{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T13:51:45Z","timestamp":1772113905448,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,10,23]],"date-time":"2013-10-23T00:00:00Z","timestamp":1382486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,10,23]]},"DOI":"10.1145\/2504730.2504753","type":"proceedings-article","created":{"date-parts":[[2013,10,22]],"date-time":"2013-10-22T13:42:56Z","timestamp":1382449376000},"page":"63-76","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":72,"title":["Understanding the domain registration behavior of spammers"],"prefix":"10.1145","author":[{"given":"Shuang","family":"Hao","sequence":"first","affiliation":[{"name":"Georgia Tech, Atlanta, GA, USA"}]},{"given":"Matthew","family":"Thomas","sequence":"additional","affiliation":[{"name":"Verisign, Inc., Reston, VA, USA"}]},{"given":"Vern","family":"Paxson","sequence":"additional","affiliation":[{"name":"ICSI &amp; UC Berkeley, Berkeley, CA, USA"}]},{"given":"Nick","family":"Feamster","sequence":"additional","affiliation":[{"name":"Georgia Tech, Atlanta, GA, USA"}]},{"given":"Christian","family":"Kreibich","sequence":"additional","affiliation":[{"name":"ICSI &amp; Lastline, Inc., Berkeley, CA, USA"}]},{"given":"Chris","family":"Grier","sequence":"additional","affiliation":[{"name":"ICSI &amp; UC Berkeley, Berkeley, CA, USA"}]},{"given":"Scott","family":"Hollenbeck","sequence":"additional","affiliation":[{"name":"Verisign, Inc., Reston, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,10,23]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proc. 19th USENIX Security Symposium","author":"Antonakakis M.","year":"2010","unstructured":"M. Antonakakis , R. Perdisci , D. Dagon , W. Lee , and N. Feamster . Building a Dynamic Reputation System for DNS . In Proc. 19th USENIX Security Symposium , Washington, DC , Aug. 2010 . M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster. Building a Dynamic Reputation System for DNS. In Proc. 19th USENIX Security Symposium, Washington, DC, Aug. 2010."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028067.2028094"},{"key":"e_1_3_2_2_3_1","volume-title":"Proc. 20th USENIX Security Symposium","author":"Antonakakis M.","year":"2011","unstructured":"M. Antonakakis , R. Perdisci , Y. Nadji , N. Vasiloglou , S. Abu-Nimeh , W. Lee , and D. Dagon . From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware . In Proc. 20th USENIX Security Symposium , San Francisco, CA , Aug. 2011 . M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou, S. Abu-Nimeh, W. Lee, and D. Dagon. From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. In Proc. 20th USENIX Security Symposium, San Francisco, CA, Aug. 2011."},{"key":"e_1_3_2_2_4_1","volume-title":"EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. In 18th Annual Network & Distributed System Security Symposium","author":"Bilge L.","year":"2011","unstructured":"L. Bilge , E. Kirda , C. Kruegel , and M. Balduzzi . EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. In 18th Annual Network & Distributed System Security Symposium , San Diego, CA , Feb. 2011 . L. Bilge, E. Kirda, C. Kruegel, and M. Balduzzi. EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. In 18th Annual Network & Distributed System Security Symposium, San Diego, CA, Feb. 2011."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15257-3_7"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/144191.144301"},{"key":"e_1_3_2_2_7_1","volume-title":"http:\/\/www.mikeindustries.com\/blog\/archive\/2005\/03\/how-to-snatch-an-expiring-domain","author":"Expiring Domain How","year":"2005","unstructured":"How to Snatch an Expiring Domain . http:\/\/www.mikeindustries.com\/blog\/archive\/2005\/03\/how-to-snatch-an-expiring-domain , 2005 . How to Snatch an Expiring Domain. http:\/\/www.mikeindustries.com\/blog\/archive\/2005\/03\/how-to-snatch-an-expiring-domain, 2005."},{"key":"e_1_3_2_2_8_1","volume-title":"http:\/\/www.domaintools.com","year":"2012","unstructured":"DomainTools. http:\/\/www.domaintools.com , 2012 . DomainTools. http:\/\/www.domaintools.com, 2012."},{"key":"e_1_3_2_2_9_1","unstructured":"Backorder Price Wars: NameJet.com Lowers Minimum Bid On Pending Delete Domains to $59. http:\/\/tinyurl.com\/4mb2tgo 2011.  Backorder Price Wars: NameJet.com Lowers Minimum Bid On Pending Delete Domains to $59. http:\/\/tinyurl.com\/4mb2tgo 2011."},{"key":"e_1_3_2_2_10_1","volume-title":"3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats","author":"Felegyhazi M.","year":"2010","unstructured":"M. Felegyhazi , C. Kreibich , and V. Paxson . On the potential of proactive domain blacklisting . In 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats , San Jose, CA , Apr. 2010 . M. Felegyhazi, C. Kreibich, and V. Paxson. On the potential of proactive domain blacklisting. In 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, San Jose, CA, Apr. 2010."},{"key":"e_1_3_2_2_11_1","volume-title":"http:\/\/www.godaddy.com\/domains\/searchbulk.aspx","author":"Registration Godaddy Bulk","year":"2012","unstructured":"Godaddy Bulk Registration . http:\/\/www.godaddy.com\/domains\/searchbulk.aspx , 2012 . Godaddy Bulk Registration. http:\/\/www.godaddy.com\/domains\/searchbulk.aspx, 2012."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068842"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3632"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5730"},{"key":"e_1_3_2_2_15_1","unstructured":".COM Agreement Appendix 7 Functional and Performance Specifications. http:\/\/www.icann.org\/en\/about\/agreements\/registries\/verisign\/appendix-07-01mar06-en.htm 2006.  .COM Agreement Appendix 7 Functional and Performance Specifications. http:\/\/www.icann.org\/en\/about\/agreements\/registries\/verisign\/appendix-07-01mar06-en.htm 2006."},{"key":"e_1_3_2_2_16_1","volume-title":"http:\/\/www.icann.org\/en\/resources\/registries\/agp\/agp-policy-17dec08-en.htm","author":"Period Limits Policy Add Grace","year":"2008","unstructured":"Add Grace Period Limits Policy . http:\/\/www.icann.org\/en\/resources\/registries\/agp\/agp-policy-17dec08-en.htm , 2008 . Add Grace Period Limits Policy. http:\/\/www.icann.org\/en\/resources\/registries\/agp\/agp-policy-17dec08-en.htm, 2008."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505223"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.24"},{"key":"e_1_3_2_2_19_1","volume-title":"4th USENIX Workshop on Large-Scale Exploits and Emergent Threats","author":"Liu H.","year":"2011","unstructured":"H. Liu , K. Levchenko , M. Felegyhazi , C. Kreibich , G. Maier , G. M. Voelker , and S. Savage . On the effects of registrar-level intervention . In 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats , Boston, MA , Mar. 2011 . H. Liu, K. Levchenko, M. Felegyhazi, C. Kreibich, G. Maier, G. M. Voelker, and S. Savage. On the effects of registrar-level intervention. In 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, Boston, MA, Mar. 2011."},{"key":"e_1_3_2_2_20_1","volume-title":"Internet Engineering Task Force","author":"Mockapetris P. V.","year":"1987","unstructured":"P. V. Mockapetris . Domain names - concepts and facilities . Internet Engineering Task Force , Nov. 1987 . RFC 1034. P. V. Mockapetris. Domain names - concepts and facilities. Internet Engineering Task Force, Nov. 1987. RFC 1034."},{"key":"e_1_3_2_2_21_1","volume-title":"https:\/\/www.moniker.com\/bulkdomainname.jsp","author":"Registration Moniker Bulk","year":"2012","unstructured":"Moniker Bulk Registration . https:\/\/www.moniker.com\/bulkdomainname.jsp , 2012 . Moniker Bulk Registration. https:\/\/www.moniker.com\/bulkdomainname.jsp, 2012."},{"key":"e_1_3_2_2_22_1","volume-title":"http:\/\/www.namejet.com\/pages\/downloads.aspx","author":"Domain Name Aftermarket NameJet","year":"2012","unstructured":"NameJet Domain Name Aftermarket . http:\/\/www.namejet.com\/pages\/downloads.aspx , 2012 . NameJet Domain Name Aftermarket. http:\/\/www.namejet.com\/pages\/downloads.aspx, 2012."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.392383"},{"key":"e_1_3_2_2_24_1","unstructured":"Rogues and Registrars: Top 10 List. http:\/\/blog.legitscript.com\/2012\/10\/rogues-registrars-top-10-list-october-2012 2012.  Rogues and Registrars: Top 10 List. http:\/\/blog.legitscript.com\/2012\/10\/rogues-registrars-top-10-list-october-2012 2012."},{"key":"e_1_3_2_2_25_1","volume-title":"http:\/\/www.icann.org\/registrar-reports\/accredited-list.html","author":"Accredited Registrars List","year":"2013","unstructured":"List of ICANN Accredited Registrars . http:\/\/www.icann.org\/registrar-reports\/accredited-list.html , 2013 . List of ICANN Accredited Registrars. http:\/\/www.icann.org\/registrar-reports\/accredited-list.html, 2013."},{"key":"e_1_3_2_2_26_1","volume-title":"July","author":"Springael J.","year":"2005","unstructured":"J. Springael and I. V. Nieuwenhuyse . A Lost Sales Inventory Model with A Compound Poisson Demand Pattern. Working paper , July 2005 . J. Springael and I. V. Nieuwenhuyse. A Lost Sales Inventory Model with A Compound Poisson Demand Pattern. Working paper, July 2005."},{"key":"e_1_3_2_2_27_1","volume-title":"http:\/\/www.symantec.com\/theme.jsp?themeid=state_of_spam","author":"Report Symantec Intelligence","year":"2012","unstructured":"Symantec Intelligence Report . http:\/\/www.symantec.com\/theme.jsp?themeid=state_of_spam , 2012 . Symantec Intelligence Report. http:\/\/www.symantec.com\/theme.jsp?themeid=state_of_spam, 2012."},{"key":"e_1_3_2_2_28_1","volume-title":"http:\/\/www.icann.org\/en\/registries\/rsep\/verisign-whowas-01jul09-en.pdf","author":"Service Verisign Who","year":"2009","unstructured":"Verisign Who was Service . http:\/\/www.icann.org\/en\/registries\/rsep\/verisign-whowas-01jul09-en.pdf , 2009 . Verisign Who was Service. http:\/\/www.icann.org\/en\/registries\/rsep\/verisign-whowas-01jul09-en.pdf, 2009."},{"key":"e_1_3_2_2_29_1","volume-title":"http:\/\/domaincountdown.verisignlabs.com","author":"Countdown Verisign Domain","year":"2011","unstructured":"Verisign Domain Countdown . http:\/\/domaincountdown.verisignlabs.com , 2011 . Verisign Domain Countdown. http:\/\/domaincountdown.verisignlabs.com, 2011."},{"key":"e_1_3_2_2_30_1","volume-title":"http:\/\/www.verisigninc.com\/en_US\/why-verisign\/research-trends\/domain-name-industry-brief\/index.xhtml","author":"Name Industry Brief The Domain","year":"2012","unstructured":"The Domain Name Industry Brief . http:\/\/www.verisigninc.com\/en_US\/why-verisign\/research-trends\/domain-name-industry-brief\/index.xhtml , 2012 . The Domain Name Industry Brief. http:\/\/www.verisigninc.com\/en_US\/why-verisign\/research-trends\/domain-name-industry-brief\/index.xhtml, 2012."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879148"},{"key":"e_1_3_2_2_32_1","volume-title":"http:\/\/www.iana.org\/domains\/root\/db","author":"Database Root Zone","year":"2012","unstructured":"Root Zone Database . http:\/\/www.iana.org\/domains\/root\/db , 2012 . Root Zone Database. http:\/\/www.iana.org\/domains\/root\/db, 2012."}],"event":{"name":"IMC'13: Internet Measurement Conference","location":"Barcelona Spain","acronym":"IMC'13","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2013 conference on Internet measurement conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2504730.2504753","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2504730.2504753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:48:42Z","timestamp":1750236522000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2504730.2504753"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,23]]},"references-count":32,"alternative-id":["10.1145\/2504730.2504753","10.1145\/2504730"],"URL":"https:\/\/doi.org\/10.1145\/2504730.2504753","relation":{},"subject":[],"published":{"date-parts":[[2013,10,23]]},"assertion":[{"value":"2013-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}