Skip to main content
Resources

Domain Abuse Activity Reporting

ICANN's Domain Abuse Activity Reporting (DAAR) project is a system for studying and reporting on domain name registration and security threat (domain abuse) behavior across top-level domain (TLD) registries. The overarching purpose of DAAR is to develop a robust, reliable, reproducible, and replicable methodology for analyzing security threat activity that can then be later used by the ICANN community to facilitate informed policy decisions.

The system collects TLD zone data and complements these data sets with a large set of high-confidence reputation (security threat) data feeds. The aggregated and anonymized data collected by the DAAR system can serve as a platform for studying or reporting daily or historical registration or abuse activity by each registry. The data is currently being pushed to registries using the ICANN SLAM system.

The data collected out of the DAAR system is being used to generate the DAAR monthly reports. The reports are point-in-time analysis of all TLDs for which data was available. The report provides aggregated statistics and time-series analysis about security threats of interest to DAAR namely phishing, malware, spam, and botnet command-and-control.

This web page provides links to DAAR monthly reports along with a couple of other DAAR-related documents listed below:

  • DAAR monthly reports
  • DAAR context document that outlines the context behind the monthly reports and summarizes the methodology behind DAAR
  • DAAR methodology paper that contains the detailed method using which DAAR data is collected and metrics are defined
  • Two independent reviews on the DAAR methodology paper
  • A set of anonymized and un-anonymized documents containing public comments on DAAR reviews
  • OCTO-SSR responses to public input

Domain Abuse Activity Reporting FAQ

Domain Abuse Activity (DAAR) Monthly Reports

Context Document: Understanding the DAAR Monthly Report [PDF, 72 KB]

2019

2018

Other Resources

Domain Name System
Internationalized Domain Name ,IDN,"IDNs are domain names that include characters used in the local representation of languages that are not written with the twenty-six letters of the basic Latin alphabet ""a-z"". An IDN can contain Latin letters with diacritical marks, as required by many European languages, or may consist of characters from non-Latin scripts such as Arabic or Chinese. Many languages also use other types of digits than the European ""0-9"". The basic Latin alphabet together with the European-Arabic digits are, for the purpose of domain names, termed ""ASCII characters"" (ASCII = American Standard Code for Information Interchange). These are also included in the broader range of ""Unicode characters"" that provides the basis for IDNs. The ""hostname rule"" requires that all domain names of the type under consideration here are stored in the DNS using only the ASCII characters listed above, with the one further addition of the hyphen ""-"". The Unicode form of an IDN therefore requires special encoding before it is entered into the DNS. The following terminology is used when distinguishing between these forms: A domain name consists of a series of ""labels"" (separated by ""dots""). The ASCII form of an IDN label is termed an ""A-label"". All operations defined in the DNS protocol use A-labels exclusively. The Unicode form, which a user expects to be displayed, is termed a ""U-label"". The difference may be illustrated with the Hindi word for ""test"" — परीका — appearing here as a U-label would (in the Devanagari script). A special form of ""ASCII compatible encoding"" (abbreviated ACE) is applied to this to produce the corresponding A-label: xn--11b5bs1di. A domain name that only includes ASCII letters, digits, and hyphens is termed an ""LDH label"". Although the definitions of A-labels and LDH-labels overlap, a name consisting exclusively of LDH labels, such as""icann.org"" is not an IDN."