
  • Detection of Fast-Flux Networks Using Various DNS Feature Sets
    Detection of Fast-Flux Networks Using Various DNS Feature Sets Z. Berkay Celik and Serna Oktug Department of Computer Engineering Istanbul Technical University Maslak, Istanbul, Turkey 34469 { zbcelik,oktug}@itu.edu.tr Abstract-In this work, we study the detection of Fast-Flux imperfect, e.g., they may suffer from high detection latency Service Networks (FFSNs) using DNS (Domain Name System) (i.e., extracting features as a timescale greater than Time response packets. We have observed that current approaches do To Live (TTL), or multiple DNS lookups) or false positives not employ a large combination of DNS features to feed into detected by utilizing imperfect and insufficient features. the proposed detection systems. The lack of features may lead to high false positive or false negative rates triggered by benign The work presented here is related to the detection of activities including Content Distribution Networks (CDNs). In FFSNs, in particular, by jointly building timing, domain name, this paper, we study recently proposed detection frameworks to spatial, network and DNS answer features which are extracted construct a high-dimensional feature vector containing timing, network, spatial, domain name, and DNS response information. from the first DNS response packet. We consider many rather In the detection system, we strive to use features that are delay­ than a few features and also their combinations which are free, and lightweight in terms of storage and computational constructed by surveying the recent literature. The main aim of cost. Feature sub-spaces are evaluated using a C4.5 decision tree this survey is to study and analyze the benefits of the features classifier by excluding redundant features using the information and also, in some cases, the necessity of applying joint feature gain of each feature with respect to each class.
    [Show full text]
  • Intellectual Property Interests Constituency Constituency Statement on Domain Name Tasting December 5, 2007
    Intellectual Property Interests Constituency Constituency Statement on Domain Name Tasting December 5, 2007 Pursuant to GNSO Council Resolution 20071031-2, the Intellectual Property Interests Constituency (“IPC”) submits this Constituency Statement on Domain Tasting. The IPC arrived at the positions below in accordance with the requirements of the GNSO Policy Development Process as outlined in the ICANN bylaws. These positions incorporate by reference Section 4.3 of the Outcomes Report of the GNSO Ad Hoc Group on Domain Tasting, October 4, 2007 (hereinafter “Outcomes Report”), and Annex 5 thereto. I. Constituency Position A. Domain Tasting Harms Intellectual Property Rights Holders 1. Domain tasting harms holders of intellectual property (“IP”) rights (“IPR”) when, as is often the case, the tasted domain names (“tasted names”) are anticipated typographical errors of trademarks. A recent report by McAfee, Inc. characterizes domain tasting as one of the most significant factors in the recent growth in typosquatting. What’s In a Name: The State of Typosquatting 2007, available at http://us.mcafee.com/root/identitytheft.asp?id=safe_typo&cid=38296#WhatIsDriving. Domain tasting that is also typosquatting causes consumer confusion, erodes brands, and harms the goodwill represented by those brands. See Outcomes Report, page 14 and Annex 2. 2. Domain tasting prevents IPR holders from registering and using for legitimate purposes the tasted domain names ("tasted names"). Outcomes Report, pages 18-19. 3. Large IPR holders and those that own famous or well-known brands are more likely to have their brands/marks be the subject of tasted names. Consequently, they are more likely to incur the greatest costs in preventing and taking action against domain tasting involving typosquatting.
    [Show full text]