Next Article in Journal
ForkJoinPcc Algorithm for Computing the Pcc Matrix in Gene Co-Expression Networks
Previous Article in Journal
The Application of Improved Harmony Search Algorithm to Multi-UAV Task Assignment
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Evaluating the Effectiveness of Handling Abusive Domain Names by Internet Entities

1
Faculty of Computing, Harbin Institute of Technology, Harbin 150001, China
2
Beijing Qihoo Technology Co., Ltd., Beijing 100015, China
*
Authors to whom correspondence should be addressed.
Electronics 2022, 11(8), 1172; https://doi.org/10.3390/electronics11081172
Submission received: 26 February 2022 / Revised: 2 April 2022 / Accepted: 5 April 2022 / Published: 7 April 2022
(This article belongs to the Section Networks)

Abstract

:
A large number of domains are abused every day for cybercrime. At the same time, the fight against abusive domains is not the fight of one person or organization but a battle that requires the cooperation of the entire community. However, very little research has been done to quantify the positive benefits of this strategy for dealing with abusive domains. As a result, using pornography and gambling domain names as examples, we present the first empirical study evaluating the usability and effectiveness of all Internet entities (e.g., registrars and hosting providers) in the DNS ecosystem for receiving and handling abusive domain reports. First, the paper thoroughly demonstrates the mechanisms for receiving and handling abusive domain reports at various Internet entities in China. Second, we select and report the appropriate 2433 abusive domains to 43 service providers across six categories of Internet entities. Finally, we discover the methods and response time used by each Internet entity to handle abuse reports based on the changes in reported domains. Based on the above data, we analyze and evaluate the effectiveness of Internet entities in dealing with abusive domains. Moreover, we indicate the scope of protection and disadvantages of each method, i.e., whether the abusive domain can escape handling. The paper aims to provide a more detailed overview and reference for the security communities, service providers, and Internet entities concerned with dealing with abusive domains.

1. Introduction

A large number of domain names on the Internet are misused daily for cybercriminal activities, ranging from spoofing victims’ private information (phishing), to maliciously installing software onto end-users’ devices (malware attacks), to distributing illegal obscene videos. Internet abuse continues to victimize millions of people each year, reducing trust in the Internet as a place to conduct business and non-business activities [1,2]. This decline in confidence has a detrimental effect on all stakeholders in the Internet ecosystem, from end-users to infrastructure service providers.
A lot of research and resources are devoted to how to identify or detect these abusive domains early and accurately [3,4,5,6,7,8]. However, the issues of determining which Internet entities are responsible and what methods are used to handle discovered abusive domains are worthy of in-depth study [9]. An abusive domain name involves many Internet entities (e.g., registrars and web hosting providers), from registration to the commission of cybercrime, as shown in Figure 1. As a result, the fight against domain name abuse is not the fight of one person or organization but a battle requiring the entire community’s participation [10]. The Internet Corporation for Assigned Names and Numbers (ICANN) states that the best strategy to combat domain name abuse is to join many entities and choose the best approach, such as governments, operators, institutions, and Internet communities.
In China, pornography and gambling domains are not only defined as abusive but are also against the law. At the same time, China has one-fifth of the world’s Internet users. Therefore, the government, the security community, and academia need to study mechanisms to deal with abusive domains quickly and effectively. As a result, using pornography and gambling domain names as examples, we present the first empirical study on the usability and effectiveness of Internet entities for receiving abusive reports and handling abusive domains.
First, we investigate and collate in detail China’s processing mechanisms in receiving reports and dealing with abusive domains. In addition to each Internet entity, the Chinese administration established four administrative governance entities to receive abuse reports about domain names from the public. This cooperative mechanism involves as many Internet entities and individuals as possible in handling abusive domains (Section 3). Second, we obtained 300,000 pornographic and gambling domains and their associated data, such as registration information and IP addresses. The associated data is used to identify specific Internet entities, such as domain registration including the domain registrar (Section 4). Next, we selected the appropriate 2433 abusive domains and reported them to 43 companies and service providers across six categories of Internet entities. Then, after nearly two weeks, we observed the changes of the reported domains to evaluate the effectiveness of Internet entities in handling abusive domains (Section 5). Finally, we discuss the scope of protection and disadvantages of each method of dealing with abusive domains, i.e., whether the abusive domains can escape handling. Moreover, based on the problems discovered in reporting abusive domains, we offer suggestions and solutions to Internet entities (Section 6).
In short, we make the following contributions:
  • For the first time, we detail the role and mechanism of the Chinese government in dealing with abusive domains. This cooperative mechanism serves as a reference for Internet organizations (e.g., ICANN), security agencies, and other governments to combat abusive domains.
  • We present the first empirical study on the usability and effectiveness of all Internet entities in the DNS ecosystem for receiving abuse reports and handling abusive domains. This evaluation provides governments, the Internet community, and security organizations with a more comprehensive and clear view of the current realities of dealing with abusive domains. Moreover, Internet entities in the DNS ecosystem need to be targeted to improve their ability to deal with abuse reports.
  • Based on the methods used by Internet entities to deal with abusive domains, we analyze the scope of protection of each method and whether abusive domains can escape governance. Then, we provide targeted and practical advice to entities in handling abusive domains.
This paper aims to provide a more detailed overview of the handling of abusive domains, from which Internet entities should report to, to what methods the entities have used to deal with abusive domains, to how effective the methods used have been. This paper is intended for audiences across the Internet infrastructure and cybersecurity industries.

2. Background and Related Work

2.1. Background

2.1.1. Definition of Abusive Domain Name

The report of the ICANN Security and Stability Advisory Committee (SSAC) [10] defines five types of harmful activities as DNS abuse, namely malware, botnets, phishing, pharming, and spam, all of which are domain name related. On the other hand, SSAC considers some of the specific definitions to be limited, and the above does not provide a general definition of abuse that can accommodate the evolving nature of abuse and cybercrime across the country and over time. The definition of domain name abuse also needs to consider each country’s culture and legal requirements. For example, in some countries [11,12,13,14], the use of domain names for pornography (especially child pornography) and gambling is not only abusive but also illegal.
Chinese law strictly prohibits individuals or organizations from establishing and accessing pornographic or gambling websites. At the same time, China has one-fifth of the world’s Internet users. Thus, the abusive domain names surviving on the Internet affect a wide range of users. This indicates the importance of how quickly and effectively entities can deal with abusive domains, which is also the goal of this paper. Moreover, while we use pornography and gambling domain names as case studies, the methods and response time of Internet entities to deal with different types of abusive domain names are the same.

2.1.2. Internet Entities Involved in Domain Names

The Internet is a worldwide distributed network comprised of numerous autonomous networks connected voluntarily. It is governed by a decentralized and international multistakeholder network of interconnected autonomous groups comprised of civil society, business, government, academia, research, and national and international organizations. They work together across their different jobs to develop policies and standards that keep the Internet working worldwide for the public good. As a result, this architecture leads to many infrastructures and entities involved in the Internet for end-users to access the services (e.g., websites and email) provided by domain names, as illustrated in Figure 1.
Abusive domain names to victimize or attack end-users involve four main categories of Internet infrastructure or entities:
  • Domain name registration. At this stage, the abuser selects the appropriate registrar to register the domain name for user access to the abusive content. According to the data published by ICANN, there are presently 2543 ICANN-accredited [15] registrars worldwide. Generally, abusers choose registrars that are inefficient at handling abusive domains or charge lower fees for domain names.
  • Renting web servers. A web hosting provider provides the services required for the abuser to create and maintain websites and make them available on the World Wide Web. When choosing a provider, abusers consider the price and the provider’s authority to fight against abusive domain names. For example, most owners of pornographic websites do not choose a provider in China. This is because the Chinese providers require the site owner to authenticate with their real name. This dramatically increases the risk of legal sanctions against abusers.
  • Configuring DNS records for the domain name. Similarly, the abuser chooses a DNS hosting provider and uses the resolution services it provides to configure the correct DNS records for the domain name.
  • Accessing abusive domain names. An end-user accesses abusive domain names using the browser of a device (PC or cell phone) based on the network service provided by the Internet Service Providers (ISPs). In resolving the domain name to an IP, the DNS recursive server used by the user may be the ISP’s default configuration or another organization’s DNS (e.g., Google 8.8.8.8) configured by the user.
Abusive domain names require many Internet resources if they are to function correctly. If an abuser acquires a resource directly (through purchase or provisioning), the related service provider would be the most effective party to handle the issue. Likewise, when a service is compromised, its owner and provider might play a critical role in fixing the compromise and misuse. In general, these entities are not just accountable for the proper operation of the Internet ecosystem, such as Internet users accessing websites via their browsers. Additionally, these entities are responsible for fighting against abusive domain names.

2.2. Related Work

Identifying and detecting abusive domain names, their reporting, and how they should be addressed are hot topics in the Internet enterprise and the academic fields.
  • Detection of abusive domain names. Many studies [4,5,6,7,8,16,17,18] have focused on detecting abusive domains; that is, how to quickly detect different types of abusive domains, such as phishing and malware, from a large number of domains on the Internet. The methods or systems proposed in these works are divided into two categories: Blacklists and proactive detection. So far, blacklists have been the most popular solution that prevents users from accessing malicious domains. A blacklist is a list of identifiers of malicious communication objects. Some researchers utilize techniques such as machine learning or deep learning to detect malicious domains proactively. These methods are primarily based on various types of information present in domains, such as WHOIS, web content, and DNS records.
  • Abusive domain name notifications/reporting. Numerous studies [9,19,20,21,22] have been conducted to determine whether and how abuse notifications can help speed the cleanup of compromised websites. Notifications can be issued to the affected owners of the site or their hosting providers. Cetin et al. [19] conducted the first empirical research of a real-world ‘walled garden’ system for notifying and quarantining end-users with malware-infected computers—a well-recognized ISP security best practice. Vasek et al. [22] found that more detailed abuse notifications to hosting providers resulted in a greater cleanup rate than notifications with less information. Jhaveri et al. [9] developed a model of the abuse reporting infrastructure to explain how volunteer action against cybercrime operates today, to increase understanding of what works and how to improve remediation effectiveness in the future.
  • Handling abusive domain names. As we all know, Domain name system security is a joint task for the Internet industry. Meanwhile, the ongoing security community works to mitigate security threats to the DNS. ICANN and its multistakeholder community have engaged in an extended dialogue on DNS abuse and the need to define, measure, and mitigate DNS-related security threats [23]. Domain blocking should never be taken lightly and should always be considered a last resort in the fight against unlawful content. Not only is deleting such content more effective in the long term, but it also mitigates the possibility of collateral damage associated with domain blocking [24]. Hu et al. [25] conducted empirical research of browser Internationalized Domain Names (IDN) policies and a user study to ascertain how users perceive homograph IDNs. They also evaluated the browser’s protection against homograph IDNs systematically. Liu et al. [26] characterized the impact that registrar-level interventions have had on scammers’ use of domain names, how and why scammers have adapted in response, and ultimately how to reason about the use of this approach as a general anti-abuse tool. Mohammadreza et al. [27] carried out a study to assess the effectiveness of known solutions to prevent DNS rebinding attacks. Moreover, they proposed a defensive measure, a browser plug-in, that can detect, inform, and protect users in the event of an attack.
In summary, we find that many studies focusing on the discovery and detection of abusive domain names. There is less research on how to deal with the discovered abusive domains, let alone evaluate the effectiveness of entities in dealing with these domains. Moreover, the available studies focus on the handling of a particular type of Internet entity (e.g., registrars and browsers) and do not cover all entities in the DNS ecosystem. Therefore, this paper bridges these gaps by analyzing the approaches adopted by all Internet entities in dealing with abusive domains and evaluating their effectiveness.

3. Joint Mechanism to Handle Abusive Domains

A government-led, multi-party (e.g., domain name registrars, Internet security organizations) governance mechanism for abusive domains has emerged in China. The Central Committee for Network Security and Informatization is the core of the governance entity, the private sector, civil society, and other multi-body collaborative governance. This occurs through legislation and regulation, administration, self-regulation, technical prevention, international cooperation, and other activities dealing with abusive domain names. This is the same framework as ICANN’s which advocated for handling abusive domain names [10].

3.1. Handling Abusive Domain Framework

We summarize the handling abusive domain name framework in Figure 2 by combining the Internet entities involved in domain names as detailed in Section 2.1.2 and the China-specific mechanism for dealing with abusive domains.
Under multiple Chinese laws and regulations, one or more administrative units jointly establish multiple administrative governance entities based on their responsibilities. These administrative governance entities do not have actual control over the network. However, they are mainly responsible for receiving complaints from the public or organizations and jointly handling and monitoring abusive domains with various responsible governance entities. The responsible governance entity is the Internet entity in the DNS ecosystem that we introduced in Section 2.1.2. Internet entities have the real ability and responsibility to deal with abusive domains within their jurisdiction.

3.2. Administrative Governance Entities

To address the harm caused by abusive activities, including domain name abuse, more quickly and effectively, several administrative governance entities have been established under the supervision of Chinese government departments. Their primary job is to collect evidence of abusive behavior reported by the public or organizations and work with the appropriate responsible governance authorities to prevent or reduce abusive behaviors promptly. As shown in Figure 2, there are four main entities, which are described in detail below.
  • Illegal and Unhealthy Information Reporting Center (https://www.12377.cn, accessed on 25 February 2022) (12377-Center). This reporting center mainly receives reports of illegal information or content types, such as pornography, gambling, fraud, and rumors. It is currently the most active reporting channel in China, receiving more than 10 million abusive reports every month [28].
  • Networks with Garbage Information Reporting Center (https://www.12321.cn, accessed on 25 February 2022) (12321-Center). It mainly receives reports of abuse information, such as pornographic websites, and spam.
  • Eliminate Pornography and Illegal Publications Website (https://www.shdf.gov.cn, accessed on 25 February 2022) (shdf-Center). The website mainly receives reports on pornography, piracy, and illegal publications.
  • Internet Crime Reporting Center (http://cyberpolice.cn, accessed on 25 February 2022) (Internet-110). This reporting center receives all types of abusive reports. In addition to content-based abusive reports, the center also receives cyber theft, computer vandalism, terrorism, and other illegal and unlawful abusive reports.
In summary, the administrative governance entities established abusive reporting mechanisms focused on receiving reports from the public. After all, the public is numerous and is a direct victim of abuse. In addition, these reporting channels require a low level of Internet knowledge from the public so that users can easily report. However, as shown in the questionnaire survey conducted in Section 6.3, nearly 57% of the people are not aware of these reporting channels. Therefore, government departments need to increase publicity and promote joint mechanisms to combat abusive domains.

3.3. Responsible Governance Entities

Responsible governance entities, also called Internet Entities, are a critical component of the Internet ecosystem. They are accountable for and capable of dealing with abusive domains. For instance, domain registrars and web hosting providers might remove or refuse to host abusive domain names, respectively. Moreover, it is critical to recognize the role of Internet companies in addressing abusive domains, such as browsers alerting users to the dangers of domain name access, as illustrated in Figure 3. In Section 5, we describe in detail the handling of abusive domains by each responsible governance entity. On the other hand, each responsible governance entity only receives and processes reports of domain name abuse within its jurisdiction. Therefore, this requires a higher level of Internet knowledge from the reporters. For example, reporters need to know how to obtain the domain registrar or web hosting provider.

3.4. Handling Methods

Depending on the role of different responsible governance entities in the Internet ecosystem (as illustrated in Figure 1), their approaches or mechanisms to deal with abusive domain names differ, as shown in Figure 2. In addition, by analyzing the status of abusive domains after reporting them to the entities (described in detail in Section 5), we summarize the handling methods of each Internet entity as shown in Table 1.
One or more entities have the ability and means to handle an abusive domain name. However, different entities handle abusive domain names differently, and some methods are more effective than others. For example, people can no longer be at risk from abusive domains after registrars set the status of the domains to serverhold or clienthold because the domains are essentially deleted from the top-level domain (TLD) zone. In contrast, if only the browser entity puts the abusive domains on its blacklist, then this method can only protect the users who use that browser.
In addition, when choosing which entity to deal with abusive domain names, consider whether the methods they use will cause collateral damage to other non-abusive customers or services. For example, a hacker hacks into a benign website and embeds a phishing page on one of the links. If the entity disables the benign domain, it can impact both non-abuse behaviors and the identified abuse. We explain in detail the handling methods used by all entities in Section 5.

4. Methodology

In this section, we design the methodology to figure out the methods used by Internet entities to handle abusive domains as well as to evaluate the effectiveness of these entities, as shown in Figure 4.

4.1. Abusive Domains Detection

In this stage, we detect a large number of pornographic and gambling domains and obtain association data (e.g., domain registration information and DNS records) for abusive domains. This data can support us in reporting abusive domain names to specific Internet entities.
We use keyword matching to obtain a large number of pornographic and gambling domains, and the detailed steps are as follows.
  • First, we downloaded over 260 million domain names from Domain Monitor (https://domains-monitor.com/, accessed on 25 February 2022). These domains come from over 1,500 TLD zones, and this also indicates that these domains have DNS records.
  • Second, we employed a web crawler to attempt to retrieve the web pages of these domains. In particular, for each domain name, the web crawler sequentially fetches the webpage from the URL list (http://example.com, http://www.example.com, accessed on 25 February 2022; https://example.com, and https://www.example.com, accessed on 25 February 2022), and ends if it successfully fetches the webpage for a particular URL. Then, we extracted the text content from the tags title, keywords, and description on each webpage.
  • Finally, we identified many pornographic and gambling domains by matching the extracted text with the pre-collected pornographic and gambling keywords. These keywords (shared in GitHub (https://github.com/mrcheng0910/reporting_abusive_domains/blob/main/abusive_keywords.txt, accessed on 25 February 2022)) are the more frequent Chinese words in pornography and gambling websites that we collected manually in the early stages, such as 做爱(sex), 成人电影(adult movies), and 澳门娱乐场(Macau casinos).
As described earlier, abusive domain detection is popular and worthy of in-depth study. However, the primary objective of this paper is to evaluate the effectiveness of Internet entities in handling abusive domains. Therefore, after we obtained 300,000 pornographic and gambling domain names using the method above, we now have enough abusive domains to support the research in this paper.
In addition, we develop programs to obtain the IP address and domain registration information (WHOIS) of abusive domains. IP addresses are used to find the web hosting providers for domain names. The registration information contains a clue about the domain registrar and the DNS hosting provider. Moreover, the domain status field in the registration information is one of the essential identifiers to determine whether the registrar is handling the abusive domains.

4.2. Abusive Domains Reporting

Reporting abusive domain names to the relevant Internet entities is the first step in dealing with them. Most entities offer different ways to report abusive services. The reporting service consists of two main components: A channel for abuse reporting provided by the network entity; and a requirement for users to provide strong evidence to prove that the domain name is abusive.

4.2.1. Reporting Evidence

When entities receive abuse complaints, they require evidence to substantiate the charge, as all domain abuse is presumed until proven. Reasonable and complete evidence helps entities address abusive activities as quickly as possible, reducing the time of victimization and effort needed for entities to handle abuse reporting. The amount of documentation regarding the abusive domain names required varies from entity to entity, case to case, and type to type. As shown in Table 2, we summarize what most entities require evidence to be submitted to contain. The Orgs field in the table indicates the number of organizations we surveyed. Desc indicates the description of the reported abusive domain name.
There is no data to suggest that the more evidence there is, the better. The evidence submitted by the reporter can only be used as a reference, and the final judgment of whether a domain name is abusive lies in the abusive criteria set by each entity. More content will only increase the reporter’s workload and reduce the likelihood of reporting.

4.2.2. Reporting Channel

Internet entities provide different channels for receiving reports of abusive domains from reporters. Through our manual aggregation of channels of reporting services for a large number of entities, there are two main ways: Platform and Email. By comparison, the reporting platform format is more user-friendly than email for submitting evidence and maintaining uniformity of evidence for entities to reference and confirm the abuse. While establishing and maintaining the platform requires more resources, this approach helps deal with abusive behavior and enhances the entity’s credibility in the long run. Additionally, the reporting platform is more interactive, and the reporter can view the progress of the reported domain name and offer additional proof as necessary.
Reporting Platform. Users or organizations can report abusive activities to the entities through the reporting platforms. The models for these platforms include the web and apps (Figure 5), established and maintained by the entities. The entity displays the required evidence content of the abusive domain name (or URL) on the website or app, and the user can directly input and submit it. The administrative governance entity primarily uses a reporting platform to receive reports from the public. Meanwhile, the state or province provides an app to receive fraud or gambling abuse, as shown in Figure 5. In addition, some larger companies or organizations also use platforms to receive abusive reports, such as registrars like Alibaba Cloud Computing (Beijing) Co., Ltd. and Tencent Cloud Computing (Beijing) Limited Liability Company.
Reporting Email. Reporting abusive domains via email is the way most entities offered, even if a platform has been provided. Entities provide an email to receive reports of abuse, such as [email protected], and require that the content of the email contain evidence of the abusive domain name.

4.2.3. Overall

In this stage, we select the appropriate abusive domain names and report them to the corresponding Internet entities. The administrative governance entities can only coordinate with the responsible governance entities (Internet entities) to deal with abusive domain names. Therefore, this paper focuses on reporting abusive domains to Internet entities and assessing their effectiveness in dealing with abusive domains. Moreover, the abusive domains we report must be within the entities’ jurisdiction. Therefore, the corresponding Internet entity can be figured out by using the extensive base information (e.g., IP and registrar) of the abusive domain names we obtained in the previous stage. For example, using the IP location service provided by MaxMind (https://www.maxmind.com, accessed on 25 February 2022), we can discover the web hosting provider of the abusive domain.
We prefer the reporting platform if the entity gives it; otherwise, we use the email provided by the entity to report abuse. For instance, Figure 6 illustrates the template we use when reporting the registrar of domain name abuse; the details of the reported abuse for each entity we present in Section 5.

4.3. Evaluation of Handling Results

After reporting abusive domains to the Internet entities, we monitor changes in the domain names over time (e.g., domain status code) to determine whether the abusive domains are being handled and the methods used. As described in Section 3.4, various entities may have varying methods for handling abusive domains. As a result, we track changes in the data associated with various domain name dimensions to determine what methods Internet entities use to deal with abusive domains, as illustrated in Table 3.
For abusive domain names reported to the Internet entities, we need to monitor the changes in the corresponding data.
  • Registrar. We only need to pay attention to the changes in the registration information of the abusive domain names reported to the registrar to identify whether the registrar is handling reported domains. For example, in our subsequent monitoring data (Section 5), we find that the registrar would change the status of a real abusive domain name from OK to Serverhold or Clienthold, which results in the abusive domain name not being resolved properly.
  • Recursive DNS Resolver. The recursive server redirects the abused domain name to a specified IP address. We can discover this by tracking the changes in the IP address of the abusive domain.
  • ISP, DNS and Web Hosting Provider. For abusive domain names reported to these three types of Internet entities, we need to track both DNS and webpages in order to determine what methods they use to handle abusive domains. We use a web crawler to automate the retrieval of web pages for domain names.
  • Browser. To identify the method and effectiveness of handling abusive domain names at the browser level, we must manually enter the abusive domain into the browser. Then, we track the changes in the content of the web pages displayed by the browser.
We focus on two quantifiable metrics, the number of abusive domains handled and the response time, to evaluate the entity’s effectiveness in handling abusive domains. The more domains handled and the shorter response time indicate that the entity is more effective in handling abusive domains. On the other hand, we evaluate the effectiveness from a practical point of view by analyzing whether the methods used by Internet entities to deal with abusive domain names are evadable.

5. Reporting and Handling Results

In this section, we select and report the appropriate 2433 abusive domains to 43 service providers across six categories of Internet entities. We present the channels used by each provider to receive reports, identify their methods of dealing with abusive domain names, and analyze their effectiveness.

5.1. Domain Name Registrars

Domain registration is the initial step in an attack involving aggressive behavior. When registering domain names, abusers typically choose the appropriate registrar that offers affordable domain names or is less likely to interfere with domain name activities. As a result, registrars have a unique advantage in dealing with abusive domain names. From the registration information (i.e., WHOIS) of the abused domain name acquired, we extract the registrar’s name, a link to the registrar’s home page, and an email address for reporting abused domains. Then, using ICANN-authorized registrar information, we identify registrars affiliated with China, as listed in Table 4.

5.1.1. Reporting Methods for Registrars

As is well known, the domain registration information contains the registrar’s email for receiving reports of domain name abuse. Additionally, we examine registrars’ websites to see if they provide platforms for receiving reports. If both the platform and email channels are available, we prefer the platform. As seen in Table 4, all others, except AliCloud, DNSPod, and XinNet, provide solely email reporting channels. Along with domain name registration, the three companies that provide reporting platforms offer various other network services, such as cloud computing, so the platforms are better able to receive all kinds of abusive reports.
On the one hand, we would like to share our experience in the reporting process from the perspective of information feedback. Whether we report abusive domains via email or the platform’s method, most registrars will give us feedback, except for registrar MeiCheng. The feedback is mainly used to confirm that the report was received, that the domain we reported is not registered with this registrar, or to inform us that the abusive domain has been handled. This feedback is critical since it can demonstrate that reporters reported emails had been received rather than filtered into email spam.
On the other hand, we discuss our interactions with the registrar’s staff members who deal with abuse reports from an information interaction standpoint. The email method provides a more interactive experience than the platform. When employees have any questions about the domain that we reported by email, they promptly provide specific feedback, and we add further supporting data by directly replying to the email. However, because the platform’s appearance and ability to provide feedback are fixed, we can only get feedback passively from one another. If we have concerns about their unprocessed domain name, we cannot find an appropriate feedback channel, which may fail this complaint.

5.1.2. Handling Results

In order to promote the development of the Internet network, to ensure the safe and reliable function of the Internet domain name system, China’s Ministry of Industry and Information Technology formulated the Measures for the Administration of Internet Domain Names of China. The measure explicitly requires that the domain name registry or registrar address the abusive domain names, such as pornography and gambling domains. As a result, as shown in Table 4, all abusive domain names that we reported are being handled by the registrars. Additionally, most registrars cleaned up abusive domains within 24 h. We discuss those registrars who have unique cases.
  • Registrar AliCloud. This registrar operates various companies globally specializing in domain name registration, including Alibaba Cloud Computing (Beijing) Co., Ltd. (Beijing, China) and Alibaba.com Singapore E-commerce Private Limited. We reported the abusive domain names to the companies in Singapore and Beijing, respectively. As it turns out, the Beijing-based company handled the abusive domain names within 24 h. In comparison, the domains reported to the Singapore company took about five days to handle. Because two of the abusive domain names reported to the Singapore company did not work anymore, they were not addressed.
  • Registrar West Digital. Within three hours, the West Digital handled the gambling domains we reported. However, this registrar suggested that we report the pornographic domains to the administrative governance entity 12377-Center (described in Section 3.2). Two weeks after reporting numerous pornographic domain names to 12377-Center, we discovered that the registrar does not address these domains. We cannot determine whether these domains were not validated by 12377-Center, were not submitted to the registrar, or were not addressed by the registrar. Our future research will assess the administrative governance entity’s performance in dealing with abusive domain names.

5.1.3. Handling Methods

After the registrar handled the abusive domain names, we discovered that the registrar mainly employed two types of methods to handle abusive domains by checking changes of domain registration information. We detail the two types of methods as follows.
  • Setting domain status code to Serverhold or Clienthold. Extensible Provisioning Protocol (EPP) domain status codes, also called domain name status codes, indicate the status of a domain name registration [29]. For example, an “OK” EPP code indicates a normal state. The registry and registrar have the authority to set the domain status code to Serverhold and Clienthold respectively, which can cause the domains to be nonexistent in the DNS. As a result, more than 80% of registrars set the status codes of abusive domains to Clienthold to deal with abusive domains.
  • Invalidating domain nameservers (NS). The registrar changes the abusive domain name’s authoritative server with an incorrect one. As a result, the abusive domain name is not resolved correctly, and the user cannot obtain the domain IP address. For example, the registrars DNSPod, Juming, and MeiCheng are changing the authoritative servers to ns1.domains-hold.com and ns2.domains-hold.com.
In general, registrars are more effective in dealing with abusive domain names than other service providers (described in the next section) because of the guidance and constraints of laws and regulations. Some registrars could improve on their response time a bit more. In addition, we find that over 90% of the abusive domains (porn and gambling) in our database use non-Chinese domain registrars, such as Godaddy (https://godaddy.com, accessed on 25 February 2022), NameSilo (https://www.namesilo.com, accessed on 25 February 2022). Furthermore, non-Chinese registrars rarely deal with abusive domain names in the pornography and gambling categories, except for child pornography. This leads to some limitations in the scale of dealing with abusive domain names at the registrar level.

5.2. Internet Service Providers

Internet service providers (ISPs) provide services to users for accessing, using, or participating in the Internet. Theoretically, ISPs have more methods and authority to block abusive domains from accessing by users than other Internet entities. There are three ISPs in China: China Unicom, China Telecom, and China Mobile, as shown in Table 5.

5.2.1. Reporting Methods and Handling Results

As shown in Table 5, China Telecom and Mobile use the platform channel to receive reports of abusive domains, while Unicom uses email. In addition, none of the ISPs gave us feedback after we reported abusive domains. China Telecom gives users an inquiry code to check the progress of handling abusive domain names. Usually, abusive domain names, especially pornographic and gambling domain names, expect as many users to browse as possible, so their websites themselves do not restrict access to specific ISP users. Based on this, we design experiments to identify abusive domain names addressed by specific ISPs but not by other Internet entities. The main experimental steps are as follows.
  • Before reporting an abusive domain name to a specific ISP, confirm that users using the networks of all three ISPs can access the domain name normally.
  • When the domain name reported to a specific ISP is not accessible using that ISP, we use the other two ISP networks to access the domain name. If at least one ISP can still access the domain name usually, it means that the specific ISP handles the abusive domain name.
  • If each ISP could not access the domain name, the domain name was offline or was handled by another Internet entity other than the ISPs.
Finally, to our surprise, after one month, the abusive domains we reported were still working normally, except for one domain name that expired and two domains that went offline. All ISPs have not handled abusive domains we reported.

5.2.2. Handling Methods

For some time, ISPs did not handle the abusive domain names we reported. However, based on published studies [30,31] and our browsing of misused domains, we find that ISPs handle abusive domains primarily using two methods based on on-path blocking: DNS redirection and TCP reset.
  • DNS redirection. This method, also known as DNS filtering or poisoning, causes the DNS resolvers to return presupposed domain records (e.g., IP addresses) to the clients. This method may be used for malicious purposes such as phishing, for security and business purposes by a company (providing parental control or antivirus filtering services), for Internet service providers’ (ISPs’) own advertising purposes, or by the government to censor access to specific domains [32,33,34]. When we use the Telecom cellular network in Weihai City, Shandong province, to visit the domain j***j.com, the warning page shown in Figure 7a occurs. The page informs the visitor that the domain they visit is fraudulent, thereby prohibiting further access. We discovered that the domain j***j.com’s correct IP address was changed to 182.43.124.6 from 218.6.171.4.
  • TCP reset. TCP reset is a technique to tamper with and terminate the Internet connection by sending a forged TCP reset packet. This tampering technique can be used by ISPs’ or organizations’ firewalls [35,36,37]. For example, we can access the pornographic domain 6*****r.com normally using Shandong Telecom’s cellular network, but not using ISP Mobile, and the page as shown in Figure 7b.
ISPs give the public or cybersecurity professionals channels to report abusive domains. In addition, they all have their mechanisms to deal with these domains. However, based on our one-month observation, their response time to deal with abusive domain names needs to be improved. Because different types of abusive domain names have different survival time. For example, phishing domain names only have a few hours [38]; the longer the response time, the more harm caused by abusive domain names.

5.3. DNS Hosting Providers

DNS hosting providers offer authoritative DNS servers, which are servers that hold, and are responsible for, DNS resource records. The server at the bottom of the DNS lookup chain will respond with the queried resource records, such as IP addresses. Most, but not all, domain registrars include DNS hosting services with registration. Free DNS hosting services also exist. Many third-party DNS hosting services provide free authoritative DNS servers. This paper evaluates how well those providers offering free DNS hosting services handle abusive domain names, as listed in Table 6.

5.3.1. Reporting Methods

As we described earlier, providers offering multiple Internet services generally receive abuse reports for various types of services on the platform. Providers with only a small number of services can meet the reporting demand through the email channel, as shown in Table 6. In addition, one week after we reported the abusive domains to each DNS hosting provider, four providers have not given us any feedback on our reports, and the reported domains have not been addressed. Our attempts to contact them by email several times were also unsuccessful.

5.3.2. Handling Results and Methods

As shown in Table 6, all five DNS hosting providers handled the abusive domains we reported within 24 h, except for three domains that were not accessible at the time of provider verification and were not addressed. Based on the changes in DNS data before and after the abusive domain names were addressed, we inferred the provider’s methods of dealing with abusive domain names. These methods consist of three main types: DNS record deletion, denial of service, and response to servfail.
  • DNS Record Deletion. This method means that the providers remove the DNS records of the abusive domains we reported from their authoritative DNS servers. This results in the user requesting the IP address of the abused domain and getting a response that the domain name does not exist, thus prohibiting the user from accessing the abused domain name. For example, Providers Juming and 22.cn use this method to deal with abusive domain names.
  • Denial of Service. After the provider (e.g., Provider Xiamen DNS) uses this method to handle the abused domain name, we request the IP address of the abused domain name and find that the authoritative server does not respond to our request, thus causing the request to time out. This method of denial of service may occur at the authoritative server or at the firewall where the domain name resolution request reaches the authoritative server before.
  • Response to Servfail. When the authoritative server does not respond, returns a refuse code, or returns Serverfail, both result in the user receiving a Servfail status code returned by the DNS recursive server. For example, we found that Provider Tencent Cloud uses this method to handle abusive domains.
In summary, some DNS hosting providers can deal with reported abusive domains very quickly. However, because there are a large number of free and varying user size providers on the Internet, this results in abusive domains being handled by one provider and then being able to change to another very quickly and with essentially little time and effort. Our experience found that it takes a lot of effort and time to accurately identify the provider based on the name of the authoritative server used for the abused domain name, especially for lesser-known providers. This means that reporting abusive domain names to DNS hosting providers to fight abusive domain names is less effective than other entities.

5.4. Web Hosting Providers

In the same way as the registrar selection, we mainly report abusive domain names using Chinese web hosting providers and then analyze the effectiveness of these providers in dealing with abusive domain names. This is because websites within China require accurate name filing to run online and, at the same time, strict monitoring by domestic web hosting providers. Therefore, most abusive domains are run by non-Chinese web hosting providers. Some abusers choose web services provided by Chinese colocation providers outside of China (e.g., Hong Kong, China). Eventually, we obtained the abusive domains of the colocation providers running in China, as shown in Table 7.

5.4.1. Reporting Methods

As described in Section 4, we obtained the IP addresses of the abusive domains. Then, we combine the IP location services provided by MaxMind (https://www.maxmind.com/en/home, accessed on 25 February 2022), IPinfo (https://ipinfo.io, accessed on 25 February 2022) and IP138 (https://www.ip138.com, accessed on 25 February 2022) to identify the web hosting providers of the abusive domains. The methods each provider uses to receive reports of domain name misuse are detailed in Table 7. We discovered that most providers are offering abusive services reports by email solely. In comparison, most service providers that offer a variety of network-related services use the reporting platform to receive allegations of abuse. For instance, AliCloud, which offers web hosting and domain name registration, receives abuse reports via platform reporting from different businesses.
Several providers provide feedback on the report via email or platform following our reporting. This cordial engagement lets reporters verify that their reporting procedures are correct and providers have received their reports. Particularly in the case of email reporting, there is a great likelihood that the reporter’s email will be filtered into a spam mailbox by the provider’s mail server, resulting in the report’s failure.

5.4.2. Handling Methods and Results

We discovered two primary methods employed by hosting providers to address abusive domain names. One is to notify the website’s owner to remove the abusive content; the other is to cease providing website hosting services. For instance, AliCloud informed us that after receiving and verifying our report, it had instructed the website’s owner to delete the harmful information. Tencent Cloud, on the other hand, immediately ceases hosting abusive websites. As demonstrated in Table 7, only a few hosting providers responded to our report of abusive domain names seven days later. Tencent Cloud, for example, removed the abusive domain names within 48 h after receiving the report or after requesting additional evidence. AliCloud notified just the abusers, and our investigation revealed that the abusers did not remove the abusive content.
In summary, pornography and gambling-type abusive domains are poorly handled by providers after being reported to Chinese hosting providers. In our opinion, there are two primary causes for this. On the one hand, the IPs associated with abusive domains change frequently, and providers respond slowly to reports. As a result, the provider identifies the abusive domain IP, which may have changed to one that does not fall under the providers’ jurisdiction. Moreover, the IP addresses used for abusive domains may be shared, and a hosting provider that bans abusive IP services risks causing collateral damage to other users.

5.5. Recursive DNS Servers

This paper selects public recursive DNS resolvers (as shown in Table 8), commonly used in China, to analyze their effectiveness in handling abusive domain names. Some of these DNS servers have features that include handling abusive domain names. For example, the home version of OneDNS blocks pornography and gambling domains.
These recursive DNS servers do not provide reporting channels to the public. Therefore, we used each of these recursive DNS servers to resolve the abusive domains we found and then obtain the IP addresses of these domains. Finally, we discovered how these DNS servers handle abusive domain names by comparing the IPs of the specific domain names that each resolver responded to.
An overview of DNS resolvers and the results of their handling of abusive domain names are presented in Table 8. On the one hand, we did not find methods for handling abusive domain names from Alibaba 223.5.5.5, Tencent 119.29.29.29, and Baidu 180.76.76.76. We also did not find any relevant information on their official websites for handling abusive domain names (e.g., gambling domains). Of course, it could be because the type or scale of the abusive domain name we used is not on their blacklist of abusive domain names handled. We will continue this in our future research.
On the other hand, we need to highlight that the other three DNS servers deal with abusive domain names. These DNS recursive servers use DNS redirection (also called DNS hijacking) to block users from accessing abusive domains. The DNS recursive server responds to the user with a preconfigured IP address. For example, DNSPai and OneDNS return 47.75.69.19 and 23.91.96.155, respectively, and when a user accesses an abusive domain name, they will see a warning page, as shown in Figure 8.
Compared to our abusive domain dataset (300,000 porn and gambling domains), all four DNS recursive servers handle a smaller number of abusive domains, and OneDNS, which handles the most significant number of abusive domains, only accounts for 2% of the total. We speculate that having too many domains in the blacklist affects the response time of the recursive DNS servers. In addition, the long-term maintenance and updating of the blacklist are resource-intensive. Recursive DNS server providers need to balance benefits and security. Overall, DNS recursive servers are important entities that deal with abusive domain names and are well positioned to prevent users from being harmed by abusive domain names.

5.6. Web Browsers

Users use browsers developed by different companies to access pornographic or gambling domains. According to the browser market share published by StatCounter (https://gs.statcounter.com/browser-market-share/all/china, accessed on 25 February 2022) in February 2022, the top 6 browsers in China are Chrome (48.96%), UC Browser (https://www.ucweb.com, accessed on 25 February 2022) (11.86%), Safari (11.2%), QQ Browser (https://browser.qq.com, accessed on 25 February 2022) (8.51%), 360 Safe (https://browser.360.cn, accessed on 25 February 2022) (7.64%), and Edge (4.47%). In addition, browsers like Chrome, Safari, and Firefox mainly warn users of phishing and malware attacks on the domains or links they are browsing. Finally, we choose the browsers UC, QQ, and 360 Safe (The 360 Safe Browser has a version called 360 Extreme Browser, which can run on multiple platforms, so we chose this version) to see how they handle abusive domains. In addition, to make our evaluation more comprehensive, we evaluate the above three browsers on the Windows, IOS, and Android platforms simultaneously, as shown in Table 9.

5.6.1. Reporting Methods

All three browsers use the reporting platform to receive abusive domain reports. However, the form of the platform differs from browser to browser, as shown in Table 10. Both browsers, QQ and 360 Safe, have an independent reporting channel on their interfaces. They have a very prominent reporting button that makes it easy for users to report the abusive domain names they visit. However, 360 Safe Browser only has this service on the android platform, while QQ Browser has it on both mobile platforms. Browsers who want to report abusive domain names to UC Browser need to report them to the online customer service center it provides. This form of reporting is not clear enough, and we had to consult with its customer service before confirming this form.
To our surprise, all browser versions on the PC platform do not provide the channel to report abusive domain names. The friendlier and more convenient the form of domain name reporting for abuse, the more willing and effective the viewer will be in reporting abusive domains. This is supported by the effectiveness of browsers in handling abusive domain names, as described in the following section. At different periods, we reported 50 unaddressed abusive domains to each of the three browsers. Moreover, we set the same number of unreported abusive domains as a comparison group to evaluate how each browser handled abusive domains.

5.6.2. Handling Methods

As shown in Figure 3, three browsers mainly prevent users from browsing abusive domains by methods of Warning or Redirection. For example, Figure 3b shows QQ Browser warning users that they are browsing abusive domains. This warning method still allows the user to keep going to the abusive domain name. On the other hand, redirection is a way to redirect the user to a different warning page to inform them that the page is illegal and that they do not have permission to continue accessing the abused domain, as shown in Figure 3c. In the course of our experiments, we found that the browser’s handling of a domain name is not set in stone and may change from a warning to a redirection.

5.6.3. Handling Results

Due to the high volume of images and videos on pornographic and gambling websites, the pages take longer to load completely. Additionally, it takes time for the browser to determine whether or not the domain name is abusive. As a result, we wait 10 s for the page to load and then attempt it no more than three times more. Finally, we get the results of the browser handling the reported abusive domain names, as shown in Figure 9. Figure 10 illustrates the browser’s processing of the unreported abusive domain names in the control group.
First, the reported and unreported domains results show that each browser handles some of the reported abusive domains, which proves the validity of our reporting and experimental results.
Second, the number of abusive domain names handled is the highest in the mobile Browser UC, accounting for 80% of the total number, 60% in the Browser QQ, and only 20% in the Browser 360 Safe. We visit the malicious URL reporting channel of the 360 Security Service (https://fuwu.360.cn/jubao/wangzhi, accessed on 25 February 2022), which mainly receives reports of abuse in the phishing and malware categories. This may be the reason why it handles fewer pornographic and gambling domains.
In addition, the mobile versions of each browser (i.e., Android and IOS) handle the same number of abusive domain names. This indicates that they use the same mechanism for handling abusive domain names, such as blacklists. On the other hand, the quantity of abusive domain names handled by the QQ and UC browsers on Windows is far less than mobile. We brought this security concern to the attention of the UC and QQ browsers’ customer service. The UC Browser’s customer service told us that the browser’s Windows version is no longer being updated and that their product focus is primarily on mobile browsers. Unfortunately, the QQ Browser’s customer service has not given us any feedback yet.
Verifying how different browsers on different platforms handle abusive domain names requires manually typing URLs into mobile browsers, which requires considerable time and effort. As a result, to maximize efficiency, we conducted early experiments to see whether our reported abusive domains were addressed only after a specified period (e.g., three days). However, we later desired to identify when the browsers began handling the reported abusive domains. Therefore, we re-reported 20 abusive domains to the mobile QQ and UC browsers, respectively. We verify whether our reported abusive domains are processed at two-time points (10 a.m. and 4 p.m. from Monday to Sunday) and compute their browser response time accordingly.
The response time of two browsers to the abused domain name is shown in Figure 11. We can see that UC handled 80% of the abusive domains within 24 h of reporting, while QQ Browser addressed about 60% of the abusive domains by day 5. Then the number of abusive domains addressed does not change anymore.
Browsers are the final barrier to blocking users from accessing abusive domain names. Some browsers generally have better results in dealing with reported abusive domain names. This can significantly reduce the risk of users accessing abusive domain names. However, there are two shortcomings in the browser’s handling of abusive domain names simultaneously. One is that most browsers only warn users that the domain name is risky rather than prohibiting them from accessing it. Users can still ignore the warning and continue to browse the web content, such as porn sites. Second, browsers have different market shares and handle different types of abusive domain names, which means that browsers can only protect a specific scope of users.

6. Discussion and Suggestion

In this section, we discuss topics related to the reporting and handling of abusive domain names by Internet entities in our practice to give researchers a better understanding of the current state. In addition, we provide suggestions to the relevant entities involved in handling abusive domain names. From a global perspective, our research aims to serve as a reference for governments, Internet entities, Internet agencies (e.g., ICANN, CERT), domain abuse reporters, and domain name owners when dealing with abusive domains.

6.1. Non-Abusive Domain Name Appeals

When an Internet entity incorrectly labels a domain name as abusive, the domain owner must file a complaint with the entity demonstrating compliance with the domain name. As a result, each Internet institution that deals with domain name misuse should provide a mechanism for appealing misclassifications. While reporting abusive domain names, we discovered that some significant Internet entities (e.g., browsers and recursive DNS servers) lack or have insufficient appeal channels. Table 11 lists whether the Internet entity provides channels for appeal in our practice.
  • Registrars. Suppose the registrar determines that a domain name is abusive. In that case, the registrar notifies the user and requests that the user either remove the abusive content or prove the domain name’s innocence. If the domain name is mistakenly judged to be abusive, the domain name owner will simply submit the required evidence to the registrar.
  • Internet Service Providers. When ISPs use DNS redirection to intercept abusive domains, they provide a complaint channel, such as a phone number, on the redirected web page (as shown in Figure 7). If TCP reset interception is used, no appeal channel is provided, and domain owners may not even know why their domains are not accessible to users.
  • DNS and Web Hosting Providers. When a domain name is confirmed to have abusive activity, the DNS and Web hosting providers will notify the domain owner to clean it up immediately. Just like with registrars, this is a passive method of receiving notifications. However, we are confused by a circumstance. That is, if the abusive domain name expires and is re-registered, the domain owner has no recourse if the hosting provider continues to block the legitimate new domain name.
  • Recursive DNS Servers and Browsers. These two Internet entities do not provide a direct complaint channel. Their handling of non-abusive domain names can significantly impact the domain name owner. The exception is Browser QQ, whose developer is Tencent Company, which provides an apparel channel. Even with a successful complaint, we do not know if QQ Browser will still block the domain name.
In our experience, there are cases where benign domain names have been misidentified as misused. For example, in Section 6.4, we registered two new domain names that were wrongly identified as malicious. Therefore, our recommendations to participants in the entire DNS ecosystem are as follows.
  • Internet entities. Every Internet entity that supports the DNS ecosystem should give domain name owners a channel to appeal, as they do for reporting abusive domain names. Moreover, Internet entities should be more efficient in dealing with domain names that are indeed misclassified as abusive, because dealing with the non-abusive domain is much more about a company’s reputation than dealing with the abusive one.
  • Domain owners. On the one hand, domain (website) owners should always proactively check whether their websites are being attacked by cybercriminals, such as through embedded malicious codes or phishing URLs. On the other hand, when their domains are mistakenly reported, the owners should either address the malicious behavior of their domain names based on the warning information provided by the Internet entities, or give as much evidence as possible about the domains being benign.
  • Domain abuse reporters. We believe that abusive domain name reporters should be trained in order to reduce the cases of misreporting. On the one hand, reporters should be trained to identify various types of abusive domain names. For example, they should be trained to correctly identify the brands being spoofed by phishing sites or use third-party detection tools (e.g., PhishTank (https://www.phishtank.com, accessed on 25 February 2022), Virustotal (https://www.virustotal.com, accessed on 25 February 2022) to identify malicious domains. On the other hand, reporters should be trained to identify each Internet entity that provides service for abusive domain names, especially those that are more difficult to identify, such as web-hosting providers or DNS hosting providers, as we described in the previous section.

6.2. Optimal Handling Internet Entities and Methods

In Section 5, we discussed the results of each Internet entity’s handling of abusive domain names based on its characteristics and authority within the DNS ecosystem. We find that the scale of users protected varies from Internet entity to Internet entity. Moreover, the strategy and expense used for the abusive domain name to evade handling are related to which entity uses which method of handling. These two factors are directly related to the effectiveness of dealing with abusive domain names. In this section, we discuss the impact and escapability of the methods used by Internet entities to handle abusive domains so that security employees can use them as a reference for reporting and dealing with abusive domains.
  • Domain Name Registrars. The registrars apply the Serverhold or Clienthold status to stop abusive domains from resolving on the Internet. None of their services (e.g., websites) will work when domains have this status. In addition, abusive domain names cannot circumvent this handling method.
  • Web Hosting Providers. The providers discontinue providing web hosting services for the abused domain name, and the abused domain name (or website) becomes inaccessible to the public. However, the abuser can re-host the website with a web hosting service that is not sensitive to handle abusive domains. As a result, abusers can evade handling by the web hosting providers at little cost.
  • DNS Hosting Providers. The DNS hosting providers remove the DNS records for the abusive domain name from the authoritative DNS servers or simply refuse to provide resolution services for the abusive domain name. Then, the abusive domain name can no longer attack anyone. However, many DNS hosting providers on the Internet offer free DNS hosting services, which allows abusers to switch to another DNS hosting provider at no cost.
  • ISPs, Recursive DNS Resolvers, and Browsers. All three of these Internet entities can only protect clients using their services from abusive domain names. While their protection scopes are limited, there are no escape methods for abusive domain names against them.
Overall, based on the current state of affairs, selecting the appropriate Internet entity to handle abusive domains to obtain the best results is a complex task. Therefore, based on our research, we present our recommendations to governments, Internet communities and entities, and researchers.
  • Internet entities. As contributing members of the global DNS ecosystem, Internet entities should have mechanisms to address domain name abuse, including receiving reports of abuse, handling abusive domain names, and complaining about misreported abuse. The best results can be achieved by joining all Internet entities to deal with abusive domain names.
  • Governments and Internet communities. As advocated by ICANN, establishing a suitable joint security organization to unify and coordinate the disposal of abusive domain names is one of the optimal methods. Each national government has its own police force to ensure social stability in the real world. Similarly, on the Internet, governments need to participate in the establishment of Internet security organizations, at least as the Chinese government engages in the reporting stage of domain name abuse.
  • Domain abuse reporters/researchers. While domain abuse reporters or researchers can report to all Internet entities involved in abusive domains without discrimination, this reporting mechanism can achieve the effect of abusive domains being handled, but not the optimal effect, while significantly increasing the workload of Internet entities and burdening them. Therefore, reporters should select the most appropriate Internet entity to report based on the characteristics of the abusive domains and the Internet entities, respectively.

6.3. Abusive Domain Reporting Investigation

We conducted a web survey regarding domain name abuse reporting at university. In total, 252 questionnaires were collected from individuals with a bachelor’s degree or higher, accounting for approximately 80% of the population. Almost 85% of them have seen inappropriate content such as pornography or gambling while browsing the web.
As shown in Figure 12, nearly 57% of people do not know what reporting channels are available. About 17% were aware of the reporting channels provided by the administrative governance entity (e.g., 12377-Center). Even fewer people know about the reporting channels of other Internet entities, except for browsers. With most highly educated people who know less about reporting abusive domain names, let alone the common Internet user, using reports from the average Internet user to clean up abusive domain names on the Internet, such as pornography and gambling, will not be very effective.
Therefore, in order to better deal with the abusive domain names on the Internet, we suggest the following two aspects.
  • Governments or Internet communities. On the one hand, governments and Internet communities need to enhance knowledge dissemination and guidance to the public on reporting abusive domains. On the other hand, reporting abusive domain names should be friendly and straightforward. Our reporting process found that requiring too much evidence to be submitted is more likely to increase the burden on the reporter and that Internet entities still need to verify each reported domain. Finally, governments should make it clear what Internet entities should do to fight abusive domains and give them oversight and guidance.
  • Internet entities. The source of abusive domains cannot rely too heavily on abuse reports from the public. Internet entities should use their own resources to detect and discover abusive domain names more proactively. They should take up the responsibility and obligation of Internet security. For example, Han *** Fei, the registrant of domain m****p.cn, registered many other domains with the registrar Guangzhou Yunxun Information Technology Co. Then the registrar should take the initiative to verify the other domain names under that account and deal with the abusive domain names therein. Therefore, when Internet entities take the initiative to remove domains that use their resources for abusive attacks, reports of abusive domain names are relatively reduced, saving the time and effort that entities invest in handling abusive reports and improving their reputation.

6.4. Abusive Domain Name Blacklist Updates Lag

Internet entities, such as browsers or recursive DNS servers, often maintain a blacklist of abusive domain names and take action against domains if they are currently on the blacklist. Because domains change regularly (e.g., re-register after expiration) and are no longer abusive, the blacklist must determine when and how to update.
We did experiments to show that QQ Browser’s abusive domain blacklist does not get updated as quickly as it should. The domains 686446.com and kmm6.cn are both abusive domains and are blacklisted in the QQ browser, as shown in Figure 13. After they expired, we registered these two domains with the registrar AliCloud. Then, we used the Python command (python3 -m http.server 80) to build a website and had the two domains associated with it. Finally, we then used the QQ browser to browse these two domains, and the result is shown in Figure 14, where the browser still pops up the warning message. Moreover, it has been more than four months since these two domains were no longer abused.
As we can see from the above experiment, a delay in updating the blacklist of Internet entities will cause issues for domain owners and viewers, potentially resulting in economic losses for domain owners and causing customers to doubt the company’s reputation. Global Internet entities and domain name owners can refer to our research as follows.
  • Internet entities. From a technological standpoint, with the growing number of abusive domains on the Internet, the blacklist cannot be increased indefinitely, which will decrease the efficiency of matching abusive domains. Therefore, for Internet entities that use blocklists to block or deal with abusive domain names, the validity of the domain names in the blocklist needs to be proactively updated periodically.
  • Domain name owners. In order to prevent the newly registered domain names from being blocked because they were once malicious domain names, domain owners (registrants) can use malicious domain detection tools (e.g., Phishtank, Virustatal) to detect the domain name they want to register. In particular, when domain names are misclassified as abusive, the owner needs to file a complaint based on the information provided by the cyber entity as described in Section 6.1.

6.5. Internet Entities Fail to Identify Abusive Domains

When we report abusive domain names to entities, they occasionally respond that the domain name is not abusive, is not utilizing their resources, or is inaccessible. This section summarizes the following reasons for Internet entities’ failure to identify abusive domain names.
  • The resources used by the abusive domain changed. The resource provider involved with the abusive domain name responds to our report after some time, such as 24 or 48 h. During this time, some resources may change, such as the IP address of the abused domain name, which would indicate a possible change in the web hosting provider. Therefore, the hosting provider that received our report informed us that the abusive domain name was not using its resources.
  • Domain name not accessible. One possibility is that by the time the Internet entity checks, the abusive domain has already been taken down and become unreachable. Another scenario we discovered was that the misused domain name was online but could not be accessed by the Internet entity’s ISP network. This could be because a specific ISP has addressed the abusive domain.
  • Abusive Domains masquerading as normal. Internet entities, such as registrars, have often informed us that the reported abusive domain names are normal. The primary reason for this is that when the security officer accesses the domain via a computer browser, the abusive domain either masquerades as a legitimate website (as illustrated in Figure 15a) or simply returns a 404 page. However, when the security officer uses a mobile browser to view it, the exploited web content is shown (as shown in Figure 15b). Additionally, several abusive domains display various online content depending on the day, such as normal websites during the day and pornographic websites at night. This effectively prevents security officers from inspecting and dealing with them during working hours.
Therefore, based on our experience in reporting abusive domains, we have summarized our recommendations for Internet entities and reporters as follows.
  • Domain abuse reporters. To enable Internet entities to deal with abusive domain names more quickly and efficiently, we suggest that reporters include additional features of abusive domain names in their reports, such as the requirement to access the domain name using a mobile browser, to enable security officers to do more accurate checks on abusive domain names. This can greatly improve the success rate of abuse reports and the effectiveness of dealing with abusive domain names.
  • Internet entities. Internet entities should reduce response time for abusive domains and be aware of common abusive domain masquerade strategies, which can significantly boost the efficiency of abusive domain handling.

6.6. Future Work

This paper focuses on evaluating Internet entities dealing with pornography and gambling domains. One limitation of our study is that other types of abusive domain names, such as phishing and malware, are not covered. However, the methods of Internet entities in dealing with abusive domain names are the same. As shown in Figure 16, we reported phishing domains to the registrars, which handle abusive domains by setting the domain status to ClientHold. In the future, we will study other types of abusive domain names, such as phishing and malware. These abusive domain names with offensive behavior have more complex characteristics and require entities to have faster response times to them. On the other hand, we would like to analyze the operating model of the administrative governance entities in China and assess how much of a role they play in handling abusive domain names.

7. Conclusions

In this paper, we present the first empirical study on the usability and effectiveness of Internet entities (i.e., 43 organizations across six categories of Internet entities) in receiving abusive reports and handling abusive domains. We discover that different Internet entities differ in the number of abusive domain names they handled and their response time. In addition, there are significant differences in the scale of user protection between the handling methods used by Internet entities. Moreover, abusive domain names may adopt escape techniques to evade handling depending on the features of the methods. In addition, there is room for further improvement in the entity’s approach to receiving reports, verifying the authenticity of reports, and handling abusive domains. All in all, the fight against abusive domains is not the fight of one person or organization but a battle that requires the entire community’s participation.

Author Contributions

Conceptualization, Y.C. and Z.Z.; methodology, Y.C. and Y.L.; software, Y.C.; validation, L.W., Y.C. and Y.L.; formal analysis, T.C.; investigation, Y.C.; resources, L.W.; data curation, T.C.; writing—original draft preparation, Y.C. and L.W.; writing—review and editing, Y.C. and T.C.; visualization, Y.C. and T.C.; project administration, Z.Z. and Y.D. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Natural Science Foundation of Shandong Province [Grant No. ZR2020KF009] and the Young Teacher Development Fund of Harbin Institute of Technology [Grant No. IDGA10002081].

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. 2019 Internet Crime Report Released. Available online: https://www.fbi.gov/news/stories/2019-internet-crime-report-released-021120 (accessed on 25 February 2022).
  2. Internet Organised Crime Threat Assessment (IOCTA). 2019. Available online: https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2019 (accessed on 25 February 2022).
  3. M3AAWG Anti-Abuse Best Common Practices for Hosting and Cloud Service Providers. Available online: https://www.m3aawg.org/sites/default/files/document/M3AAWG_Hosting_Abuse_BCPs-2015-03.pdf (accessed on 25 February 2022).
  4. Szurdi, J.; Kocso, B.; Cseh, G.; Spring, J.; Felegyhazi, M.; Kanich, C. The long “taile” of typosquatting domain names. In Proceedings of the 23rd USENIX Security Symposium (USENIX Security 14), San Diego, CA, USA, 20–22 August 2014; pp. 191–206. [Google Scholar]
  5. Antonakakis, M.; Perdisci, R.; Dagon, D.; Lee, W.; Feamster, N. Building a dynamic reputation system for DNS. In Proceedings of the 19th USENIX Security Symposium (USENIX Security 10), Washington, DC, USA, 11–13 August 2010. [Google Scholar]
  6. Plohmann, D.; Yakdan, K.; Klatt, M.; Bader, J.; Gerhards-Padilla, E. A comprehensive measurement study of domain generating malware. In Proceedings of the 25th USENIX Security Symposium (USENIX Security 16), Austin, TX, USA, 10–12 August 2016; pp. 263–278. [Google Scholar]
  7. Liu, D.; Li, Z.; Du, K.; Wang, H.; Liu, B.; Duan, H. Don’t let one rotten apple spoil the whole barrel: Towards automated detection of shadowed domains. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 30 October–3 November 2017; pp. 537–552. [Google Scholar]
  8. Tian, K.; Jan, S.T.K.; Hu, H.; Yao, D.; Wang, G. Needle in a haystack: Tracking down elite phishing domains in the wild. In Proceedings of the Internet Measurement Conference 2018, New York, NY, USA, 31 October–2 November 2018; pp. 429–442. [Google Scholar]
  9. Jhaveri, M.H.; Cetin, O.; Gañán, C.; Moore, T.; Eeten, M.V. Abuse reporting and the fight against cybercrime. ACM Comput. Surv. 2017, 49, 1–27. [Google Scholar] [CrossRef]
  10. SAC115 SSAC Report on an Interoperable Approach to Addressing Abuse Handling in the DNS. Available online: https://www.icann.org/en/system/files/files/sac-115-en.pdf (accessed on 25 February 2022).
  11. Public Security Administration Punishment Law of the People’s Republic of China. Available online: http://www.law-lib.com/law/law_view.asp?id=403793 (accessed on 25 February 2022).
  12. Standing Committee of the National People’s Congress. Criminal Law of the People’s Republic of China. Available online: https://www.gzzx.gov.cn/rdzt/kjyqgzzxzxd_1/fyygflfg/202106/P020210615548394847969.pdf (accessed on 25 February 2022).
  13. The Central People’s Government of the People’s Republic of China. Decision of the Standing Committee of the National People’s Congress on Maintaining Internet Security. Available online: http://www.gov.cn/gongbao/content/2001/content_61258.htm (accessed on 25 February 2022).
  14. The State Council Information Office of the People’s Republic of China. Indonesia Will Block 90% of Pornographic Websites. Available online: http://www.scio.gov.cn/wlcb/blxxjbygl/Document/732654/732654.htm (accessed on 25 February 2022).
  15. List of Accredited Registrars. Available online: https://www.icann.org/en/accredited-registrars?sort-direction=asc&sort-param=name&page=1&view-all=true (accessed on 25 February 2022).
  16. Cheng, Y.; Chai, T.; Zhang, Z.; Lu, K.; Du, Y. Detecting malicious domain names with abnormal whois records using feature-based rules. Comput. J. 2021. [Google Scholar] [CrossRef]
  17. Shin, S.; Gu, G. Conficker and beyond: A large-scale empirical study. In Proceedings of the 26th Annual Computer Security Applications Conference, New York, NY, USA, 6–10 December 2010; pp. 151–160. [Google Scholar]
  18. Xia, P.; Nabeel, M.; Khalil, I.; Wang, H.; Yu, T. Identifying and characterizing COVID-19 themed malicious domain campaigns. In Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy, Virtual Event, USA, 26–28 April 2021; pp. 209–220. [Google Scholar]
  19. Cetin, O.; Ganán, C.; Altena, L.; Tajalizadehkhoob, S.; van Eeten, M. Let me out! Evaluating the effectiveness of quarantining compromised users in walled gardens. In Proceedings of the Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), Baltimore, MD, USA, 12–14 August 2018; pp. 251–263. [Google Scholar]
  20. Çetin, O.; Gañán, C.; Altena, L.; Tajalizadehkhoob, S.; Van Eeten, M. Tell me you fixed it: Evaluating vulnerability notifications via quarantine networks. In Proceedings of the 2019 IEEE European Symposium on Security and Privacy (EuroS&P), Stockholm, Sweden, 17–19 June 2019; pp. 326–339. [Google Scholar]
  21. Maass, M.; Stver, A.; Pridhl, H.; Bretthauer, S.; Herrmann, D.; Hollick, M.; Spiecker, I. Effective notification campaigns on the web: A matter of trust, framing, and support. In Proceedings of the 30th USENIX Security Symposium, Virtual Event, 11–13 August 2021; pp. 2489–2506. [Google Scholar]
  22. Vasek, M.; Moore, T. Do Malware reports expedite cleanup? An experimental study. In Proceedings of the CSET’12, Bellevue, WA, USA, 6 August 2012. [Google Scholar]
  23. Ongoing Community Work to Mitigate Domain Name System Security Threats. Available online: https://blog.verisign.com/domain-names/ongoing-community-work-to-mitigate-domain-name-system-security-threats/ (accessed on 25 February 2022).
  24. Eco topDNS Initiative Fights DNS Abuse. Available online: https://circleid.com/posts/20220208-eco-topdns-initiative-fights-dns-abuse (accessed on 25 February 2022).
  25. Hu, H.; Jan, S.T.K.; Wang, Y.; Wang, G. Assessing Browser-level defense against IDN-based phishing. In Proceedings of the 30th USENIX Security Symposium (USENIX Security 21), Anaheim, CA, USA, 11–13 August 2021; pp. 3739–3756. [Google Scholar]
  26. Liu, H.L.; Levchenko, K.; Félegyházi, M.; Kreibich, C.; Maier, G.; Voelker, G.M. On the effects of registrar-level intervention. In Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11), Berkeley, CA, USA, 29 March 2011. [Google Scholar]
  27. Hazhirpasand, M.; Ebrahim, A.A.; Nierstrasz, O. Stopping DNS rebinding attacks in the browser. In Proceedings of the ICISSP, Online Streaming, 11–13 February 2021; pp. 596–603. [Google Scholar]
  28. Illegal and Bad Information Reporting Center of the Central Cyberspace Administration of China (National Internet Information Office). Acceptance of National Online Reports in December 2021. Available online: https://www.12377.cn/tzgg/2022/14500bc7_web.html (accessed on 25 February 2022).
  29. EPP Status Codes|What Do They Mean, and Why Should I Know? Available online: https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en (accessed on 25 February 2022).
  30. Su, L.; Cong, J.; Zhao, L.-Y. Research and analysis of the re-capturing porn sites. Telecom Eng. Tech. Stand. 2011. [Google Scholar]
  31. Hunan: The Provincial Communications Administration Has Achieved Remarkable Results in Rectifying Harmful Information on the Internet. Available online: https://www.shdf.gov.cn/shdf/contents/773/336737.html (accessed on 25 February 2022).
  32. Crandall, J.R.; Zinn, D.; Byrd, M.; Barr, E.T.; East, R. A weather tracker for Internet censorship. In Proceedings of the 14th ACM Conference on Computer and Communications Security—CCS 07, Alexandria, VA, USA, 29 October–2 November 2007; pp. 352–365. [Google Scholar]
  33. Xu, X.; Mao, Z.M.; Halderman, J.A. Internet censorship in China: Where does the filtering occur? In Proceedings of the International Conference on Passive and Active Network Measurement, Atlanta, GA, USA, 20–22 March 2011; pp. 133–142. [Google Scholar]
  34. Wander, M.; Boelmann, C.; Schwittmann, L.; Weis, T. Measurement of globally visible dns injection. IEEE Access 2014, 2, 526–536. [Google Scholar] [CrossRef]
  35. Anonymous. Towards a comprehensive picture of the great firewall’s DNS censorship. In Proceedings of the 4th USENIX Workshop on Free and Open Communications on the Internet (FOCI’14), San Diego, CA, USA, 18 August 2014. [Google Scholar]
  36. Raman, R.S.; Shenoy, P.; Kohls, K.; Ensafi, R. Censored planet: An Internet-wide, longitudinal censorship observatory. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 9–13 November 2020; pp. 49–66. [Google Scholar]
  37. Wang, Z.; Cao, Y.; Qian, Z.; Song, C.; Krishnamurthy, S.V. Your state is not mine: A closer look at evading stateful Internet censorship. In Proceedings of the 2017 Internet Measurement Conference, London, UK, 1–3 November 2017; pp. 114–127. [Google Scholar]
  38. Oest, A.; Zhang, P.; Wardman, B.; Nunes, E.; Burgis, J.; Zand, A.; Thomas, K.; Doupé, A.; Ahn, G.-J. Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20), Boston, MA, USA, 12–14 August 2020. [Google Scholar]
Figure 1. Conceptual diagram of the Internet ecosystem portion contractually.
Figure 1. Conceptual diagram of the Internet ecosystem portion contractually.
Electronics 11 01172 g001
Figure 2. Handling Abusive domain name framework and reporting channels.
Figure 2. Handling Abusive domain name framework and reporting channels.
Electronics 11 01172 g002
Figure 3. Browsers warn or block users from accessing abusive domains. (a) Google Chrome. (b) Tencent QQ Browser. (c) UC Browser.
Figure 3. Browsers warn or block users from accessing abusive domains. (a) Google Chrome. (b) Tencent QQ Browser. (c) UC Browser.
Electronics 11 01172 g003
Figure 4. The process of evaluating the effectiveness of Internet entities in dealing with abusive domain names.
Figure 4. The process of evaluating the effectiveness of Internet entities in dealing with abusive domain names.
Electronics 11 01172 g004
Figure 5. Reporting platform in the form of an App. (a) National Anti-Fraud Center. (b) Beijing Anti-Fraud Center. (c) Shandong Anti-Fraud Center.
Figure 5. Reporting platform in the form of an App. (a) National Anti-Fraud Center. (b) Beijing Anti-Fraud Center. (c) Shandong Anti-Fraud Center.
Electronics 11 01172 g005
Figure 6. Email template for reporting abusive domains to registrars.
Figure 6. Email template for reporting abusive domains to registrars.
Electronics 11 01172 g006
Figure 7. ISPs handle abusive domains. (a) Users of ISP China Telecom in Weihai, Shandong province browse the gambling domain name j***j.com. (b) Users of ISP China Mobile in Weihai, Shandong province browse the porn domain name 6*****r.com.
Figure 7. ISPs handle abusive domains. (a) Users of ISP China Telecom in Weihai, Shandong province browse the gambling domain name j***j.com. (b) Users of ISP China Mobile in Weihai, Shandong province browse the porn domain name 6*****r.com.
Electronics 11 01172 g007
Figure 8. Recursive DNS servers use DNS redirect to handle abusive domains. (a) DNSpai. (b) OneDNS.
Figure 8. Recursive DNS servers use DNS redirect to handle abusive domains. (a) DNSpai. (b) OneDNS.
Electronics 11 01172 g008
Figure 9. The results of each browser handling the reported abusive domains.
Figure 9. The results of each browser handling the reported abusive domains.
Electronics 11 01172 g009
Figure 10. The results of each browser handling the unreported abusive domains.
Figure 10. The results of each browser handling the unreported abusive domains.
Electronics 11 01172 g010
Figure 11. Browser response time for handling abusive domain names.
Figure 11. Browser response time for handling abusive domain names.
Electronics 11 01172 g011
Figure 12. Percentage distribution of which entities people are aware of reporting to.
Figure 12. Percentage distribution of which entities people are aware of reporting to.
Electronics 11 01172 g012
Figure 13. Detection results of abusive domain names in Tencent Security Center. (a) kmm6.cn. (b) 686446.com.
Figure 13. Detection results of abusive domain names in Tencent Security Center. (a) kmm6.cn. (b) 686446.com.
Electronics 11 01172 g013
Figure 14. Using QQ browser accesses two non-abusive domains. (a) kmm6.cn. (b) 686446.com.
Figure 14. Using QQ browser accesses two non-abusive domains. (a) kmm6.cn. (b) 686446.com.
Electronics 11 01172 g014
Figure 15. Using browsers of different platforms to access the same abusive domain name. (a) MacBook Safari. (b) iPhone Safari.
Figure 15. Using browsers of different platforms to access the same abusive domain name. (a) MacBook Safari. (b) iPhone Safari.
Electronics 11 01172 g015
Figure 16. Registrars handle phishing domains. (a) Registrar NameCheap, Inc. (from the USA) handles phishing domain smartauthsync.com. (b) Registrar PDR Ltd. (from India) handles phishing domain flluffymaltipoodogs.com.
Figure 16. Registrars handle phishing domains. (a) Registrar NameCheap, Inc. (from the USA) handles phishing domain smartauthsync.com. (b) Registrar PDR Ltd. (from India) handles phishing domain flluffymaltipoodogs.com.
Electronics 11 01172 g016
Table 1. Summary of methods for Internet entities to deal with abusive domain names.
Table 1. Summary of methods for Internet entities to deal with abusive domain names.
EntityMethod
RegistrarDomain Hold/Resolution Redirection
Recursive DNS ResolverResolution Redirection
Web Hosting ProviderTermination of Services
DNS Hosting ProviderTermination of Services
ISPBlocking Access/Resolution Redirection
BrowserBlocking Access/Warning
Table 2. Overview of what are included in the evidence reported to the entities.
Table 2. Overview of what are included in the evidence reported to the entities.
EntityOrgsURLSnapshotDescTitleNameEmailPhone
12377-Center- 1✓ 2✕  3
shdf-Center-
12321-Center-
Internet-110-
Registrar16
DNS Provider9
Web Provider11
Recursive DNS6-------
ISP3
Browser3
1 This means that there is no organization, or no need to report. 2 This means that the evidence needs to contain the contents of the field. 3 This means that the evidence does not need to contain the contents of the field.
Table 3. Data on each dimension of the abusive domain names corresponding to the Internet entities.
Table 3. Data on each dimension of the abusive domain names corresponding to the Internet entities.
EntityData
WHOISDNSWebpage-CrawlerWebpage-Browser
Registrar✓ 1
Recursive DNS Resolver
DNS Hosting Provider
Web Hosting Provider
ISP
Browser
1 This means that the corresponding Internet entity handling results are found through this data.
Table 4. Overview of domain registrars and handling results of abusive domain names.
Table 4. Overview of domain registrars and handling results of abusive domain names.
ReportingRegistrar (Abbr.)FeedbackResultsTimeMethod
PlatformAliCloud✓ 1100%24 hStatus
EmaileName100%24 hStatus
PlatformDNSPod100%24 hNS
PlatformXinNet100%48 hStatus
EmailWest Digital100%3 hStatus
EmailYuqu100%24 hStatus
Email22net100%24 hStatus
EmailInternational100%24 hStatus
EmailBangning100%24 hStatus
EmailJuming100%3 hNS
EmailBizcn100%24 hStatus
EmailMeiCheng✕ 2100%48 hNS
Email35.Com100%24 hStatus
EmailInnovative100%24 hStatus
EmailNawang100%3 hStatus
EmailChinaSource100%24 hStatus
1 This means that the registrars will inform the reporters of the receipt of the abuse reports. 2 This means that registrars do not inform repoters whether they have received abuse reports.
Table 5. Overview of ISPs in China.
Table 5. Overview of ISPs in China.
ISPReportingFeedback
China UnicomEmail✕ 1
China TelecomPlatform
China MobilePlatform
1 This means that ISPs do not inform repoters whether they have received abuse reports.
Table 6. Overview of DNS Hosting Providers.
Table 6. Overview of DNS Hosting Providers.
CompanyNS ExmapleReportingFeedbackResultsTime
Xiamen DNSns1[1,2].dns.comPlatform✓ 1100%24 h
Jumingjm[1,2].dns.comEmail100%24 h
XZ.comns[1,2].maff.comEmail✕ 20%-
AliCloudns[1,2].alidns.com, dns[9,10].hichina.comPlatform0%-
DNS.LAv1s[1,2].xundns.comEmail0%-
Tencentf1g1ns[1,2].dnspod.netPlatform100%24 h
22netns[1,2].22.cnEmail100%24 h
Xiweins[1,2,3].myhostadmin.netEmail100%24 h
ZNDNSns[1,2,3,4].zndns.comEmail0%-
1 This means that the hosting providers will inform the reporters of the receipt of the abuse reports. 2 This means that hosting providers do not inform repoters whether they have received abuse reports.
Table 7. Overview of web hosting providers and handling results of handling abusive domains.
Table 7. Overview of web hosting providers and handling results of handling abusive domains.
ReportingOrganizationFeedbackDomainsHandling
PlatformAlibaba Cloud✓ 190
Tencent Cloud119
Huawei Cloud✕ 220
Baidu Online30
Telecom10
EmailWanghu Technology60
Unicom30
Beijing CNISP33
Gigabit Hosting30
Shenzhen Dingfeng44
MiLin Network40
1 This means that the web hosting providers will inform the reporters of the receipt of the abuse reports. 2 This means that web hosting providers do not inform repoters whether they have received abuse reports.
Table 8. Overview of recursive DNS servers and the results of handling of abusive domains.
Table 8. Overview of recursive DNS servers and the results of handling of abusive domains.
DNSCompanyRedirected IPDomains
223.5.5.5Alibaba Cloud--
114.114.114.110Nanjing Trade Wind Network123.57.70.8492
119.29.29.29Tencent Cloud--
180.76.76.76Baidu Online Network--
101.226.4.6Juliu Software (DNSPai)47.75.69.1911
117.50.60.30Beijing ThreatBook (OneDNS)23.91.96.1555556
Table 9. Overview of the platforms and versions of browsers.
Table 9. Overview of the platforms and versions of browsers.
CompanyBrowserPlatform (OS)Version
AlibabaUCWindows 106.2.4098.3
Android13.7.9.1160
IOS13.7.8.1666
TencentQQWindows 1010.8.5
Android12.2.3.7053
IOS12.1.3.5036
Qihoo360 SafeWindows 1013.0.2290.0
Android1.0.100.1099
IOS5.2.26
Table 10. Different browsers have different forms of reporting platforms.
Table 10. Different browsers have different forms of reporting platforms.
BrowserWindowsIOSAndroid
QQ-Independent ChannelIndependent Channel
UC-Customer Service CenterCustomer Service Center
360 Safe--Independent Channel
Table 11. Whether Internet entities offer channels for appeal in different states of domains.
Table 11. Whether Internet entities offer channels for appeal in different states of domains.
RegistrarISPDNS HostingWeb HostingDNSBrowser
✓ 1✓/✕ 2✕ 3
1 The organizations of this Internet entity all provide channels for appeals. 2 Some of the organizations in this Internet entity provide channels for appeals. 3 None of the organizations in this Internet entity provide a channel for appeals.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Cheng, Y.; Liu, Y.; Wang, L.; Zhang, Z.; Chai, T.; Du, Y. Evaluating the Effectiveness of Handling Abusive Domain Names by Internet Entities. Electronics 2022, 11, 1172. https://doi.org/10.3390/electronics11081172

AMA Style

Cheng Y, Liu Y, Wang L, Zhang Z, Chai T, Du Y. Evaluating the Effectiveness of Handling Abusive Domain Names by Internet Entities. Electronics. 2022; 11(8):1172. https://doi.org/10.3390/electronics11081172

Chicago/Turabian Style

Cheng, Yanan, Yali Liu, Lianmiao Wang, Zhaoxin Zhang, Tingting Chai, and Yuejin Du. 2022. "Evaluating the Effectiveness of Handling Abusive Domain Names by Internet Entities" Electronics 11, no. 8: 1172. https://doi.org/10.3390/electronics11081172

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop