Understanding the domain registration behavior of spammers

  • Authors:
  • Shuang Hao;Matthew Thomas;Vern Paxson;Nick Feamster;Christian Kreibich;Chris Grier;Scott Hollenbeck

  • Affiliations:
  • Georgia Tech, Atlanta, GA, USA;Verisign, Inc., Reston, VA, USA;ICSI & UC Berkeley, Berkeley, CA, USA;Georgia Tech, Atlanta, GA, USA;ICSI & Lastline, Inc., Berkeley, CA, USA;ICSI & UC Berkeley, Berkeley, CA, USA;Verisign, Inc., Reston, VA, USA

  • Venue:
  • Proceedings of the 2013 conference on Internet measurement conference
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Spammers register a tremendous number of domains to evade blacklisting and takedown efforts. Current techniques to detect such domains rely on crawling spam URLs or monitoring lookup traffic. Such detection techniques are only effective after the spammers have already launched their campaigns, and thus these countermeasures may only come into play after the spammer has already reaped significant benefits from the dissemination of large volumes of spam. In this paper we examine the registration process of such domains, with a particular eye towards features that might indicate that a given domain likely has a malicious purpose at registration time, before it is ever used for an attack. Our assessment includes exploring the characteristics of registrars, domain life cycles, registration bursts, and naming patterns. By investigating zone changes from the .com TLD over a 5-month period, we discover that spammers employ bulk registration, that they often re-use domains previously registered by others, and that they tend to register and host their domains over a small set of registrars. Our findings suggest steps that registries or registrars could use to frustrate the efforts of miscreants to acquire domains in bulk, ultimately reducing their agility for mounting large-scale attacks.