UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering An Effective Defense Against Spam Laundering Mengjun Xie, Heng Yin, Haining.

Slides:



Advertisements
Similar presentations
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Advertisements

Zhiyun Qian, Z. Morley Mao (University of Michigan)
Computer Science CSC 474Dr. Peng Ning1 CSC 474 Information Systems Security Topic 4.1 Firewalls.
Basic Communication on the Internet:
Detecting Spam Zombies by Monitoring Outgoing Messages Zhenhai Duan Department of Computer Science Florida State University.
New Directions in Traffic Measurement and Accounting Cristian Estan – UCSD George Varghese - UCSD Reviewed by Michela Becchi Discussion Leaders Andrew.
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
FIREWALLS Chapter 11.
Firewalls Dr.P.V.Lakshmi Information Technology GIT,GITAM University
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
RB-Seeker: Auto-detection of Redirection Botnet Presenter: Yi-Ren Yeh Authors: Xin Hu, Matthew Knysz, Kang G. Shin NDSS 2009 The slides is modified from.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Early Detection of Outgoing Spammers in Large-Scale Service Provider Networks Yehonatan Cohen Daniel Gordon Danny Hendler Ben-Gurion University Yehonatan.
Security Firewall Firewall design principle. Firewall Characteristics.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
—On War, Carl Von Clausewitz
Chapter 11 Firewalls.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
Understanding the Network-Level Behavior of Spammers Anirudh Ramachandran Nick Feamster.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Fast Detection of Denial-of-Service Attacks on IP Telephony Hemant Sengar, Duminda Wijesekera and Sushil Jajodia Center for Secure Information Systems,
Fast Detection of Denial-of-Service Attacks on IP Telephony Hemant Sengar, Duminda Wijesekera and Sushil Jajodia Center for Secure Information Systems,
Electronic Commerce 2. Definition Ecommerce is the process of buying and selling products and services via distributed electronic media, usually the World.
Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and.
1 Enhancing Address Privacy on Anti-SPAM by Dou Wang and Ying Chen School of Computer Science University of Windsor October 2007.
Firewalls1 Firewalls Mert Özarar Bilkent University, Turkey
Detecting SYN-Flooding Attacks Aaron Beach CS 395 Network Secu rity Spring 2004.
1 Lecture 20: Firewalls motivation ingredients –packet filters –application gateways –bastion hosts and DMZ example firewall design using firewalls – virtual.
1 Authors: Anirudh Ramachandran, Nick Feamster, and Santosh Vempala Publication: ACM Conference on Computer and Communications Security 2007 Presenter:
An Effective Defense Against Spam Laundering Paper by: Mengjun Xie, Heng Yin, Haining Wang Presented at:CCS'06 Presentation by: Devendra Salvi.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Chapter 20 Firewalls.
Intranet, Extranet, Firewall. Intranet and Extranet.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
January 2009Prof. Reuven Aviv: Firewalls1 Firewalls.
The Security Aspect of Social Engineering Justin Steele.
TCP/IP Yang Wang Professor: M.ANVARI.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
1 Internet Firewalls What it is all about Concurrency System Lab, EE, National Taiwan University R355.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
Jhih-sin Jheng 2009/09/01 Machine Learning and Bioinformatics Laboratory.
Protecting Students on the School Computer Network Enfield High School.
NS-H /11041 Intruder. NS-H /11042 Intruders Three classes of intruders (hackers or crackers): –Masquerader –Misfeasor –Clandestine user.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Spam from an ISP perspective Simon Lyall, Ihug Uniforum NZ NetForum Conference July 2003.
Characterising the Use of a Campus Wireless Network 徐 志 賢 Paper From: D. Schwab and R.B. Bunt, "Characterising the Use of a Campus Wireless Network", Proc.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Packet-Marking Scheme for DDoS Attack Prevention
Understanding the network level behavior of spammers Published by :Anirudh Ramachandran, Nick Feamster Published in :ACMSIGCOMM 2006 Presented by: Bharat.
The Dark Menace: Characterizing Network-based Attacks in the Cloud
11 Shades of Grey: On the effectiveness of reputation- based “blacklists” Reporter: 林佳宜 /8/16.
INTRODUCTION Firewall is a concept which blocks unwanted traffic and passes desirable traffic to and from both sides of the network.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Role Of Network IDS in Network Perimeter Defense.
1 Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Speaker: Jun-Yi Zheng 2010/01/18.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Lecture 12 Page 1 CS 136, Spring 2009 Network Security: Firewalls CS 136 Computer Security Peter Reiher May 12, 2009.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
An Effective Defense Against Spam Laundering Author: Mengjun Xie, Heng Yin, Haining Wang Presented At: CCS’ 06 Prepared By: Amit Shrivastava.
Lecture # 7 Firewalls الجدر النارية. Lecture # 7 Firewalls الجدر النارية.
Firewalls Routers, Switches, Hubs VPNs
POOJA Programmer, CSE Department
Firewalls Jiang Long Spring 2002.
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Introduction to Internet Worm
Presentation transcript:

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering An Effective Defense Against Spam Laundering Mengjun Xie, Heng Yin, Haining Wang Presented by Dustin Christmann March 4, 2009

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Outline Introduction Spam Laundering Anti-Spam Techniques Proxy-Based Spam Behavior DBSpam DBSpam Evaluation Potential Evasions

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Introduction What is spam? Classic definition: a canned precooked meat product made by the Hormel Foods Corporation, introduced in “SPAM” stands for “SPiced hAM” Modern definition: the abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately.

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Introduction So how did we get from one definition to the other? A 1970 Monty Python sketch, entitled “Spam.”

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Spam Laundering MTA relay ProxyMTA

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Anti-Spam Techniques Three main categories: 1.Recipient-oriented techniques 2.Sender-oriented techniques 3.HoneySpam

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Recipient-oriented Techniques Two main categories: 1.Content-based techniques 2.Non-content-based techniques

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Content-Based Techniques address filters Heuristic filters Machine-learning based filters

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Non-content-based Techniques DNSBLs MARID Challenge-Response Tempfailing Delaying Sender Behavior Analysis

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Sender-oriented Techniques Usage regulation Cost-based approaches

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering HoneySpam Based on honeyd Set up –Fake web servers –Fake open proxies –Fake relays Log the users of these fake servers as spam sources

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Proxy-based Spam Behavior Normal transmission MTA Router Corporate / campus / home network

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Proxy-based Spam Behavior Proxy-based Spam MTA Router Corporate / campus / home network

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Connection Correlation One-to-one mapping between upstream and downstream connections In normal transmission, there’s only one. Problems –Upstream encryption –Overhead –Timing

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Packet Symmetry Message symmetry –SMTP message from downstream connection results in TCP message to upstream connection Packet symmetry –One packet from downstream connection results in one packet to upstream connection –Exceptions

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering TCP Correlation Example

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering DBSpam Goals: 1.Fast detection of spam laundering with high accuracy 2.Breaking spam laundering via throttling or blocking after detection 3.Support for spammer tracking and law enforcement 4.Support for spam message fingerprinting 5.Support for global forensic analysis

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Deployment of DBSpam At a network vantage point where it can monitor the bi-directional traffic Single-homed network:

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Deployment of DBSpam Multi-homed network

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Design of Spam Laundering Detection With proxy-based spam transmission, number of incoming SMTP reply packets = number of outgoing TCP packets Possible for this to occur with normal traffic, but very seldom Sequential Probability Ratio Test (SPRT) is used

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering SPRT Can be viewed as a one-dimensional “random walk” starting between two boundaries –One boundary defines “spam connection” –Other boundary defines “not a spam connection”

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering SPRT Each observation pushes the walk in one direction or the other –Observation of correlated SMTP-TCP packets pushes walk toward “spam connection” –Observation of no correlation pushes walk toward “no spam connection” When the walk hits either boundary, test ends

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering SPRT Average number of required observations to reach a determination depends on four variables: 1.α* (the desired probability of false positives) 2.β* (the desired probability of false negatives) 3.θ 1 (the distribution of positive correlation) 4.θ 0 (the distribution of negative correlation)

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering SPRT E[N|H 1 ] vs. θ 0 and α* ( θ 1 = 0.99, β* = 0.01)

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering SPRT Detection Algorithm

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Noise Reduction Maintain a set of external IP addresses that appear for each time In the consecutive M time windows, single out the external IP addresses that appear at least K times Can further reduce the incidence of false positives dramatically, depending on the selection of M and K

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Noise reduction

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering DBSpam Evaluation Evaluation at College of William & Mary Two off-campus PCs as spam sources Two PCs in different campus subnets running SOCKS and HTTP proxies Spam “sink” in dark net Traces run in two different months N-* includes no spam traffic S-*-C encrypted spam, S-*-A and S-*-B unencrypted spam

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering DBSpam Evaluation SPRT Detection Time TraceN = 6N = 11N ≥ 16 S-1-A970 (100%)00 S-1-B5019 (96.9%)139 (2.7%)21 (0.4%) S-1-C2245 (92.8%)169 (7.0%)6 (0.2%) S-2-A433 (99.1%)3 (0.7%)1 (0.2%) S-2-B4298 (94.7%)198 (4.4%)40 (0.9%) S-2-C1758 (98.9%)16 (1.0%)3 (0.1%)

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering DBSpam Evaluation Distribution of N|H 0

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering DBSpam Evaluation CDF of Detection Time for SPRT

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering DBSpam Evaluation Accuracy of SPRT AttributeS-1-AS-1-BS-1-CS-2-AS-2-BS-2-CN-1N-2 Detection True Positives False Positives True Negatives FP/(FP+TN) %0.0061%0.0085%0.0072%0.012%0.0051%0.0096%0.015% Spam Connections Missed Connections Missed Conn. Ratio 0.8%0.4%01.8%2.0%1.3%--

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering DBSpam Evaluation Accuracy of SPRT after noise reduction Trace (M,K) (3,2)(4,3)(5,3)(5,4) S-1-A0/1880/1380/1240/110 S-1-B0/1620/1260/103 S-1-C0/1940/1500/1240/123 S-2-A0/650/360/520/27 S-2-B13/3353/2434/2160/186 S-2-C0/1930/1240/1350/94 N-10/0 N-27/71/12/20/0

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering DBSpam Evaluation Resource Consumption TraceCPU UtilCPU TimePpsPeak Mem S-1-A36.3%9.0s MB S-1-B37.7%9.8s MB S-1-C24.0%9.3s MB S-2-A58.0%36.8s MB S-2-B84.3%109.2s MB S-2-C57.1%78.6s MB N-121.7%51.1s MB N-232.1%789.9s MB

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Potential Evasions Fragmenting SMTP replies at the proxy –Change the 1:1 packet symmetry into 1:2 or 1:3 Inserting random delays at the proxy –Randomly change the 1:1 packet symmetry into 1:0 or 1:2

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Strengths Simple to implement Moves spam detection closer to source, reducing network traffic Thwarts encryption Detects proxy-based spam quickly Few false positives

UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Weaknesses Easy to evade by breaking packet symmetry Can be thwarted by short SMTP dialogs Must be installed at ISP edge Too resource intensive for imbedded systems