Uncovering IP Address Hosting Types Behind Malicious Websites

10/30/2021
by   Nimesha Wickramasinghe, et al.
0

Hundreds of thousands of malicious domains are created everyday. These malicious domains are hosted on a wide variety of network infrastructures. Traditionally, attackers utilize bullet proof hosting services (e.g. MaxiDed, Cyber Bunker) to take advantage of relatively lenient policies on what content they can host. However, these IP ranges are increasingly being blocked or the services are taken down by law enforcement. Hence, attackers are moving towards utilizing IPs from regular hosting providers while staying under the radar of these hosting providers. There are several practical advantages of accurately knowing the type of IP used to host malicious domains. If the IP is a dedicated IP (i.e. it is leased to a single entity), one may blacklist the IP to block domains hosted on those IPs as welll as use as a way to identify other malicious domains hosted the same IP. If the IP is a shared hosting IP, hosting providers may take measures to clean up such domains and maintain a high reputation for their users.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/18/2018

FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks

Network address shuffling is one of moving target defense (MTD) techniqu...
research
09/04/2019

HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification

Domain name system (DNS) is a crucial part of the Internet, yet has been...
research
04/13/2018

RIPEx: Extracting malicious IP addresses from security forums using cross-forum learning

Is it possible to extract malicious IP addresses reported in security fo...
research
02/16/2021

Domain Name Encryption Is Not Enough: Privacy Leakage via IP-based Website Fingerprinting

Domain name encryptions (DoTH and ESNI) have been proposed to improve se...
research
08/16/2023

Evaluating IP Blacklists Effectiveness

IP blacklists are widely used to increase network security by preventing...
research
12/05/2021

Protecting Intellectual Property of Language Generation APIs with Lexical Watermark

Nowadays, due to the breakthrough in natural language generation (NLG), ...
research
09/18/2018

Validating the Claim - Defeating HaTCh : Building Malicious IP cores

This paper defends the design of hardware Trojan proposed in the paper "...

Please sign up or login with your details

Forgot password? Click here to reset