Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and.

Slides:



Advertisements
Similar presentations
Nick Feamster Georgia Tech
Advertisements

Revealing Botnet Membership Using DNSBL Counter-Intelligence Anirudh Ramachandran, Nick Feamster, David Dagon College of Computing, Georgia Tech.
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Dynamics of Online Scam Hosting Infrastructure
11/20/09 ONR MURI Project Kick-Off 1 Network-Level Monitoring for Tracking Botnets Nick Feamster School of Computer Science Georgia Institute of Technology.
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Understanding the Network- Level Behavior of Spammers Anirudh Ramachandran Nick Feamster Georgia Tech.
Spam and Botnets: Characterization and Mitigation Nick Feamster Anirudh Ramachandran David Dagon Georgia Tech.
Spamming with BGP Spectrum Agility Anirudh Ramachandran Nick Feamster Georgia Tech.
Spamming with BGP Spectrum Agility Anirudh Ramachandran Nick Feamster Georgia Tech.
Understanding the Network- Level Behavior of Spammers Anirudh Ramachandran Nick Feamster Georgia Tech.
Network-Based Spam Filtering Anirudh Ramachandran Nick Feamster Georgia Tech.
Network-Based Spam Filtering Nick Feamster Georgia Tech Joint work with Anirudh Ramachandran and Santosh Vempala.
1 Network-Level Spam Detection Nick Feamster Georgia Tech.
Spam Sinkholing Nick Feamster. Introduction Goal: Identify bots (and botnets) by observing second-order effects –Observe application behavior thats likely.
Spamming with BGP Spectrum Agility Anirudh Ramachandran Nick Feamster Georgia Tech.
Network Operations Research Nick Feamster
Network-Based Spam Filtering Nick Feamster Georgia Tech with Anirudh Ramachandran, Nadeem Syed, Alex Gray, Sven Krasser, Santosh Vempala.
Zhiyun Qian, Z. Morley Mao (University of Michigan)
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee ACSAC.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
Spam Sagar Vemuri slides courtesy: Anirudh Ramachandran Nick Feamster.
Understanding the Network-Level Behavior of Spammers Anirudh Ramachandran Nick Feamster.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Network Security: Spam Nick Feamster Georgia Tech CS 6250 Joint work with Anirudh Ramachanrdan, Shuang Hao, Santosh Vempala, Alex Gray.
Accurate Real-Time Identification of IP Prefix Hijacking Z. Morley Mao Xin Hu 2007 IEEE Symposium on and Privacy Oakland, California 2007 IEEE Symposium.
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
Threat infrastructure: proxies, botnets, fast-flux
1 Authors: Anirudh Ramachandran, Nick Feamster, and Santosh Vempala Publication: ACM Conference on Computer and Communications Security 2007 Presenter:
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Can DNS Blacklists Keep Up With Bots? Anirudh Ramachandran, David Dagon, and Nick Feamster College of Computing, Georgia Tech.
Fighting Spam, Phishing and Online Scams at the Network Level Nick Feamster Georgia Tech with Anirudh Ramachandran, Shuang Hao, Nadeem Syed, Alex Gray,
Spam Sonia Jahid University of Illinois Fall 2007.
An Effective Defense Against Spam Laundering Paper by: Mengjun Xie, Heng Yin, Haining Wang Presented at:CCS'06 Presentation by: Devendra Salvi.
Team Excel What is SPAM ?. Spam Offense Team Excel '‘a distinctive chopped pork shoulder and ham mixture'' Image Source:Appscout.com.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray,
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Revealing Botnet Membership Using DNSBL Counter-Intelligence David Dagon Anirudh Ramachandran, Nick Feamster, College of Computing,
Towards Modeling Legitimate and Unsolicited Traffic Using Social Network Properties 1 Towards Modeling Legitimate and Unsolicited Traffic Using.
Network-Level Spam and Scam Defenses Nick Feamster Georgia Tech with Anirudh Ramachandran, Shuang Hao, Maria Konte Alex Gray, Jaeyeon Jung, Santosh Vempala.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Understanding the Network-Level Behavior of Spammers Best Student Paper, ACM Sigcomm 2006 Anirudh Ramachandran and Nick Feamster Ye Wang (sando)
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
1 Characterizing Botnet from Spam Records Presenter: Yi-Ren Yeh ( 葉倚任 ) Authors: L. Zhuang, J. Dunagan, D. R. Simon, H. J. Wang, I. Osipkov, G. Hulten,
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
Not So Fast Flux Networks for Concealing Scam Servers Theodore O. Cochran; James Cannady, Ph.D. Risks and Security of Internet and Systems (CRiSIS), 2010.
Spamscatter: Characterizing Internet Scam Hosting Infrastructure By D. Anderson, C. Fleizach, S. Savage, and G. Voelker Presented by Mishari Almishari.
Studying Spamming Botnets Using Botlab 台灣科技大學資工所 楊馨豪 2009/10/201 Machine Learning And Bioinformatics Laboratory.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, and Ivan Osipkov. SIGCOMM, Presented.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Understanding the network level behavior of spammers Published by :Anirudh Ramachandran, Nick Feamster Published in :ACMSIGCOMM 2006 Presented by: Bharat.
Leveraging Delivery for Spam Mitigation.
Exploiting Network Structure for Proactive Spam Mitigation Shobha Venkataraman * Joint work with Subhabrata Sen §, Oliver Spatscheck §, Patrick Haffner.
11 Shades of Grey: On the effectiveness of reputation- based “blacklists” Reporter: 林佳宜 /8/16.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Microsoft Research, Silicon Valley Geoff Hulten,
1 Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Speaker: Jun-Yi Zheng 2010/01/18.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
How dynamic are IP addresses? Yinglian Xie, Fang Yu, Kannan Achan, Eliot Gillum, Moises Goldszmidt, Ted Wobber SIGCOMM ‘07 Chulhyun Park
An Effective Defense Against Spam Laundering Author: Mengjun Xie, Heng Yin, Haining Wang Presented At: CCS’ 06 Prepared By: Amit Shrivastava.
DDoS Attack and Its Defense
Presented by Aaron Ballew
Presentation transcript:

Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and Nick Feamster Defense Team:

Agenda Introduction Background and Related Work Data Collection Network-level Characteristics of Spammers Spam from Botnets Spam from Transient BGP Announcements Lessons from Better Spam Mitigation Conclusion

Introduction Spam Multiple s sent to many recipients Multiple s sent to many recipients Unsolicited commercial messages Unsolicited commercial messages Study based on network level behavior of spammers IP address ranges IP address ranges Spamming modes (route hijacking, bots, etc.) Spamming modes (route hijacking, bots, etc.) Temporal persistence of spamming hosts Temporal persistence of spamming hosts Characteristics of spamming botnets Characteristics of spamming botnets Much attention has been paid to studying the content of spam

Introduction Cont. Study posits that Network Level properties need to be investigated in order to determine creative ways to mitigate spam Paper analyzes network properties of spam that is observed at a large spam “sinkhole” BGP route advertisements BGP route advertisements Traces of command and control messages of a Bobax botnet Traces of command and control messages of a Bobax botnet Legitimate s Legitimate s Surprising Conclusions Most spam comes from a small IP address space (but so does legitimate ) Most spam comes from a small IP address space (but so does legitimate ) Most spam comes from Microsoft Windows hosts – bots Most spam comes from Microsoft Windows hosts – bots Small set of spammers use short-lived route announcements to remain untraceable Small set of spammers use short-lived route announcements to remain untraceable

Background Methods and Mitigation Spamming Methods Spamming Methods Direct Spamming – via spam friendly ISPs or dial-up IPs Open Relays and Proxies – mail serves that allow unauthenticated to relay Botnets – hijacked machines acting under the control of centralized ‘botmaster’ BGP Spectrum Agility – short-lived route announcements to the IP addresses from which they send spam; hampers traceability Mitigation Techniques Filtering: Content based and IP Blacklists Filtering: Content based and IP Blacklists

Related Work Related Work – Previous Studies Packet traces to determine bandwidth bottlenecks from spam sources Packet traces to determine bandwidth bottlenecks from spam sources Project Honeypot Project Honeypot Sink for traffic and hands out trap addresses to determine harvesting behavior and identity of spammers Time monitoring from harvesting to receipt of first spam message Countries where harvesting infrastructure is located Persistence of spam harvesters

Related Work Cont. Mitigation SpamAssassin Project – reverse engineering via mail content analysis SpamAssassin Project – reverse engineering via mail content analysis DNS blacklist – 80% of IPs sending spam were in the blacklist DNS blacklist – 80% of IPs sending spam were in the blacklist Unusual Route Announcements Bogus Well-Known addresses Bogus Well-Known addresses Suggestions of short lived route announcements Suggestions of short lived route announcements

Data Collection Reserve a “sinkhole” Reserve a “sinkhole” Registered domain with no legitimate addresses Registered domain with no legitimate addresses Establish a DNS Mail Exchange record for it. Establish a DNS Mail Exchange record for it. All s received by the server are spam All s received by the server are spam Run metrics on incoming s Run metrics on incoming s IP address of the relay; also run a traceroute IP address of the relay; also run a traceroute TPC fingerprint to get the source OS TPC fingerprint to get the source OS Results of DNS blacklist from 8 different blacklist servers Results of DNS blacklist from 8 different blacklist servers

Data Collection Cont. Spam received per day at sinkhole (Aug – Dec. 2005)

Data Collection Cont. “Hijack” the DNS server for the domain running a botnet Have botnet commands go to a known machine instead. Have botnet commands go to a known machine instead. M onitor the BGP update from the networks where the spams are received M onitor the BGP update from the networks where the spams are received Collect logs from large provider (40 million mailboxes) Collect logs from large provider (40 million mailboxes) Allows analysis of network characteristics for spam and non-spam Allows analysis of network characteristics for spam and non-spam

Data Analysis Study focuses on network level characteristics Study focuses on network level characteristics Distribution of spam across IP address space is similar to legitimate s (although not exact) Distribution of spam across IP address space is similar to legitimate s (although not exact) Spam over IP address range is not uniform Spam over IP address range is not uniform 12% of all received spam comes from two Autonomous Systems (AS) 12% of all received spam comes from two Autonomous Systems (AS) 37% come from top 20 ASes. 37% come from top 20 ASes. Offers insight into spam prevention Offers insight into spam prevention Classifying spam by country: China, Korea, & US dominate Classifying spam by country: China, Korea, & US dominate Defense suggestion Defense suggestion Correlate originating country with IP range to estimate probability of spam. Correlate originating country with IP range to estimate probability of spam.

Cumulative Distribution Function (CDF) of Spam and Legitimate Greater probability of legitimate s Big increase in probability of received spam

Spam Persistence 85% of unique spammers send 10 s or less If this is true for all, what’s the value in filtering by a specific IP address?

Effectiveness of Blacklists About 80% of spam listed in at least one major blacklist

Effectiveness of Blacklists Cont. Most spam bots are detected by at least one DNSRBL Only 50% of spammers using transient BGP announcements detected by one DNSRBL

Spam from Botnets Circumstantial evidence suggests that most spam originates from bots Spamming hosts and Bobax drones have very similar distributions across IP address space Suggests that much spam received may be due to botnets such as Bobax Suggests that much spam received may be due to botnets such as Bobax

More on Bots Most individual bots send low volume of spam individually

Operating Systems Used by Spammers Used OS fingerprinting tool “p0f” in Mail Avenger Able to identify OS of 75% of hosts that sent spam Of this 75% identifiable segment, 95% run Windows Of this 75% identifiable segment, 95% run Windows Consistent with percentage of hosts on Internet that run Windows Consistent with percentage of hosts on Internet that run Windows Only about 4% run other OS, but are responsible for 8% of received spam. This goes against common perception that most spam originates from Windows botnet drones This goes against common perception that most spam originates from Windows botnet drones

Spam from Transient BGP Announcements Some spammers briefly hijack large portions of IP address space (that do not belong to them), send spam, and withdraw routes immediately after spamming Not much known, not well defended against Very difficult to trace Allows spammer to evade DNSRBLs Allows spammer to evade DNSRBLs Used 10% or less of the time, as complementary spamming tactic

Lessons on Spam Mitigation Why should we use network-level information? Information is less malleable Information is less malleable More constant than spam contents, which content-based filters monitor Information is observable in the middle of the network Information is observable in the middle of the network Closer to the source of the spam than other techniques Will result in more effective spam filters Will result in more effective spam filters When combined with other techniques Has potential to stop spam that other techniques miss Has potential to stop spam that other techniques miss

More Lessons Improves knowledge of host identity Bases detection techniques on aggregate behavior Protects against route hijacking “BGP spectrum agility” “BGP spectrum agility” Other techniques do not Other techniques do not Uses network-level properties to detect and filter

Conclusion Studying the network-level behavior of spammers Designing better spam filters with network- level filters Network-level behavior filters vs. content- based filters Should not replace content-based filters, but complement them Should not replace content-based filters, but complement them

Questions?