Towards understanding the lifecycle of malicious network infrastructure