ICANN ICANN Email List Archives

[gnso-ff-pdp-may08]


<<< Chronological Index >>>    <<< Thread Index >>>

[gnso-ff-pdp-may08] Proposed additional text, section 5, following line 274

  • To: gnso-ff-pdp-May08@xxxxxxxxx
  • Subject: [gnso-ff-pdp-may08] Proposed additional text, section 5, following line 274
  • From: Joe St Sauver <joe@xxxxxxxxxxxxxxxxxx>
  • Date: Tue, 2 Sep 2008 10:05:31 -0700

[existing text at lines 258-273 recounts one definition of fastflux, and
clearly, the definition of fastflux is a pivotal issue for the draft
report. I am, therefore, puzzled that the report omits two important 
alternative working definitions of fast flux which were discussed on 
the mailing list.]

I would like to propose the inclusion of the following additional text 
immediately below line 274 on PDF page 14:

   "Some alternative definitions of fastflux.
    -----------------------------------------

   While the above definition is one that received some discussion in the
   working group, alternative definitions of fastflux also exist. For
   example:

   1) Spamhaus, a major DNS block list operator, defines fastflux (see 
   http://www.spamhaus.org/faq/answers.lasso?section=ISP%20Spam%20Issues#164 )
   to be:

   "Fast flux domain hosting involves the use of botnet zombie drones on 
   broadband IPs infected to act as reverse proxies for the spammer's 
   website or nameservers. The spamvertised domain, or its nameserver, is 
   pointed at a rapidly changing series of zombie IPs (hence the name) with 
   very short "TTL" values -- usually less than five minutes (300s). There 
   are typically four or five "A" records to distribute the load and 
   increase the odds of the website staying up. Their proxy service hides 
   the IP location of the spammer's dedicated servers. As the very action 
   of hijacking computers is illegal in most jurisdictions, such fast flux 
   hosting is only used for further criminal activities such as phishing 
   and child pornography. Because the criminals know they could be 
   identified if they used valid "whois" data, they always use bogus data, 
   so registrars can confidently HOLD (suspend) the domain based on ICANN 
   3.7.7.2."

   2) The first empircal study of fast-flux service networks, by Holz,
   Gorecki, Rieck and Freiling, "Measuring and Detecting Fast-Flux Service 
   Networks," https://pi1.informatik.uni-mannheim.de/filepool/research/
   publications/fast-flux-ndss08.pdf (URL broken due to its length) at 
   PDF page 6 provides a flux score which can be used to differentiate
   fastflux and non-fastflux domain names.

   Namely, they compute a flux score f(x) = 1.32*n(A) + 18.54*n(ASN)
   where n(A)=the number of "A" records to which a domain name resolves,
   and n(ASN)=the number of autonomous system numbers associated with 
   those A records. If f(x) exceeds 142.38, they score that domain as
   fastflux. Note that f(x) may increase over time with multiple
   resolutions of the domain name yielding additional A records and
   potentially additional ASNs."

Inclusion of those two definitions will help to illustrate some of the
alternative working definitions in use, while also showing that we've
done due dilligence with respect to the existing state of the academic
literature in the area. 

Thank you for considering this potential additional text for the report.

Regards,

Joe

Disclaimer: all opinions strictly my own



<<< Chronological Index >>>    <<< Thread Index >>>

Privacy Policy | Terms of Service | Cookies Policy