{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T07:15:09Z","timestamp":1771485309821,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,30]]},"DOI":"10.1145\/3678890.3678925","type":"proceedings-article","created":{"date-parts":[[2024,9,29]],"date-time":"2024-09-29T22:23:36Z","timestamp":1727648616000},"page":"35-48","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Blocklist-Forecast: Proactive Domain Blocklisting by Identifying Malicious Hosting Infrastructure"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3836-7495","authenticated-orcid":false,"given":"Udesh","family":"Kumarasinghe","sequence":"first","affiliation":[{"name":"Purdue University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3502-9914","authenticated-orcid":false,"given":"Mohamed","family":"Nabeel","sequence":"additional","affiliation":[{"name":"Palo Alto Networks, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5923-4341","authenticated-orcid":false,"given":"Charitha","family":"Elvitigala","sequence":"additional","affiliation":[{"name":"C2SI, Sri Lanka"}]}],"member":"320","published-online":{"date-parts":[[2024,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2022. Alexa Rank. https:\/\/www.alexa.com\/ Accessed: 12-10-2023."},{"key":"e_1_3_2_1_2_1","unstructured":"2023. OpenPhish. https:\/\/openphish.com\/ Accessed: 12-10-2023."},{"key":"e_1_3_2_1_3_1","unstructured":"2023. PhishTank. https:\/\/phishtank.org\/ Accessed: 12-10-2023."},{"key":"e_1_3_2_1_4_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Acharya Bhupendra","year":"2021","unstructured":"Bhupendra Acharya and Phani Vadrevu. 2021. PhishPrint: Evading Phishing Detection Crawlers by Prior Profiling. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 3775\u20133792. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/acharya"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2584679"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626790"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098036"},{"key":"e_1_3_2_1_8_1","unstructured":"Farsight Security Inc.2023. DNS Database. https:\/\/www.dnsdb.info\/ Accessed: 10-01-2023."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37231-6_18"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3075552"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855686.1855692"},{"key":"e_1_3_2_1_12_1","volume-title":"Fast Graph Representation Learning with PyTorch Geometric. In ICLR Workshop on Representation Learning on Graphs and Manifolds.","author":"Fey Matthias","year":"2019","unstructured":"Matthias Fey and Jan\u00a0E. Lenssen. 2019. Fast Graph Representation Learning with PyTorch Geometric. In ICLR Workshop on Representation Learning on Graphs and Manifolds."},{"key":"e_1_3_2_1_13_1","unstructured":"I. Goodfellow J. Shlens and C. Szegedy. 2015. Explaining and Harnessing Adversarial Examples. In ICLR."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_1_15_1","unstructured":"W. Hamilton Z. Ying and J. Leskovec. 2017. Inductive Representation Learning on Large Graphs. In NIPS."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978317"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.33"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560615"},{"key":"e_1_3_2_1_19_1","unstructured":"T. Kipf and M. Welling. 2017. Semi-Supervised Classification with Graph Convolutional Networks. In ICLR."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime54498.2021.9738769"},{"key":"e_1_3_2_1_21_1","volume-title":"PDNS-Net: A Large Heterogeneous Graph Benchmark Dataset of Network Resolutions for Graph Learning. arXiv preprint arXiv:2203.07969","author":"Kumarasinghe Udesh","year":"2022","unstructured":"Udesh Kumarasinghe, Fatih Deniz, and Mohamed Nabeel. 2022. PDNS-Net: A Large Heterogeneous Graph Benchmark Dataset of Network Resolutions for Graph Learning. arXiv preprint arXiv:2203.07969 (2022)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15931-2_42"},{"key":"e_1_3_2_1_23_1","volume-title":"Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network. In Computational Science \u2013 ICCS","author":"Liu Zhicheng","year":"2020","unstructured":"Zhicheng Liu, Shuhao Li, Yongzheng Zhang, Xiaochun Yun, and Chengwei Peng. 2020. Ringer: Systematic Mining of Malicious Domains by Dynamic Graph Convolutional Network. In Computational Science \u2013 ICCS 2020, Valeria\u00a0V. Krzhizhanovskaya, G\u00e1bor Z\u00e1vodszky, Michael\u00a0H. Lees, Jack\u00a0J. Dongarra, Peter M.\u00a0A. Sloot, S\u00e9rgio Brissos, and Jo\u00e3o Teixeira (Eds.). Springer International Publishing, Cham, 379\u2013398."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3401897"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359789.3359791"},{"key":"e_1_3_2_1_26_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Oest Adam","year":"2020","unstructured":"Adam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doup\u00e9, and Gail-Joon Ahn. 2020. Sunrise to Sunset: Analyzing the End-to-end Life Cycle and Effectiveness of Phishing Attacks at Scale. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, 361\u2013377. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/oest-sunrise"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Quirin Scheitle Oliver Hohlfeld Julien Gamba Jonas Jelten Torsten Zimmermann Stephen\u00a0D. Strowes and Narseo Vallina-Rodriguez. 2018. A Long Way to the Top: Significance Structure and Stability of Internet Top Lists. In IMC.","DOI":"10.1145\/3278532.3278574"},{"key":"e_1_3_2_1_29_1","volume-title":"I. Titov, and M. Welling.","author":"Schlichtkrull M.","year":"2018","unstructured":"M. Schlichtkrull, T. Kipf, P. Bloem, R. van\u00a0den Berg, I. Titov, and M. Welling. 2018. Modeling Relational Data with Graph Convolutional Networks. In The Semantic Web. 593\u2013607."},{"key":"e_1_3_2_1_30_1","unstructured":"T. Schmidt H. \u015eirin D. Z\u00fcgner A. Bojchevski and S. G\u00fcnnemann. 2021. Robustness of Graph Neural Networks at Scale. In NeurIPS."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"M. Sharif J. Urakawa N. Christin A. Kubota and A. Yamada. 2018. Predicting Impending Exposure to Malicious Content from User Behavior. In CCS. 1487\u20131501.","DOI":"10.1145\/3243734.3243779"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2598561"},{"key":"e_1_3_2_1_33_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Silva Ravindu\u00a0De","year":"2021","unstructured":"Ravindu\u00a0De Silva, Mohamed Nabeel, Charith Elvitigala, Issa Khalil, Ting Yu, and Chamath Keppitiyagama. 2021. Compromised or Attacker-Owned: A Large Scale Classification and Study of Hosting Domains of Malicious URLs. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 3721\u20133738. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/desilva"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461982"},{"key":"e_1_3_2_1_35_1","volume-title":"22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019","author":"Sun Xiaoqing","year":"2019","unstructured":"Xiaoqing Sun, Mingkai Tong, Jiahai Yang, Liu Xinran, and Liu Heng. 2019. HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification. In 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). USENIX Association, Chaoyang District, Beijing, 399\u2013412. https:\/\/www.usenix.org\/conference\/raid2019\/presentation\/sun"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102057"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS47738.2020.9110462"},{"key":"e_1_3_2_1_38_1","volume-title":"Deep Graph Infomax. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rklz9iAcKQ","author":"Veli\u010dkovi\u0107 Petar","year":"2019","unstructured":"Petar Veli\u010dkovi\u0107, William Fedus, William\u00a0L. Hamilton, Pietro Li\u00f2, Yoshua Bengio, and R\u00a0Devon Hjelm. 2019. Deep Graph Infomax. In International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=rklz9iAcKQ"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 2014 IMC. 101\u2013114","author":"Wang L.","unstructured":"L. Wang, A. Nappa, J. Caballero, T. Ristenpart, and A. Akella. 2014. WhoWas: A Platform for Measuring Web Deployments on IaaS Clouds. In Proceedings of the 2014 IMC. 101\u2013114."},{"key":"e_1_3_2_1_40_1","volume-title":"Passive DNS Replication. In FIRST Conference on Computer Security Incident. 98","author":"Weimer Florian","year":"2005","unstructured":"Florian Weimer. 2005. Passive DNS Replication. In FIRST Conference on Computer Security Incident. 98."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1496711.1496719"},{"key":"e_1_3_2_1_43_1","volume-title":"Attributed Heterogeneous Graph Neural Network for Malicious Domain Detection. In 2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD). 397\u2013403","author":"Zhang Shuai","year":"2021","unstructured":"Shuai Zhang, Zhou Zhou, Da Li, Youbing Zhong, Qingyun Liu, Wei Yang, and Shu Li. 2021. Attributed Heterogeneous Graph Neural Network for Malicious Domain Detection. In 2021 IEEE 24th International Conference on Computer Supported Cooperative Work in Design (CSCWD). 397\u2013403."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3191329"}],"event":{"name":"RAID '24: The 27th International Symposium on Research in Attacks, Intrusions and Defenses","location":"Padua Italy","acronym":"RAID '24"},"container-title":["The 27th International Symposium on Research in Attacks, Intrusions and Defenses"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678925","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678890.3678925","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:00Z","timestamp":1750295880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678890.3678925"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":44,"alternative-id":["10.1145\/3678890.3678925","10.1145\/3678890"],"URL":"https:\/\/doi.org\/10.1145\/3678890.3678925","relation":{},"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"2024-09-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}