Detecting malicious Web sites before they do harm

The researchers’ techniques rely on the assumption that malicious users will exhibit registration behavior that differs from those of normal users, such as buying and registering lots of domains at once to take advantage of bulk discounts, so that they can quickly and cheaply adapt when their sites are noticed and blacklisted. Additionally, criminals will often register multiple sites using slight variations on names: changing words like “home” and “homes” or switching word orders in phrases. 

By identifying such patterns, Feamster and his collaborators were able to start sifting through the more than 80,000 new domains registered every day to preemptively identify which ones were most likely to be used for harm. 

Testing their results against known blacklisted Web sites, they found that PREDATOR detected 70 percent of malicious Web sites based solely on information known at the time those domains were first registered. The false positive rate of the PREDATOR system, or rate of legitimate sites that were incorrectly identified as malicious by the tool, was only 0.35 percent.

Being able to detect malicious sites at the moment of registration, before they’re being used, can have multiple security benefits, Feamster said. Those sites can be blocked sooner, making it difficult to use them to cause as much harm — or, indeed, any harm at all if the operators are not permitted to purchase them. “PREDATOR can achieve early detection, often days or weeks before existing blacklists, which generally cannot detect domain abuse until an attack is already underway,” the authors write in their paper. “The key advantage is to respond promptly for defense and limit the window during which miscreants might profitably use a domain.”

Additionally, existing blocking tools, which rely on detecting malicious activity from Web sites and then blocking them, allow criminals to continue purchasing new Web sites. Cutting off the operators of malicious Web sites at the moment of registration prevents this perpetual cat-and-mouse dynamic. This more permanent form of protection against online threats is a rarity in the field of computer security, where adversaries often evade new lines of defense easily, the researchers said.

For the PREDATOR system to help everyday internet users, it will have to be used by existing domain blacklist services, like Spamhaus, that maintain lists of blocked Web sites, or by registrars, like GoDaddy.com, that sell new domain names.

Part of what we envision is if a registrar is trying to make a decision about whether to register a domain name, then if PREDATOR suggests that domain name might be used for malicious ends, the registrar can at least wait and do more due diligence before it moves forward,” Feamster said.

Although the registrars still must manually review domain registration attempts, PREDATOR offers them an effective tool to predict potential abuse. “Prior to work like this, I don’t think a registrar would have very easy go-to method for even figuring out if the domains they registered would turn out to be malicious,” Feamster said. 

— Read more in Shuang Hao et al., “PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration” (DOI: http://dx.doi.org/10.1145/2976749.2978317) (paper presented at the 23rd ACM Conference on Computer and Communications Security, Hofburg Palace, Vienna, Austria, 24-28 October 2016)