skip to main content
10.1145/3297156.3297264acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaiConference Proceedingsconference-collections
research-article

Detecting Chinese Domain Name Piracy

Authors Info & Claims
Published:08 December 2018Publication History

ABSTRACT

Address spoofing is a remarkably effective way to trick a user into revealing confidential information. The advent of Internationalized Domain Name (IDN), which benefits non-native speakers of English to access the Internet, poses a new hazard with non-English characters employed in domain names. Chinese domain name, as an important part of IDN, is attracting more and more attention.

Unlike alphabetic writing, the form of Chinese character is very complicated. There exist plenty of Chinese characters with similar shape or similar pronunciation, which is very confusing to users. Many of the traditional detection technologies cannot be applied to the new situation. In this paper, we perform a comprehensive study of Chinese domain name piracy, and put forward three detection methods accordingly. The experiment results show that these detection methods are feasible and effective.

References

  1. Anti-Phishing Working Group (APWG). Phishing Activity Trends Report 4st Quarter 2017. 2018. http://docs.apwg.org/reports/apwg_trends_report_q4_2017.pdfGoogle ScholarGoogle Scholar
  2. Anti-Phishing Alliance of China (APAC). Briefing on Handing of Phishing Websites in April 2018. 2018. http://en.apac.cn/Briefing_on_Handling_of_Phishing_Websites/201805/P020180515545876373680.pdfGoogle ScholarGoogle Scholar
  3. Weili Han, Ye Cao, Elisa Bertino, and Jianming Yong. 2012. Using automated individual white-list to protect web digital identities. Expert Syst. Appl. 39, 15 (2012), 11861--11869. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Pawan Prakash, Manish Kumar, Ramana Rao Kompella, and Minaxi Gupta. 2010. PhishNet: Predictive Blacklisting to Detect Phishing Attacks. In INFOCOM 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 15--19 March 2010, San Diego, CA, USA. 346--350. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Jian Zhang, Phillip A. Porras, and Johannes Ullrich. 2008. Highly Predictive Blacklisting. In Proceedings of the 17th USENIX Security Symposium, July 28-August 1, 2008, San Jose, CA, USA. 107--122. http://www.usenix.org/events/sec08/tech/full\_papers/zhang/zhang.pdf Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Yuanchen He, Zhenyu Zhong, Sven Krasser, and Yuchun Tang. 2010. Mining DNS for malicious domain registrations. In The 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA, 9--12 October 2010. 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  7. The 39th China Statistical Report on Internet Development. 2017. http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201701/P020170123364672657408.pdfGoogle ScholarGoogle Scholar
  8. The 41th China Statistical Report on Internet Development. 2018. http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/hlwtjbg/201803/P020180305409870339136.pdfGoogle ScholarGoogle Scholar
  9. Viktor Krammer. 2006. Phishing defense against IDN address spoofing attacks. In Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 -November 1, 2006. 32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Bo Hong, Guanggang Geng, Liming Wang, and Wei Mao. 2013. Method to detect Chinese domain name homograph attack. Application Research of Computers 11 (12-2013), 3426--3429.Google ScholarGoogle Scholar
  11. Ankit Kumar Jain and B. Brij Gupta. 2018. Towards detection of phishing websites on client-side using machine learning based approach. Telecommunication Systems 68, 4 (2018), 687--700. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. El-Sayed M. El-Alfy. 2017. Detection of Phishing Websites Based on Probabilistic Neural Networks and K-Medoids Clustering. Comput. J. 60, 12 (2017), 1745--1759.Google ScholarGoogle ScholarCross RefCross Ref
  13. Mayank Pandey and Vadlamani Ravi. 2013. Text and Data Mining to Detect Phishing Websites and Spam Emails. 8298 (2013), 559--573. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Dong Wang and Shihuan Xiong. 2013. New algorithm for similarity calculation of Chinese character glyph. Application Research of Computers 8 (10-2013), 2395--2397.Google ScholarGoogle Scholar
  15. Zhiqing Lin and Jun Guo. 2002. An Algorithm for the Recognition of Similar Chinese Characters. Journal of Chinese Information Processing 5 (3-2002), 44--48.Google ScholarGoogle Scholar
  16. Information technology - Universal multiple-octet coded character set (CJK unified ideographs) 15×16-dot matrix font: GB/T 17698--2010. 2011. Standards. http://c.gb688.cn/bzgk/gb/showGb?type=online&hcno=D213E624930ABEADB6DBDA92F97AB2BCGoogle ScholarGoogle Scholar
  17. http://导航.中国/.Google ScholarGoogle Scholar

Index Terms

  1. Detecting Chinese Domain Name Piracy

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CSAI '18: Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence
      December 2018
      641 pages
      ISBN:9781450366069
      DOI:10.1145/3297156

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 8 December 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited
    • Article Metrics

      • Downloads (Last 12 months)5
      • Downloads (Last 6 weeks)2

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader