Understanding the domain registration behavior of spammers

S. Hao, Matthew Thomas, V. Paxson, N. Feamster, C. Kreibich, Chris Grier, S. Hollenbeck
{"title":"Understanding the domain registration behavior of spammers","authors":"S. Hao, Matthew Thomas, V. Paxson, N. Feamster, C. Kreibich, Chris Grier, S. Hollenbeck","doi":"10.1145/2504730.2504753","DOIUrl":null,"url":null,"abstract":"Spammers register a tremendous number of domains to evade blacklisting and takedown efforts. Current techniques to detect such domains rely on crawling spam URLs or monitoring lookup traffic. Such detection techniques are only effective after the spammers have already launched their campaigns, and thus these countermeasures may only come into play after the spammer has already reaped significant benefits from the dissemination of large volumes of spam. In this paper we examine the registration process of such domains, with a particular eye towards features that might indicate that a given domain likely has a malicious purpose at registration time, before it is ever used for an attack. Our assessment includes exploring the characteristics of registrars, domain life cycles, registration bursts, and naming patterns. By investigating zone changes from the .com TLD over a 5-month period, we discover that spammers employ bulk registration, that they often re-use domains previously registered by others, and that they tend to register and host their domains over a small set of registrars. Our findings suggest steps that registries or registrars could use to frustrate the efforts of miscreants to acquire domains in bulk, ultimately reducing their agility for mounting large-scale attacks.","PeriodicalId":155913,"journal":{"name":"Proceedings of the 2013 conference on Internet measurement conference","volume":"47 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"99","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2013 conference on Internet measurement conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2504730.2504753","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 99

Abstract

Spammers register a tremendous number of domains to evade blacklisting and takedown efforts. Current techniques to detect such domains rely on crawling spam URLs or monitoring lookup traffic. Such detection techniques are only effective after the spammers have already launched their campaigns, and thus these countermeasures may only come into play after the spammer has already reaped significant benefits from the dissemination of large volumes of spam. In this paper we examine the registration process of such domains, with a particular eye towards features that might indicate that a given domain likely has a malicious purpose at registration time, before it is ever used for an attack. Our assessment includes exploring the characteristics of registrars, domain life cycles, registration bursts, and naming patterns. By investigating zone changes from the .com TLD over a 5-month period, we discover that spammers employ bulk registration, that they often re-use domains previously registered by others, and that they tend to register and host their domains over a small set of registrars. Our findings suggest steps that registries or registrars could use to frustrate the efforts of miscreants to acquire domains in bulk, ultimately reducing their agility for mounting large-scale attacks.
了解垃圾邮件发送者的域名注册行为
垃圾邮件发送者注册了大量域名,以逃避黑名单和删除工作。当前检测此类域的技术依赖于抓取垃圾url或监控查找流量。这些检测技术只有在垃圾邮件发送者已经发起了他们的活动之后才有效,因此这些对策可能只有在垃圾邮件发送者已经从大量垃圾邮件的传播中获得重大利益之后才会发挥作用。在本文中,我们研究了这些域名的注册过程,特别关注可能表明给定域名在注册时可能具有恶意目的的特征,然后才用于攻击。我们的评估包括探索注册商的特征、域名生命周期、注册爆发和命名模式。通过调查。com顶级域名在5个月内的区域变化,我们发现垃圾邮件发送者采用批量注册,他们经常重复使用其他人以前注册的域名,并且他们倾向于在一小部分注册商上注册和托管他们的域名。我们的研究结果表明,注册管理机构或注册服务机构可以采取措施,挫败不法分子大量获取域名的努力,最终降低他们发动大规模攻击的灵活性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信