Understanding the Network-Level Behavior of spammers
Download
Report
Transcript Understanding the Network-Level Behavior of spammers
Understanding the network level
behavior of spammers
Published by :Anirudh Ramachandran, Nick Feamster
Published in :ACMSIGCOMM 2006
Presented by: Bharat Soundararajan
OUTLINE
Spam
- Basics of spam
- Spam statistics
- Spamming methods
- Spam filtering
Network level behavior of spam
-
Network level spam filtering
Data Collection Method
Tools used for data collection
Evaluations
Drawbacks
2
SPAM
3
What is Spam?
E-mail spam, also known as "bulk e-mail" or
"junk e-mail," is a subset of spam that involves
nearly identical messages sent to numerous
recipients by e-mail.
Spammers use unsecured mail servers to send
out millions of illegitimate emails
2007 - (February) 90 billion per day
4
Spam statistics
5
Spamming Methods
Direct spamming
– By purchasing upstream connectivity from “spamfriendly ISPs”
Open relays and proxies
– Mail servers that allow unauthenticated Internet hosts
to connect and relay mail through them
Botnets
Using the worm to infect mail servers and
sending mail through them e.g.bobax
BGP Spectrum Agility
Short lived BGP route announcements
6
Botnet command and control
Already captured Command and control center information
is used for the sinkhole to act like command and control
center
All bots now try to contact the command and control
sinkhole and they collected a packet trace to determine the
members of botnet
They observed a significantly higher percentage of infected
hosts is windows using Pof passive fingerprinting tool
Information collected is not accurate
7
Sink hole
8
Dns blacklisting
A list of open-relay mail servers or open proxies—or of
IP addresses known to send spam
Data collected from Spam-trap addresses or
honeypots
80% of all spam received from mail relays
appear in at least one of eight blacklists
> 50% of spam was listed in two or more
blacklists
9
Spam filtering
Spammers
are able to easily alter the
contents of the email
SpamAssasin
: a spam filter used for filtering
is mainly source Ip and other variables
which is easily changed by spammers
They have less flexibility when comes to
altering the network level details of email
10
Spam filtering by this paper
- Comparing data with the logs from a large ISP
- Analyzing the network level behavior using
those logs in the sinkhole
- Update the filter content using those comparison
11
Network-level Spam Filtering
• Network-level properties are harder to change
than content
• Network-level properties
– IP addresses and IP address ranges
– Change of addresses over time
– Distribution according to operating system, country
and AS
– Characteristics of botnets and short-lived route
announcements
• Help develop better spam filters
12
Data collected when the spam is received
• IP address of the mail relay
• Trace route to that IP address, to help us
estimate the network location of the mail relay
• Passive “p0f” TCP fingerprint, to determine the
OS of the mail relay
• Result of DNS blacklist (DNSBL) lookups for that
mail relay at eight different DNSBLs
13
Mail avenger
few of the environment
variables Mail Avenger sets
CLIENT_NETPATH the
network route to the client
SENDER the sender address
of the message
CLIENT_SYNOS a guess of
the client's operating system
type
14
Distribution across ASes
Still about 40% of spam coming from the U.S.
15
Pof fingerprinting
Passive Fingerprinting is a method to learn more about the
enemy, without them knowing it
Specifically, you can determine the operating system and other
characteristics of the remote host
TTL – what TTL is used for the operating system
Window Size – what window size the operating system uses
DF – whether the operating system set the don’t fragment bit
TOS – Did the operating system specify what type of service
16
OS guess from ttl values
OPERATING
SYSTEM
VERSION
TTL
VALUES
LINUX
Red Hat 9
64
FREE BSD
5.0
64
Solaris
2.5.1,2.6,2.7,2.8
255
Windows
98
32
windows
XP
128
17
Distribution Among Operating Systems
About 4% of known hosts
are non-Windows.
These hosts are
responsible for about 8%
of received spam.
18
Spam Distribution
IP Space
19
Advantages
• A key to better and efficient filtering
• Reporting of information about spam helps
in updating the blacklist
20
Weaknesses
• They cannot distinguish between spam
obtained from different techniques
• They didn’t precisely measure using bobax
botnet
21
THANK YOU
22