Detecting Typo- squatting Domains Mishari Almishari

Slides:



Advertisements
Similar presentations
David Naffziger CEO – BrandVerity
Advertisements

Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee ACSAC.
$100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300.
Typo-Squatting: a Nuisance or a Threat to Your Traffic? Mishari Almishari.
Harvesting SSL Certificate Data to Identify Web-Fraud Reporter : 鄭志欣 Advisor : Hsing-Kuo Pao 2010/10/04 1.
By Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, and Giovanni Vigna Network and Distributed System Security(NDSS ‘07)
Low Defect Potentials (< 1 per function point)
Demonstration of the use of browser extensions in Mozilla to link from a Google Scholar item to a European Library object.
Merging Taxonomies. Assertion Creation and maintenance of large ontologies will require the capability to merge taxonomies This problem is similar to.
Methodologies for Evaluating Dialog Structure Annotation Ananlada Chotimongkol Presented at Dialogs on Dialogs Reading Group 27 January 2006.
UC Berkeley Monitoring Hadoop through Tracing Andy Konwinski and Matei Zaharia.
Accurately Detect Parked Domain Typo- squatting Attacks Mishari Almishari and Xiaowei Yang University of California, Irvine Donald Bren School of Information.
Typo-Squatting: a Nuisance or a Threat to Your Traffic? Mishari Almishari.
© 2006 Cisco Systems, Inc. All rights reserved. CUDN v1.1—3-1 Developing an Implementation Plan Final Design and Implementation.
Intrusion Detection System Marmagna Desai [ 520 Presentation]
Website Workshop Legion of Mary Arlington Regia. Overview How to make the website Hosting Services HTML Refresher Free Webpage Building Software Search.
Water Contamination Detection – Methodology and Empirical Results IPN-ISRAEL WATER WEEK (I 2 W 2 ) Eyal Brill Holon institute of Technology, Faculty of.
Abstract Introduction Results and Discussions James Kasson  (Dr. Bruce W.N. Lo)  Information Systems  University of Wisconsin-Eau Claire In a world.
DPNM, POSTECH 1/23 NOMS 2010 Jae Yoon Chung 1, Byungchul Park 1, Young J. Won 1 John Strassner 2, and James W. Hong 1, 2 {dejavu94, fates, yjwon, johns,
PhishScore: Hacking Phishers’ Minds
Characterizing and Modeling the Impact of Wireless Signal Strength on Smartphone Battery Drain Ning Ding Xiaomeng Chen Abhinav Pathak Y. Charlie Hu 1 Daniel.
Amber Bennett Cybersquatting. Introduction What is cybersquatting? Cyber: Internet Squatting: to live in a building or on land without the owner’s permission.
Rudi Seljak, Metka Zaletel Statistical Office of the Republic of Slovenia TAX DATA AS A MEANS FOR THE ESSENTIAL REDUCTION OF THE SHORT-TERM SURVEYS RESPONSE.
Economics of Malware: Spam Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See the last.
Optimizing Traditional and Advocating New Prevention Methods Mark Jenne Tatiana Alexenko Cross-Site-Request-Forgery.
A Statistical Approach to Typosquatting Detection DNS Ops Workshop, 4-5 June 2008 Alessandro Linari and Oxford Brookes University.
$100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300 $400 $500 $100 $200 $300.
Deliverable 2.6: Selective Editing Hannah Finselbach 1 and Orietta Luzi 2 1 ONS, UK 2 ISTAT, Italy.
DNS Security Pacific IT Pros Nov. 5, Topics DoS Attacks on DNS Servers DoS Attacks by DNS Servers Poisoning DNS Records Monitoring DNS Traffic Leakage.
Anycast DNS. WatITis | Strengthening Collaboration | December 8, 2009 | Anycast DNS Outline Current Anycast routing Anycast implemented Problems resolved.
Sharing the Network It slices, it dices, it sequences ….. All of this and error checking too!
Ulrich Wieland, Eurostat MSIS 2010, Daejeon, Korea Statistics Explained – a user-friendly and low-cost disemination system.
The application of selective editing to the ONS Monthly Business Survey Emma Hooper Office for National Statistics
Detecting Targeted Attacks Using Shadow Honeypots Authors: K.G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, A.D. Keromytis Published:
Math Information Retrieval Zhao Jin. Zhao Jin. Math Information Retrieval Examples: –Looking for formulas –Collect teaching resources –Keeping updated.
A Formal Analysis of Conservative Update Based Approximate Counting Gil Einziger and Roy Freidman Technion, Haifa.
Speaker:Chiang Hong-Ren Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic.
Let’s Overview The Three Main Areas We Need: Domain Name Web Hosting Website.
WHAT AND HOW CHILDREN SEARCH ON THE WEB Sergio Duarte Torres, Ingmar Weber.
CBS-SSB STATISTICS NETHERLANDS – STATISTICS NORWAY Work Session on Statistical Data Editing Oslo, Norway, September 2012 Jeroen Pannekoek and Li-Chun.
© Federal Statistical Office Germany, Division IB, Institute for Research and Development in Federal Statistics Sheet 1 Surveys, administrative data or.
A “Quick and Dirty” Website Data Quality Indicator Irit Askira Gelman University of Arizona Anthony L. Barletta University of Arizona.
Finding high-Quality contents in Social media BY : APARNA TODWAL GUIDED BY : PROF. M. WANJARI.
Parking Sensors: Analyzing and Detecting Parked Domains
Outlier Treatment in HCSO Present and future. Outline Outlier detection – types, editing, estimation Description of the current method Alternatives Future.
Reporter: Jing Chiu Advisor: Yuh-Jye Lee /3/17 1 Data Mining and Machine Learning Lab.
CISC Machine Learning for Solving Systems Problems Presented by: Suman Chander B Dept of Computer & Information Sciences University of Delaware Automatic.
Browser Wars (Click on the logo to see the performance)
Measuring and Mitigating Web Performance Bottlenecks in Broadband Access Networks Srikanth Sundaresan, Nick Feamster (Georgia Tech) Renata Teixeira (Inria)
Mohammad Taha Khan *, Xiang Huo *, Zhou Li † & Chris Kanich * University of Illinois at Chicago * & RSA Labs † Every Second Counts: Quantifying the Negative.
Efficient software-based fault isolation Robert Wahbe, Steven Lucco, Thomas Anderson & Susan Graham Presented by: Stelian Coros.
Ontology domain & modeling extensions. Modeling enhancements: overview Enhancements: – Increased expressivity in ontology – Increased expressivity in.
Be.wi-ol.de User-friendly ontology design Nikolai Dahlem Universität Oldenburg.
A Framework for Detection and Measurement of Phishing Attacks Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 2/25/2016 Slide.
Ljubljana, 11 Mai 2011UNECE Work session on SDE Topic (vii) New and emerging methods 1 Topic (vii): New and emerging methods Discussion Discussants: Rudi.
Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS) Organising computers in a large network Reference books:The DHCP Handbook, Ralph.
Week-6 (Lecture-1) Publishing and Browsing the Web: Publishing: 1. upload the following items on the web Google documents Spreadsheets Presentations drawings.
Modern information gathering Dave van Stein 9 april 2009.
DOWeR Detecting Outliers in Web Service Requests Master’s Presentation of Christian Blass.
DNS Security Risks Section 0x02. Joke/Cool thing traceroute traceroute c
Mozilla Firefox is not Opening. For More Visit: firefox-customer-service For More Visit:
Norton Internet Security Customer Service Number Why Is Norton Antivirus Blocking Some Extensions From Being Installed On Microsoft Edge? Norton is not.
Servicenumber.org/mozilla- firefox.html. servicenumber.org/mozilla-firefox.html Mozilla Firefox Customer Service.
פחת ורווח הון סוגיות מיוחדות תהילה ששון עו"ד (רו"ח) ספטמבר 2015
Decision-making in the eRA of Treating to Target
The European Statistical System
Face Components detection
Find the Taylor series for f (x) centered at a = 8. {image} .
Chapter 2: Analysis and Verification of Non-Real-Time Systems
Types of Errors And Error Analysis.
Presentation transcript:

Detecting Typo- squatting Domains Mishari Almishari

Problem Definition & Goals Typo-squatting refers to the act of intentionally registering domain names that are typographical errors of other well-known domain names to hijack their traffic, for traffic monetization, malicious,…etc. Goals:  Develop a methodology for automatically identifying typo- squatting domains  Quantify the amount of traffic hijacked by typo-squatters  Develop a system that reduces access to typo-squatting domains

Detection Methodology For a domain to be typo-squatting domain it must satisfies two criteria:  Typo of a well-known target domain edit distance function more than 50% are false positives  Hijacking Intention Dominant hijacking indicator is ads-listing (parked domain 88.5%) Developed a machine learning classifier to identify parked domain (accuracy 96%)

Measurements Use 8-month DNS traces of UCI name resolvers to measure hijacked traffic Given a 500 well-known popular domains, we found 1,786 typo-squatting domains Total hits to those domains are 23,989 15%(12%) of squatting domains were not detected by Google (Yahoo) typo correctors

System Implementation Integrate with Mozilla Firefox as an add-ons extension Typo-squatting domains are detected on the fly Overhead is small  For 100 typo domains, avg is 53 ms  For 100 typo domains that are not squatting domains avg is 79 ms