Digging Deeper: An Analysis of Domain Impersonation in the Lower DNS Hierarchy

被引:1
|
作者
Quinkert, Florian [1 ]
Tatang, Dennis [1 ]
Holz, Thorsten [1 ]
机构
[1] Ruhr Univ Bochum, Bochum, Germany
来源
DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2021 | 2021年 / 12756卷
关键词
D O I
10.1007/978-3-030-80825-9_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attackers use various techniques to lure victims to malicious domains. A typical approach is to generate domains which look similar to well-known ones so that a confused victim is tricked into visiting the domain. An important attack technique in practice is the impersonation of domains in the lower DNS hierarchy as subdomains of otherwise unsuspiciously looking domains, such as paypal.com.foo.example.com. In this paper, we present an in-depth, empirical measurement study of low-level domain impersonations to understand their prevalence and provide a basis for the development of corresponding countermeasures. We introduce a generic measurement approach to find and analyze such domains in phishing feeds from three large anti-phishing vendors (PhishLabs, Phishtank, and OpenPhish) covering multiple years and a data set consisting of one and a half years of certificate transparency logs (CTL). In our measurement study, we discovered more than 122,000 cases of domain impersonations detected during the last seven years in PhishLabs, almost 3,000 in Phishtank, and a couple of hundred instances in OpenPhish. Additionally, we compared the usage of low-level domain impersonation with other well-known domain squatting techniques and find that low-level domain impersonation is among the most popular squatting techniques in the wild.
引用
收藏
页码:68 / 87
页数:20
相关论文
共 21 条
  • [1] Digging deeper: An analysis of cutting deeper levels on skin specimens
    Wilson, A. L.
    Watkin, W. G.
    MODERN PATHOLOGY, 2008, 21 : 360A - 361A
  • [2] Digging deeper: An analysis of cutting deeper levels on skin specimens
    Wilson, A. L.
    Watkin, W. G.
    LABORATORY INVESTIGATION, 2008, 88 : 360A - 361A
  • [3] Digging Deeper into the State of the Practice for Domain Specific Research Software
    Smith, Spencer
    Michalski, Peter
    COMPUTATIONAL SCIENCE, ICCS 2022, PT IV, 2022, : 545 - 559
  • [4] Digging Deeper: Operator Analysis for Optimizing Nonlinearity of Boolean Functions
    Durasevic, Marko
    Jakobovic, Domagoj
    Mariot, Luca
    Picek, Stjepan
    PROCEEDINGS OF THE 2023 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION, GECCO 2023 COMPANION, 2023, : 199 - 202
  • [5] An Update on Genetic Analysis of Cholestatic Liver Diseases: Digging Deeper
    Muellenbach, Roman
    Lammert, Frank
    DIGESTIVE DISEASES, 2011, 29 (01) : 72 - 77
  • [6] Analysis of the Similarities in Malicious DNS Domain Names
    Lasota, Krzysztof
    Kozakiewicz, Adam
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 187 : 1 - 6
  • [7] Digging Deeper into Data Breaches: An Exploratory Data Analysis of Hacking Breaches Over Time
    Hammouchi, Hicham
    Cherqi, Othmane
    Mezzour, Ghita
    Ghogho, Mounir
    El Koutbi, Mohammed
    10TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2019) / THE 2ND INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40 2019) / AFFILIATED WORKSHOPS, 2019, 151 : 1004 - 1009
  • [8] Meta-Analysis, Moderators, and Treatment Effectiveness: The Importance of Digging Deeper for Evidence of Program Integrity
    Shaffer, Deborah
    Pratt, Travis
    JOURNAL OF OFFENDER REHABILITATION, 2009, 48 (02) : 101 - 119
  • [9] Domain-based Latent Personal Analysis and its use for impersonation detection in social media
    Mokryn, Osnat
    Ben-Shoshan, Hagit
    USER MODELING AND USER-ADAPTED INTERACTION, 2021, 31 (04) : 785 - 828
  • [10] Analysis and Detection on Abused Wildcard Domain Names Based on DNS Logs
    Yu, Guangxi
    Zhang, Yan
    Cui, Huajun
    Yang, Xinghua
    Li, Yang
    Yang, Huiran
    COMPUTATIONAL SCIENCE - ICCS 2019, PT I, 2019, 11536 : 211 - 225