Yabo Wang , Jiakun Sun , Ruizhi Xiao , Weilong Li , Shuyuan Jin
{"title":"缓存潜望镜:通过DNS缓存深入了解恶意域的全球流行","authors":"Yabo Wang , Jiakun Sun , Ruizhi Xiao , Weilong Li , Shuyuan Jin","doi":"10.1016/j.comnet.2025.111245","DOIUrl":null,"url":null,"abstract":"<div><div>Domain names are often abused for various harmful and illegal activities. To mitigate these threats, security practitioners have proposed detecting malicious domains based on features such as domain name resolution data, semantic attributes, website appearance, and website correlations. Although these techniques have achieved notable results, they remain relatively passive in countering malicious activities. In this paper, we present a large-scale measurement study of the global epidemic of malicious domain names on open resolvers using cache probing techniques. We propose a modified probing method designed for large-scale domain access estimation. Leveraging this method, we examine the access patterns of malicious domains under open resolvers, which are widely deployed and utilized across the Internet, aiming to map the distribution of malicious activities based on the geographic location of open resolvers. Additionally, to the best of our knowledge, we are the first to propose using domain name top lists to estimate the volume of resolver users, which reflects the potential influence of a resolver. The weights of the estimated user volumes are further validated by real DNS traffic. By integrating these two methods, we evaluate the potential impact of malicious domains and conduct extensive measurements and analyses of malicious domain activities on open resolvers worldwide. Our findings reveal the regional distribution of malicious campaigns and provide insights into the global epidemic of malicious domains. Our measurement results demonstrate that practitioners can actively collect threat intelligence using the proposed techniques, gain insights into the current Internet threats, and implement more proactive measures to combat malicious campaigns.</div></div>","PeriodicalId":50637,"journal":{"name":"Computer Networks","volume":"265 ","pages":"Article 111245"},"PeriodicalIF":4.4000,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cache Periscope: Gain insights into the global epidemic of malicious domains through DNS Cache\",\"authors\":\"Yabo Wang , Jiakun Sun , Ruizhi Xiao , Weilong Li , Shuyuan Jin\",\"doi\":\"10.1016/j.comnet.2025.111245\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Domain names are often abused for various harmful and illegal activities. To mitigate these threats, security practitioners have proposed detecting malicious domains based on features such as domain name resolution data, semantic attributes, website appearance, and website correlations. Although these techniques have achieved notable results, they remain relatively passive in countering malicious activities. In this paper, we present a large-scale measurement study of the global epidemic of malicious domain names on open resolvers using cache probing techniques. We propose a modified probing method designed for large-scale domain access estimation. Leveraging this method, we examine the access patterns of malicious domains under open resolvers, which are widely deployed and utilized across the Internet, aiming to map the distribution of malicious activities based on the geographic location of open resolvers. Additionally, to the best of our knowledge, we are the first to propose using domain name top lists to estimate the volume of resolver users, which reflects the potential influence of a resolver. The weights of the estimated user volumes are further validated by real DNS traffic. By integrating these two methods, we evaluate the potential impact of malicious domains and conduct extensive measurements and analyses of malicious domain activities on open resolvers worldwide. Our findings reveal the regional distribution of malicious campaigns and provide insights into the global epidemic of malicious domains. Our measurement results demonstrate that practitioners can actively collect threat intelligence using the proposed techniques, gain insights into the current Internet threats, and implement more proactive measures to combat malicious campaigns.</div></div>\",\"PeriodicalId\":50637,\"journal\":{\"name\":\"Computer Networks\",\"volume\":\"265 \",\"pages\":\"Article 111245\"},\"PeriodicalIF\":4.4000,\"publicationDate\":\"2025-04-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1389128625002130\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Networks","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1389128625002130","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Cache Periscope: Gain insights into the global epidemic of malicious domains through DNS Cache
Domain names are often abused for various harmful and illegal activities. To mitigate these threats, security practitioners have proposed detecting malicious domains based on features such as domain name resolution data, semantic attributes, website appearance, and website correlations. Although these techniques have achieved notable results, they remain relatively passive in countering malicious activities. In this paper, we present a large-scale measurement study of the global epidemic of malicious domain names on open resolvers using cache probing techniques. We propose a modified probing method designed for large-scale domain access estimation. Leveraging this method, we examine the access patterns of malicious domains under open resolvers, which are widely deployed and utilized across the Internet, aiming to map the distribution of malicious activities based on the geographic location of open resolvers. Additionally, to the best of our knowledge, we are the first to propose using domain name top lists to estimate the volume of resolver users, which reflects the potential influence of a resolver. The weights of the estimated user volumes are further validated by real DNS traffic. By integrating these two methods, we evaluate the potential impact of malicious domains and conduct extensive measurements and analyses of malicious domain activities on open resolvers worldwide. Our findings reveal the regional distribution of malicious campaigns and provide insights into the global epidemic of malicious domains. Our measurement results demonstrate that practitioners can actively collect threat intelligence using the proposed techniques, gain insights into the current Internet threats, and implement more proactive measures to combat malicious campaigns.
期刊介绍:
Computer Networks is an international, archival journal providing a publication vehicle for complete coverage of all topics of interest to those involved in the computer communications networking area. The audience includes researchers, managers and operators of networks as well as designers and implementors. The Editorial Board will consider any material for publication that is of interest to those groups.