
ACKNOWLEDGMENT
We are grateful to our shepherd Professor Matthew Smith and
the anonymous reviewers for their insightful and helpful com-
ments. The IU authors are supported in part by NSF 1408874,
1527141, 1618493, 1618898 and ARO W911NF1610127. Also,
authors from Tsinghua University are supported in part by the
National Natural Science Foundation of China (grant 61772307)
and CERNET Innovation Project NGII20160403.
REFERENCES
[1]
Geosurf: Residential and data center proxy network. https://www.geosurf.
com/.
[2] Iaps security. https://www.intl-alliance.com/.
[3] Luminati: largest business proxy service. http://luminati.io/.
[4]
The netflix vpn ban can be bypassed – here’s how it can be done
responsibly.
[5] Proxies online. http://proxies.online.
[6] Proxyrack. https://www.proxyrack.com/.
[7] Public proxy service. www.kuaidaili.com/.
[8]
On the trail of malicious dynamic dns domains. https://umbrella.cisco.
com/blog/2013/04/15/on-the- trail-of-malicious- dynamic-dns-domains/,
2013.
[9] Alienvalut otx. https://otx.alienvault.com, 2017.
[10] Cymon otx. https://cymon.io/, 2017.
[11] Free proxy list. http://www.freeproxylists.com, 2017.
[12]
Hajime - netlab opendata project. http://data.netlab.360.com/hajime/,
2017.
[13]
Iot reaper: A rappid spreading new iot botnet. http://blog.netlab.360.com/
iot reaper-a-rappid-spreading-new-iot- botnet-en/, 2017.
[14]
Ip2location db8. https://www.ip2location.com/databases/
db8-ip- country-region-city-latitude-longitude-isp-domain, 2017.
[15]
Ip2proxy lite. https://lite.ip2location.com/database/px1-ip-country, 2017.
[16]
Nmap service detection probe list. https://svn.nmap.org/nmap/
nmap-service- probes, 2017.
[17] Passive dns from 360 netlab. https://passivedns.cn, 2017.
[18] Spamhaus edrop. https://www.spamhaus.org/drop/, 2017.
[19] Tor exit nodes. https://check.torproject.org/exit-addresses, 2017.
[20] Tor node list from dan. https://www.dan.me.uk/tornodes, 2017.
[21] Virustotal. https://www.virustotal.com, 2017.
[22] Webanet free proxy list. https://webanetlabs.net/publ/24, 2017.
[23]
Acess to apnic whois data. https://www.apnic.net/manage-ip/using-whois/
bulk-access/, 2018.
[24]
Afrinic bulk whois data. https://www.afrinic.net/library/
membership-documents/207- bulk-whois-access-form-, 2018.
[25] Aliyun ip ranges. https://ipinfo.io/AS37963, 2018.
[26]
Amazon aws ip address ranges. https://docs.aws.amazon.com/general/
latest/gr/aws-ip-ranges.html, 2018.
[27] Amazon echo. https://en.wikipedia.org/wiki/Amazon Echo, 2018.
[28] At&t mobility llc. https://whois.arin.net/rest/org/ATTMO-3, 2018.
[29]
At&t mobility llc. https://en.wikipedia.org/wiki/AT%26T Mobility, 2018.
[30] Available hola clients. https://hola.org/download, 2018.
[31]
Blackhat seo forum: Proxies for sal. https://www.blackhatworld.com/
forums/proxies-for-sale.112/, 2018.
[32] Cloudflare ip ranges. https://www.cloudflare.com/ips/, 2018.
[33]
Geoip2 precision insights service. https://www.maxmind.com/en/
geoip2-precision- insights, 2018.
[34]
Google compute engine ip ranges. https://cloud.google.com/compute/
docs/faq#where can i find product name short ip ranges, 2018.
[35] Google home. https://en.wikipedia.org/wiki/Google Home, 2018.
[36] Hola faq. https://hola.org/faq#intro- cost, 2018.
[37]
Ibm cloud ip ranges. https://console.bluemix.net/docs/infrastructure/
hardware-firewall-dedicated/ips.html#ibm- cloud-ip-ranges, 2018.
[38] Microleaves. https://microleaves.com/, 2018.
[39]
Microsoft azure datacenter ip ranges. https://www.microsoft.com/en- us/
download/details.aspx?id=41653, 2018.
[40]
Obtaining bulk whois data from arin. https://www.arin.net/resources/
request/bulkwhois.html, 2018.
[41] Philips hue lights. https://en.wikipedia.org/wiki/Philips Hue, 2018.
[42] Pure vpn. https://www.purevpn.com/, 2018.
[43] Raw scan data of censys. https://censys.io/data, 2018.
[44] Rdap protocol. https://about.rdap.org/, 2018.
[45]
Request for bulk whois of lacnic. http://www.lacnic.net/en/web/lacnic/
manual-8, 2018.
[46]
Ripe whois apis. https://www.ripe.net/analyse/archived-projects/
ris-tools- web-interfaces/riswhois, 2018.
[47]
Salesforce ip ranges. https://help.salesforce.com/articleView?id=
000003652&type=1, 2018.
[48] Shodan. https://www.shodan.io/, 2018.
[49] Storm proxies. http://stormproxies.com/, 2018.
[50]
Tor volunteer. https://www.torproject.org/getinvolved/volunteer.html.en,
2018.
[51] Trace my ip. http://www.tracemyip.org/, 2018.
[52] Zoomeye. https://www.zoomeye.org/, 2018.
[53]
M. Abu Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A multifaceted
approach to understanding the botnet phenomenon. In Proceedings of
the 6th ACM SIGCOMM conference on Internet measurement, pages
41–52. ACM, 2006.
[54]
S. Alrwais, X. Liao, X. Mi, P. Wang, X. Wang, F. Qian, R. Beyah, and
D. McCoy. Under the shadow of sunshine: Understanding and detecting
bulletproof hosting on legitimate service provider networks. In Security
and Privacy (SP), 2017 IEEE Symposium on, pages 805–823. IEEE,
2017.
[55]
M. Antonakakis, T. April, M. Bailey, E. Bursztein, J. Cochran, Z. Du-
rumeric, J. A. Halderman, D. Menscher, C. Seaman, N. Sullivan, et al.
Understanding the mirai botnet. 2017.
[56]
K. Borgolte, C. Kruegel, and G. Vigna. Delta: automatic identification
of unknown web-based infection campaigns. In Proceedings of the
2013 ACM SIGSAC conference on Computer & communications security,
pages 109–120. ACM, 2013.
[57]
L. Carl et al. Using machine learning technliques to identify botnet traffic.
In Local Computer Networks, Proceedings 2006 31st IEEE Conference
on. IEEE, 2006.
[58]
T. Chung, D. Choffnes, and A. Mislove. Tunneling for transparency:
A large-scale analysis of end-to-end violations in the internet. In
Proceedings of the 2016 ACM on Internet Measurement Conference,
pages 199–213. ACM, 2016.
[59]
T. Chung, R. van Rijswijk-Deij, B. Chandrasekaran, D. Choffnes,
D. Levin, B. M. Maggs, A. Mislove, and C. Wilson. A longitudinal,
end-to-end view of the dnssec ecosystem. 2017.
[60]
M. P. Collins, T. J. Shimeall, S. Faber, J. Janies, R. Weaver, M. De Shon,
and J. Kadane. Using uncleanliness to predict future botnet addresses.
In Proceedings of the 7th ACM SIGCOMM conference on Internet
measurement, pages 93–104. ACM, 2007.
[61]
A. Cui and S. J. Stolfo. A quantitative analysis of the insecurity of
embedded network devices: results of a wide-area scan. In Proceedings
of the 26th Annual Computer Security Applications Conference, pages
97–106. ACM, 2010.
[62]
X. d. C. de Carnavalet and M. Mannan. Killed by proxy: Analyzing
client-end tls interception software. In Network and Distributed System
Security Symposium, 2016.
[63]
Z. Durumeric, D. Adrian, A. Mirian, M. Bailey, and J. A. Halderman.
A search engine backed by internet-wide scanning. In Proceedings of
the 22nd ACM SIGSAC Conference on Computer and Communications
Security, pages 542–553. ACM, 2015.
[64]
Z. Durumeric, E. Wustrow, and J. A. Halderman. Zmap: Fast internet-
wide scanning and its security applications. In USENIX Security
Symposium, volume 8, pages 47–53, 2013.
[65]
S. Garcia, M. Grill, J. Stiborek, and A. Zunino. An empirical comparison
of botnet detection methods. computers & security, 45:100–123, 2014.
[66]
E. J. Hernandez-Valencia. Architectures for broadband residential ip
services over catv networks. IEEE Network, 11(1):36–43, 1997.
[67]
P. Kalaivani and M. Vijaya. Mining based detection of botnet traffic in
network flow.
[68]
A. Kountouras, P. Kintis, C. Lever, Y. Chen, Y. Nadji, D. Dagon,
M. Antonakakis, and R. Joffe. Enabling network security through
active dns datasets. In International Symposium on Research in Attacks,
Intrusions, and Defenses, pages 188–208. Springer, 2016.
[69]
Z. Li, S. Alrwais, X. Wang, and E. Alowaisheq. Hunting the red fox
online: Understanding and detection of mass redirect-script injections.
In Security and Privacy (SP), 2014 IEEE Symposium on, pages 3–18.
IEEE, 2014.
[70]
X. Liao, K. Yuan, X. Wang, Z. Pei, H. Yang, J. Chen, H. Duan, K. Du,
E. Alowaisheq, S. Alrwais, et al. Seeking nonsense, looking for trouble:
Efficient promotional-infection detection through semantic inconsistency
Authorized licensed use limited to: IEEE Xplore. Downloaded on May 24,2021 at 23:10:42 UTC from IEEE Xplore. Restrictions apply.