作者: Chaz Lever , Robert Walls , Yacin Nadji , David Dagon , Patrick McDaniel
DOI: 10.1109/SP.2016.47
关键词: Residual 、 Server 、 Internet privacy 、 Exploit 、 Computer science 、 Computer security 、 Domain Name System 、 Electronic mail 、 The Internet 、 Domain (software engineering) 、 Malware
摘要: Any individual that re-registers an expired domain implicitly inherits the residual trust associated with domain's prior use. We find adversaries can, and do, use malicious re-registration to exploit ownership changes -- undermining security of both users systems. In fact, we many seemingly disparate problems share a root cause in abuse. With this study shed light on unnoticed problem by measuring scope growth abuse over past six years. During time, identified 27,758 domains from public blacklists 238,279 resolved malware then were maliciously re-registered. To help address problem, propose technical remedy discuss several policy remedies. For former, develop Alembic, lightweight algorithm uses only passive observations Domain Name System (DNS) flag potential changes. identify instances using algorithm, including APT could be used revive existing infections.