On the Effects of Registrar-level Intervention
|
|
- Egbert Lloyd
- 5 years ago
- Views:
Transcription
1 On the Effects of Registrar-level Intervention He (Lonnie) Liu Kirill Levchenko Geoffrey M. Voelker Stefan Savage UC San Diego Mark Felegyhazi Christian Kreibich UC Berkeley ICSI 1
2 Spam 2
3 Spam Infrastructure Mail address harvesting Botnet mail senders Domain names Proxies and redirections Web hosting etc. 3
4 Spam Infrastructure Mail address harvesting Botnet mail senders Domain names Proxies and redirections Web hosting etc. 4
5 Spam 5
6 Domain Name System (DNS) (root) Registries.com.net.cn.ru.au Registrars enom GoDaddy Tucows Authoritative Name Servers ns1.buyrxpills.com ns2.buyrpills.com End User Recursive Name Servers ns.ucsd.edu buyrxpills.com=? 6
7 Domain Name System (DNS) (root) Registries.com.net.cn.ru.au Registrars enom GoDaddy Tucows Authoritative Name Servers ns1.buyrxpills.com ns2.buyrpills.com Recursive Name Servers Blacklists ns.ucsd.edu End User buyrxpills.com is bad! buyrxpills.com=? 7
8 Domain Name System (DNS) (root) Registries.com.net.cn.ru.au Registrars enom GoDaddy Tucows Authoritative Name Servers ns1.buyrxpills.com ns2.buyrpills.com Take downs Recursive Name Servers ns.ucsd.edu End User buyrxpills.com=? 8
9 Domain Name System (DNS) Increase Price Take downs (root) Registries.com.net.cn.ru.au Registrars enom GoDaddy Tucows Authoritative Name Servers ns1.buyrxpills.com ns2.buyrpills.com End User Recursive Name Servers ns.ucsd.edu buyrxpills.com=? 9
10 Two Registration Policy Changes
11 Two Registration Policy Changes Dec cn
12 Two Registration Policy Changes 2008 Dec Sep cn
13 Our Approach Collect spam domains from spam feeds Track DNS name server activities Zone files Track registration info WHOIS, DomainTools.com (historic WHOIS service) Tagged pharmacy domains Click Trajectory (Oakland 11) 13
14 December, 2009.cn 14
15 Cost of a.cn Domain = (15 cents) 15
16 Cost of a.cn Domain = (15 cents) 16
17 Cost of a.cn Domain business license (photocopy) (15 cents) 17
18 Cost of a.cn Domain registrant id (photocopy) business license (photocopy) (15 cents) 18
19 Cost of a.cn Domain registrant id (photocopy) Dec 14, 2009 business license (photocopy) (15 cents) 19
20 Cost of a.cn Domain Dec 14, 2009 = (15 cents) 20
21 Cost of a.cn Domain Dec 14, 2009 = (15 cents) = (10 dollars) 21
22 Cost of a.cn Domain Dec 14, 2009 = (15 cents) = +6800% (10 dollars) 22
23 New Created Domains New Spam Advertised New Blacklisted 23
24 New Created Domains New Spam Advertised New Blacklisted 24
25 New Created Domains New Spam Advertised New Blacklisted 25
26 CNNIC Policy Change Spam domains are sensitive to prices Spammers abandoned.cn domains And start using.ru domains instead Quickly adapted the changes 26
27 September 21,
28 September 21, 2010 Internet Pharmacy Verification & Enforcement 28
29 September 21, 2010 Internet Pharmacy Verification & Enforcement 29
30 September 21, 2010 Illegal Online Pharmacy to Identify Customers 30
31 September 21, 2010 Illegal Online Pharmacy to Identify Customers 31
32 September 21, 2010 Illegal Online clienthold Pharmacy to Identify Customers the domain will remain on hold and may not be transferred 32
33 Number of domains put to clienthold State clientheld enom.com Domains 33
34 Number of domains put to clienthold State clientheld enom.com Domains drug, pill pill, rx rx, viagra viagra 34
35 Global Impact 14,268.com pharmacy domains From our spam feeds, identified by webpage contents 35
36 Global Impact 1,223 enom (9%) 14,268.com pharmacy domains 36
37 Global Impact 1,223 enom (9%) 14,268.com pharmacy domains ClientHold (67%) Removed from zone file (5%) Still active(16%) Transferred (12%) 37
38 Global Impact 1,223 enom (9%) 14,268.com pharmacy domains ClientHold (67%) Removed from zone file (5%) Still active(16%) Transferred (12%) 38
39 LegitScript - enom Agreement Noticeable effects on enom domains domains put to clienthold Scammers transferred to other registrars The scale limits the global effects 9% affected 39
40 Discussion: Defend at Registrar Level Economic way: increase the price (CNNIC) Significant effect, but alternatives available Affects all.cn users, including legal ones Social way: take down domains (LegitScript) Similar to other takedowns, effects depends on scale and speed 40
41 Questions & Comments Thank you 41
On the Effects of Registrar-level Intervention
On the Effects of Registrar-level Intervention He (Lonnie) Liu Kirill Levchenko Mark Felegyhazi Christian Kreibich Gregor Maier Geoffrey M. Voelker Stefan Savage Dept. of Computer Science and Engineering
More informationNo Plan Survives Contact
No Plan Survives Contact Experience with Cybercrime Measurement Chris Kanich Neha Chachra Damon McCoy Chris Grier David Wang Marti Motoyama Kirill Levchenko Stefan Savage Geoffrey M. Voelker UC San Diego
More informationUnderground economy. Economics of Security and Privacy (BMEVIHIAV15) Mark Felegyhazi. assistant professor CrySyS Lab.
Underground economy Economics of Security and Privacy (BMEVIHIAV15) Mark Felegyhazi assistant professor CrySyS Lab. Underground economy BME Department of Telecommunications (Híradástechnikai Tanszék) mfelegyhazi(atat)crysys(dot)hu
More informationIntermediaries and regulation
Intermediaries and regulation Economics of Security and Privacy (BMEVIHIAV15) Mark Felegyhazi assistant professor CrySyS Lab. Intermediaries and regulation BME Department of Telecommunications (Híradástechnikai
More informationUpdate on Whois Studies
Update on Whois Studies 1 1 Current Status Final GNSO-commissioned Whois studies now completed, awaiting public comment Whois Privacy & Proxy Abuse Study Performed by National Physical Laboratory, UK Public
More informationSURBL-Listed Domains And Their Registrars (In Just Seven or Eight Minutes)
SURBL-Listed Domains And Their Registrars (In Just Seven or Eight Minutes) Joe St Sauver, Ph.D. (joe@uoregon.edu or joe@internet2.edu) Forum on DNS Abuse Grand Ballroom, 14 Mar 2011 11:30-13:00 ICANN 40,
More informationUnderstanding the Domain Registration Behavior of Spammers
Understanding the Domain Registration Behavior of Spammers Shuang Hao Georgia Tech shao@cc.gatech.edu Nick Feamster Georgia Tech feamster@cc.gatech.edu Matthew Thomas Verisign, Inc. mthomas@verisign.com
More informationDetecting Malicious URLs. Justin Ma, Lawrence Saul, Stefan Savage, Geoff Voelker. Presented by Gaspar Modelo-Howard September 29, 2010.
Detecting Malicious URLs Justin Ma, Lawrence Saul, Stefan Savage, Geoff Voelker Presented by Gaspar Modelo-Howard September 29, 2010 Publications Justin Ma, Lawrence K. Saul, Stefan Savage, and Geoffrey
More information.rio Registration Policies 2016 Dec 16
.rio Registration Policies 2016 Dec 16 Empresa Municipal de Informática SA [IPLANRIO], the registry for.rio domains, requires all registrants to abide by the policies detailed below or any successor policy
More informationin the Early 1980s
1 Email in the Early 1980s sender Network 1 Mail relay Network 2 Mail relay Network 3 Mail relay: forwards mail to next hop Sender path includes path through relays recipient 2 1 Email Spoofing Email messages
More informationDNS Abuse Handling. FIRST TC Noumea New Caledonia. Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific
DNS Abuse Handling FIRST TC Noumea New Caledonia Champika Wijayatunga Regional Security, Stability and Resiliency Engagement Manager Asia Pacific 10 September 2018 1 The Domain Name System (DNS) The root
More informationIs the WHOIS service a source for addresses for spammers?
Is the WHOIS service a source for email addresses for spammers? SSAC Meeting 25 June 2007 rmohan@afilias.info - Ram Mohan dave.piscitello@icann.org - Dave Piscitello Objectives Study the correlation between
More informationDNS Firewall with Response Policy Zone. Suman Kumar Saha bdcert Amber IT Limited
DNS Firewall with Response Policy Zone Suman Kumar Saha bdcert suman@bdcert.org Amber IT Limited suman@amberit.com.bd DNS Response Policy Zone(RPZ) as Firewall RPZ allows a recursive server to control
More informationHow The Pursuit of Truth Led Me To Selling Viagra
How The Pursuit of Truth Led Me To Selling Viagra Vern Paxson EECS Department, University of California International Computer Science Institute Lawrence Berkeley National Laboratory Berkeley, California
More informationTucows Guide to the GDPR. March 2018
Tucows Guide to the GDPR March 2018 About This Webinar Who is this webinar for? Resellers of Tucows services Familiar with the domain world and ICANN policy Familiar with our blog posts What are we doing
More informationThe Domain Abuse Activity Reporting System (DAAR)
The Domain Abuse Activity Reporting System (DAAR) Dave Piscitello APWG EU October 2017 The Domain Abuse Activity Reporting system What is the Domain Abuse Activity Reporting system? A system for reporting
More informationDetecting Abuse in TLDs
Detecting Abuse in TLDs A NameSentry TM presentation by Greg Aaron and Michael Young ICANN Toronto: 15 October 2012 2012 Illumintel Inc. All rights reserved. 1 Defining Abuse Every service provider has
More informationReport on Spamvertising and Phishing using.hk Domain Names and McAfee Report. ccnso Meeting June 24, 2008
Report on Spamvertising and Phishing using.hk Domain Names and McAfee Report ccnso Meeting June 24, 2008 Agenda Introduction of HKIRC/HKDNR and.hk Domain Figure of Phishing and Spamvertising Common Patterns
More informationSearchable WHOIS Terms of Use
Searchable WHOIS Terms of Use 1. Grant 1.1. You may use the Searchable WHOIS subject to these terms and conditions, including the Searchable WHOIS Acceptable Use Policy set out in Schedule 3. 2. Limits
More informationUC San Diego UC San Diego Electronic Theses and Dissertations
UC San Diego UC San Diego Electronic Theses and Dissertations Title Understanding URL Abuse for Profit Permalink https://escholarship.org/uc/item/7nw0f6bf Author Chachra, Neha Publication Date 2015-01-01
More informationFixing URL-based Redirect Errors for AWS Route 53 and S3
Fixing URL-based Redirect Errors for AWS Route 53 and S3 Many of the typical DNS providers offer what we call URL-based redirects. This is something where a 301 HTTP response is applied to the DNS query
More informationEvaluation of Spam Advertised Domains
Technische Universität Berlin Fakultät IV, Elektrotechnik und Informatik FG Intelligente Netze Evaluation of Spam Advertised Domains Student Project WS2011/2012 Report Written By Hannes Fiedler, Eric Klieme
More informationDNS Risk Framework Update
Text Text 14 October 2014 DNS Risk Framework Update John Crain & Jacks Khawaja Chief SSR Officer; Enterprise Risk Director Agenda Text History Moving Forward Text History Defined Resiliency Model Text
More informationWhois Study Table Updated 18 February 2009
Whois Study Table Updated 18 February 2009 This table is based on the chart included in the WHOIS Hypothesis Report of 26 August 2008, amended to show related or overlapping studies clustered into letter
More informationUpdate on GNSOrequested. Studies. Liz Gasster Senior Policy Counselor ICANN. 14 March 2012
Update on GNSOrequested WHOIS Studies Liz Gasster Senior Policy Counselor ICANN 14 March 2012 1 gtld WHOIS Studies - Goals WHOIS policy debated for many years GNSO Council decided in October 2007 that
More informationSecurity by Any Other Name:
Security by Any Other Name: On the Effectiveness of Provider Based Email Security Ian Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, and Kirill Levchenko University of California, San
More informationCo-operation with Law Enforcement Agencies in South Africa. 19 September 2008
Co-operation with Law Enforcement Agencies in South Africa 19 September 2008 Agenda About ISPA IMPACT Is cyber-terrorism real? Content and DNS People trafficking Training Is this a bad thing for ISPs?
More informationDistributed-Application Security
Distributed-Application Security Spam Spams Spam referred to unsolicited bulk email Spam emails contain advertisement, viruses, malware Spams emails are used to gather information about the victim Harvesting
More informationLEA Workshop. Champika Wijayatunga & George Kuo, APNIC Wellington, New Zealand 09, May, 2013
LEA Workshop Champika Wijayatunga & George Kuo, APNIC Wellington, New Zealand 09, May, 2013 Agenda Introduction to APNIC Know about APNIC Internet Policy Development How the Internet Policies are developed
More informationPURL Campaign External Domain Quick Reference Guide
PURL Campaign External Domain Quick Reference Guide Boingnet PURL campaigns have support for two types of domains. 1. Vanity domains that are obtained directly through Boingnet s interface. These domains
More informationIntellectual Property Constituency (IPC)
Contractual Compliance Intellectual Property Constituency (IPC) Tuesday, 14 October 2014 Agenda Registrar Related Update since ICANN 50 Registry Related Update since ICANN 50 Audit Programs Update Questions
More informationICANN Update: What Next for Trademark Owners? 22 nd Annual Fordham Int l IP Law & Policy Conference 25 April 2014
ICANN Update: What Next for Trademark Owners? 22 nd Annual Fordham Int l IP Law & Policy Conference 25 April 2014 Myths, Misconceptions & Misinformation about the Recent US Government Announcement It s
More informationBriefing on Handling of Phishing Websites in November 2017
Briefing on Handling of Phishing Websites in Secretariat of APAC December 2017 Contents 1 Overview... 3 2 Analysis of Handling Types... 3 2.1 Sources of reports about phishing websites... 3 2.2 Distribution
More informationDNS. A Massively Distributed Database. Justin Scott December 12, 2018
DNS A Massively Distributed Database Justin Scott December 12, 2018 What is DNS? Translates Hostnames to IP Addresses What is DNS? Example: www.serverlogic.com 23.185.0.4 What is DNS? Example: www.serverlogic.com
More informationAPNIC s role in stability and security. Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013
APNIC s role in stability and security Adam Gosling Senior Policy Specialist, APNIC 4th APT Cybersecurity Forum, 3-5 December 2013 Overview Introducing APNIC Working with LEAs The APNIC Whois Database
More informationMonitoring the Initial DNS Behavior of Malicious Domains
Monitoring the Initial DNS Behavior of Malicious Domains Shuang Hao Georgia Tech Atlanta, GA, USA shao@cc.gatech.edu Nick Feamster Georgia Tech Atlanta, GA, USA feamster@cc.gatech.edu Ramakant Pandrangi
More informationImplementing DNSSEC with DynDNS and GoDaddy
Implementing DNSSEC with DynDNS and GoDaddy Lawrence E. Hughes Sixscape Communications 27 December 2017 DNSSEC is an IETF standard for adding security to the DNS system, by digitally signing every resource
More informationPrivacy and Proxy Service Provider Accreditation. ICANN58 Working Meeting 11 March 2017
Privacy and Proxy Service Provider Accreditation ICANN58 Working Meeting 11 March 2017 Agenda 13:45-15:00 15:00-15:15 15:15-16:45 Timeline Check; Policy Document Update; Third- Party Requests Break PSWG
More informationThe role of phone numbers in understanding cyber-crime
The role of phone numbers in understanding cyber-crime A. J. Isachenkova M. Balduzzi + A. Francillon D. Balzarotti Eurecom, Sophia Antipolis, France + Trend Micro Research, EMEA July 11, 2013 1/34 Introduction
More informationICANN Contractual Compliance. IPC Mee(ng. Tuesday, 25 March 2014 #ICANN49
ICANN Contractual Compliance IPC Mee(ng Tuesday, 25 March 2014 1 Agenda! Compliance General Update! Q&A session! Contractual Compliance Update! Ø Global presence in Singapore and Turkey" Ø Completed 2013
More informations and Anti-spam
E-mails and Anti-spam Standard authentication AUTH method As the spammers become increasing aggressive more and more legit emails get banned as spam. When you send e-mails from your webcrm system, we use
More informationMalware, , Database Security
Malware, E-mail, Database Security Malware A general term for all kinds of software with a malign purpose Viruses, Trojan horses, worms etc. Created on purpose Can Prevent correct use of resources (DoS)
More informationCase studies in global criminal attacks: McColo & CheckFreea
Case studies in global criminal attacks: McColo & CheckFreea Rod Rasmussen, President & CTO Internet Identity, APWG Industry Liaison E Crime and Abuse of the DNS Forum: Session 2. Criminal Attacks & Abuse
More informationECE 435 Network Engineering Lecture 7
ECE 435 Network Engineering Lecture 7 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 25 September 2018 HW#3 was Posted Announcements 1 HW#2 Review C code will be discussed next
More informationSummary. January 31, Jo Lim. Chief Operations and Policy Officer. Dear Jo,
January 31, 2014 Jo Lim Chief Operations and Policy Officer Dear Jo, Thanks for the opportunity to make a submission to the auda Whois Issues Paper 2013. The views expressed in this submission are held
More informationICANN Contractual Compliance. ALAC Mee(ng. Sunday, 23 March 2014 #ICANN49
ICANN Contractual Compliance ALAC Mee(ng Sunday, 23 March 2014 1 Agenda! Compliance General Update! Clarification of ALAC statement! Q&A session! Contractual Compliance Update! Ø Global presence in Singapore"
More informationACCEPTABLE USE AND TAKEDOWN POLICY. Version 1.0
ACCEPTABLE USE AND TAKEDOWN POLICY Version 1.0 ("Acceptable Use Policy") What is in the Acceptable Use Policy? As the owner of a domain name, you are required to act responsibly in your use of that domain
More informationUC San Diego UC San Diego Electronic Theses and Dissertations
UC San Diego UC San Diego Electronic Theses and Dissertations Title An Exploration of the Identifying Characteristics of Spam Campaign Address Lists Permalink https://escholarship.org/uc/item/05z017qc
More informationInter-registrar Domain Name Transfers Process Description & Overview - Proposal Draft -
Inter-registrar Domain Name Transfers Process Description & Overview - Proposal Draft - V1r0d0 08-20-2001 prepared by Table of Contents Table of Contents 2 Summary 3 Principles 4 Gaining Registrar Processes
More informationBotnets: major players in the shadows. Author Sébastien GOUTAL Chief Science Officer
Botnets: major players in the shadows Author Sébastien GOUTAL Chief Science Officer Table of contents Introduction... 3 Birth of a botnet... 4 Life of a botnet... 5 Death of a botnet... 8 Introduction
More informationIdentifier Technology Health Indicators (ITHI) Alain Durand, Christian Huitema 13 March 2018
Identifier Technology Health Indicators (ITHI) Alain Durand, Christian Huitema 13 March 2018 ITHI Principles of Operation Technical focus Problem areas à Metrics à Measurement Current value and trend over
More informationNetwork Security Detection With Data Analytics (PREDATOR)
CIS-601 Graduate Seminar Network Security Detection With Data Analytics (PREDATOR) PRESENTED BY :RAJAN SHARMA CSU ID: 2659829 GUIDED BY : Dr. SUNNIE CHUNG Overview Introduction Feature Extraction and Machine
More informationAnti-Phishing Working Group
Anti-Phishing Working Group www.antiphishing.org DNS Policy Sub-Committee Overview Rod Rasmussen Rod.Rasmussen@InternetIdentity.com Anti-Phishing Working Group Launched in 2003 2600+ members 1600+ companies
More informationLuminous: Bringing Big(ger) Data to the Fight
Luminous: Bringing Big(ger) Data to the Fight Norm Ritchie Drew Bagley ICANN Helsinki June, 2016 Secure Domain Foundation Non-profit Founded in 2014 Proactive mitigation of malicious domains used for cybercrime
More informationOnboard with GoDaddy Questionnaire
Onboard with GoDaddy Questionnaire Please answer the questions below for each of your TLDs, choosing from the response options noted to the right of the question and adding additional detail where reques
More informationBEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE
BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE 12-07-2016 BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE Your external DNS is a mission critical business resource.
More informationTRANSMITTED VIA ELECTRONIC MAIL, FACSIMILE, AND COURIER RE: NOTICE OF BREACH OF REGISTRAR ACCREDITATION AGREEMENT
12 October 2016 TRANSMITTED VIA ELECTRONIC MAIL, FACSIMILE, AND COURIER Stefan Hansmann (IANA #953) 18 Mai Yao Road Office 541 Building 7, Xian Zong Lin Yuan Nanjing Jiangsu 210000 China Email: stefan@domainerschoice.com
More informationOptimal Gateway Selection for Pulse Connect Secure with Pulse Secure Virtual Traffic Manager
Optimal Gateway Selection for Pulse Connect Secure with Pulse Secure Virtual Traffic Manager Deployment Guide Published 14 December, 2017 Document Version 1.0 Optimal Gateway Selection for Pulse Connect
More informationEthical Hacking and. Version 6. Spamming
Ethical Hacking and Countermeasures Version 6 Module XL Spamming News Source: http://www.nzherald.co.nz/ Module Objective This module will familiarize you with: Spamming Techniques used by Spammers How
More informationHOW WHOIS DATA ENSURES A SAFE AND SECURE INTERNET
HOW WHOIS DATA ENSURES A SAFE AND SECURE INTERNET A DETAILED LOOK AT HOW PUBLIC DOMAIN OWNERSHIP DATA DRIVES THREE ESSENTIAL CYBERSECURITY WORKFLOWS INTRODUCTION Each year, millions of individuals, businesses,
More informationDNS. Introduction To. everything you never wanted to know about IP directory services
Introduction To DNS everything you never wanted to know about IP directory services Linux Users Victoria, April 3 rd 2007 what is the domain name system anyway? it's like a phone book...kinda DNS is (1)
More informationA blind spot in your daily malware distribution feed.
A blind spot in your daily malware distribution feed. By Andriy Brukhovetskyy aka @d00m3dr4v3n 1 WhoAmI? Andriy Brukhovetskyy Senior Security Researcher at FireEye isight Intelligence Member of CW, II,
More informationTHIS AGREEMENT HAS A PROVISION FOR ARBITRATION OF DISPUTES BETWEEN THE PARTIES.
THIS AGREEMENT HAS A PROVISION FOR ARBITRATION OF DISPUTES BETWEEN THE PARTIES. This Registration Agreement ("Agreement") sets forth the terms and conditions of your use of domain name registration and
More informationContractual Compliance Update ICANN 52 February 2015
Contractual Compliance Update ICANN 52 February 2015 Agenda Update Since ICANN 51 Lessons Learned Summary Questions and Answers 3 General Update since ICANN 51 Year-three Audit Program launched in October
More informationRDAP: A Primer on the Registration Data Access Protocol
RDAP: A Primer on the Registration Data Access Protocol Andy Newton, Chief Engineer, ARIN Registration Operations Workshop IETF 93 Prague, CZ 19 July 2015 Background WHOIS (Port 43) Old, very old Lot s
More informationRegistrar Stakeholder Mee2ng Tuesday, 25 March 2014
ICANN Contractual Compliance Registrar Stakeholder Mee2ng Tuesday, 25 March 2014 1 Agenda! + General Update + 2013 RAA Discussion and Clarification + Question Answer Session 2 Contractual Compliance Update!
More informationDomain Name Service. DNS Overview. October 2009 Computer Networking 1
Domain Name Service DNS Overview October 2009 Computer Networking 1 Why DNS? Addresses are used to locate objects (contain routing information) Names are easier to remember and use than numbers DNS provides
More informationDOMAIN NAMES. Manage Domains
DOMAIN NAMES Manage Domains The Manage Domains page displays a list of your registered domain names. All domain purchases are automatically renewed at the end of their registration period, unless you instruct
More informationSummary of Public Suggestions on Further Studies of WHOIS including the GAC recommendations of 16 April Updated 10 May 2008
Summary of Public Suggestions on Further Studies of WHOIS including the GAC recommendations of 16 April Updated 10 May 2008 Study submissions have been divided into eight recommended areas, as follows:
More informationKnock It Off: Profiling the Online Storefronts of Counterfeit Merchandise
Knock It Off: Profiling the Online Storefronts of Counterfeit Merchandise Matthew F. Der, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker Department of Computer Science and Engineering University
More informationEARLY DETECTION OF SPAM-RELATED ACTIVITY
EARLY DETECTION OF SPAM-RELATED ACTIVITY A Thesis Presented to The Academic Faculty by Shuang Hao In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the School of Computer
More informationGross Profit by Prescription Report
................................................................................................... Gross Profit by Prescription Report Pharmacy Technology Solutions May, 2013 Reports: Gross Profit by
More informationCountermeasures against Mobile spam
8 July, 2004 Countermeasures against Mobile spam ~ Legislation and Self-regulation ~ Toshihiko SHIBUYA, Deputy Director Telecommunications Consumer Policy Division, Telecommunications Bureau, Ministry
More informationAdvanced Filtering. Tobias Eggendorfer
Advanced Filtering Advanced Filtering Fails Too Overview Not so advanced Filtering Advanced Filtering Prevention Identification 2 Classic Filtering 3 Classic Filtering Black- & Whitelists 3 Classic Filtering
More informationCommon problems in production Wireless Networks. Jigsaw: Solving the Puzzle of Enterprise Analysis. Sounds Familiar?
Jigsaw: Solving the Puzzle of Enterprise 802.11 Analysis Written by Yu-Chung Cheng, John Bellardo, Peter Benko, Alex C. Snoeren, Geoffrey M. Voelker and Stefan Savage Analysis by Carlos Troncoso CS388
More informationThe importance of Whois data bases for spam enforcement
The importance of Whois data bases for spam enforcement Chris Fonteijn Chairman OPTA Joint meeting GAC/GNSO Marrakech, Monday 26 June 2006 1 Introduction My name is Chris Fonteijn and I am chairman of
More informationDMP 128 Plus C V DMP 128 Plus C V AT. ShoreTel Configuration Guide REVISION: DATE: DECEMBER 6 TH 2018
DMP 128 Plus C V DMP 128 Plus C V AT ShoreTel Configuration Guide REVISION: 1.1.1 DATE: DECEMBER 6 TH 2018 Revision Log Date Version Notes Sep. 21 st 2018 1.0 First Release: Applies to Firmware 1.01.0010
More informationContractual Compliance. Text. IPC Meeting. Tuesday, 24 June 2014 #ICANN50
Contractual Compliance IPC Meeting Tuesday, 24 June 2014 Contractual Compliance Update Since ICANN 49 Ongoing efforts and alignment on 2013 RAA and the new Registry Agreement Launched a quality process
More informationTripwire Inferring Internet Site Compromise
Tripwire Inferring Internet Site Compromise Joe DeBlasio Stefan Savage Geoffrey M. Voelker Alex C. Snoeren UC San Diego On account compromise Compromise of email/social network/etc is devastating Personal/professional
More informationTaster s Choice: A Comparative Analysis of Spam Feeds
Taster s Choice: A Comparative Analysis of Spam Feeds Andreas Pitsillidis apitsill@cs.ucsd.edu Kirill Levchenko klevchen@cs.ucsd.edu Chris Kanich ckanich@cs.uic.edu Stefan Savage savage@cs.ucsd.edu Geoffrey
More informationWHOIS ACCURACY PROGRAM SPECIFICATION
WHOIS ACCURACY PROGRAM SPECIFICATION Registrar shall implement and comply with the requirements set forth in this Specification, as well as any commercially practical updates to this Specification that
More informationSIP Compliance APPENDIX
APPENDIX E This appendix describes Cisco SIP proxy server (Cisco SPS) compliance with the Internet Engineering Task Force (IETF) definition of Session Initiation Protocol (SIP) as described in the following
More informationPURL Campaign Vanity Domain Quick Reference Guide
PURL Campaign Vanity Domain Quick Reference Guide Boingnet PURL campaigns have support for two types of domains. 1. Vanity domains that are obtained directly through Boingnet s interface. These domains
More informationCyRiE Cyber Risk Economics. Erin Kenneally, M.F.S., J.D. Program Manager Cyber Security Division
CyRiE Cyber Risk Economics Erin Kenneally, M.F.S., J.D. Program Manager Cyber Security Division CSD Mission & Strategy Develop and deliver new technologies, tools and techniques to defend and secure current
More information.HEALTH REGISTRATION POLICY
Effective Date: March 30, 2017.HEALTH REGISTRATION POLICY DotHealth, LLC, the Registry Operator for the.health top level domain (the TLD ), hereby adopts this Registration Policy as of the Effective Date
More informationSecurity & Stability Advisory Committee. Update of Activities
Security & Stability Advisory Committee Update of Activities 1 Topics 1. Overview of Activities -- Patrik Fältström, SSAC Chair 2. SAC054: SSAC Report on Domain Name Registration Data Model Jim Galvin,
More informationOnlineNIC PRIVACY Policy
OnlineNIC PRIVACY Policy ONLINENIC INC (ONLINENIC) TAKES YOUR PRIVACY SERIOUSLY. Our Privacy Policy is intended to describe to you how and what data we collect, and how and why we use your personal data.
More informationAttachment 3..Brand TLD Designation Application
Attachment 3.Brand TLD Designation Application Internet Corporation for Assigned Names and Numbers ( ICANN ) 12025 Waterfront Drive, Suite 300 Los Angeles, California 90094 Attention: New gtld Program
More informationOverview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP).
This chapter provides an overview of the Session Initiation Protocol (SIP). Information About SIP, page 1 How SIP Works, page 4 How SIP Works with a Proxy Server, page 5 How SIP Works with a Redirect Server,
More informationSponsor s Monthly Report for.coop TLD
Sponsor s Monthly Report for.coop TLD Reporting period: May 2011 In this report the terms dotcoop, Registry and Sponsor refer to DotCooperation LLC, the Sponsor of the dotcoop TLD. Table of Contents 1
More informationMCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration. Chapter 5 Introduction to DNS in Windows Server 2008
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 5 Introduction to DNS in Windows Server 2008 Objectives Discuss the basics of the Domain Name System (DNS) and its
More informationChristmas Island Domain Administration Limited ( cxda)
Christmas Island Domain Administration Limited ( cxda) HIGH RISK REGISTRATIONS IDENTIFICATION PROACTIVE ABUSE MITIGATION Tools provided by: Initial Try 2012 Mandatory manual domain activation with the
More informationIntroduction. Prepared by: ICANN Org Published on: 12 January 2018
Proposed Interim Models for Compliance with ICANN Agreements and Policies in Relation to the European Union s General Data Protection Regulation For Discussion Prepared by: ICANN Org Published on: 12 January
More informationREGISTRY POLICY STATEMENT ACCEPTABLE USE POLICY AND TERMS OF SERVICE
REGISTRY POLICY STATEMENT ACCEPTABLE USE POLICY AND TERMS OF SERVICE Rev: November 24, 2014 DEFINITIONS "Registered Name" means a domain name within the domain of the Uniregistry TLDs with which Uniregistry
More informationAttachment 3..Brand TLD Designation Application
Attachment 3.Brand TLD Designation Application Internet Corporation for Assigned Names and Numbers ( ICANN ) 12025 Waterfront Drive, Suite 300 Los Angeles, California 90094 Attention: New gtld Program
More informationRIPE Labs. Operators Tools, Ideas and Analysis. Mirjam Kühne, RIPE NCC. RIPE Network Coordination Centre. IETF 78 - Juy 2010.
RIPE Labs Operators Tools, Ideas and Analysis, RIPE NCC 1 What is RIPE Labs? It is a web site, but more importantly: A platform and a tool for the community You can Test and evaluate new tools and prototypes
More informationUC San Diego UC San Diego Electronic Theses and Dissertations
UC San Diego UC San Diego Electronic Theses and Dissertations Title A Comprehensive Approach to Undermining Search Result Poisoning Permalink https://escholarship.org/uc/item/9cn1867h Author Wang, David
More informationThe state of in Mar4jn Grooten, Virus Bulle4n TROOPERS15, 19 March 2015
The state of email in 2015 Mar4jn Grooten, Virus Bulle4n TROOPERS15, 19 March 2015 Me, myself and I Anna sends an email to Bob Hi, it s here bob@hismail.com. anna@hermail.com email for bob@hismail.com.
More informationFiltering 7 April 2014
Email Filtering 2014 Fortinet Inc. All rights reserved. The information contained herein is subject to change without notice. No part of this publication including text, examples, diagrams 1 or illustrations
More informationIntended status: Informational Expires: January 5, 2015 July 4, 2014
DNSOP Internet-Draft Intended status: Informational Expires: January 5, 2015 G. Deng N. Kong S. Shen CNNIC July 4, 2014 Approach on optimizing DNS authority server placement draft-deng-dns-authority-server-placement-00
More information