Zhiyun Qian, Z. Morley Mao (University of Michigan)

Slides:



Advertisements
Similar presentations
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 22 Simple Mail Transfer Protocol (SMTP)
Advertisements

You have been given a mission and a code. Use the code to complete the mission and you will save the world from obliteration…
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
Copyright © 2003 Pearson Education, Inc. Slide 7-1 The Web Wizards Guide to PHP by David Lash.
Advanced Piloting Cruise Plot.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
1 An Update on Multihoming in IPv6 Report on IETF Activity IPv6 Technical SIG 1 Sept 2004 APNIC18, Nadi, Fiji Geoff Huston.
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
A New Method for Symmetric NAT Traversal in UDP and TCP
Nick Feamster Georgia Tech
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Spam and Botnets: Characterization and Mitigation Nick Feamster Anirudh Ramachandran David Dagon Georgia Tech.
Network-Based Spam Filtering Anirudh Ramachandran Nick Feamster Georgia Tech.
Network-Based Spam Filtering Nick Feamster Georgia Tech Joint work with Anirudh Ramachandran and Santosh Vempala.
1 Network-Level Spam Detection Nick Feamster Georgia Tech.
Multihoming and Multi-path Routing
Objectives To introduce software project management and to describe its distinctive characteristics To discuss project planning and the planning process.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
My Alphabet Book abcdefghijklm nopqrstuvwxyz.
Multiplying binomials You will have 20 seconds to answer each of the following multiplication problems. If you get hung up, go to the next problem when.
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Year 6 mental test 5 second questions
ZMQS ZMQS
Chapter 1 Introduction Copyright © Operating Systems, by Dhananjay Dhamdhere Copyright © Introduction Abstract Views of an Operating System.
Internet Number Resources 1. Internet IPv4 addresses IPv6 addresses Autonomous System number Fully Qualified Domain Name Key Internet resources.
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
D-Link Switch Training ©Copyright By D-Link HQ TSD James Chu.
ATM Firewall Routers with Black Lists Hwajung LEE The George Washington University School of Engineering and Applied Science Electrical Engineering and.
ABC Technology Project
© 2006 Cisco Systems, Inc. All rights reserved. MPLS v MPLS VPN Technology Introducing MPLS VPN Architecture.
© Blue Coat Systems, Inc All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats.
VOORBLAD.
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
Squares and Square Root WALK. Solve each problem REVIEW:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I IP ADDRESSING AND SUBNETS Derived From CCNA Network Fundamentals.
Do you have the Maths Factor?. Maths Can you beat this term’s Maths Challenge?
© 2012 National Heart Foundation of Australia. Slide 2.
Lets play bingo!!. Calculate: MEAN Calculate: MEDIAN
Chapter 5 Test Review Sections 5-1 through 5-4.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 VLANs LAN Switching and Wireless – Chapter 3.
06-Sep-2006Copyright (C) 2006 Internet Initiative Japan Inc.1 Prevent DoS using IP source address spoofing MATSUZAKI ‘maz’ Yoshinobu.
Addition 1’s to 20.
25 seconds left…...
Multihoming and Multi-path Routing CS 7260 Nick Feamster January
Detecting Spam Zombies by Monitoring Outgoing Messages Zhenhai Duan Department of Computer Science Florida State University.
Week 1.
We will resume in: 25 Minutes.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
PSSA Preparation.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 16 Integrated Services Digital Network (ISDN)
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
Traversing symmetric NAT with predictable port allocation function SIN 2014 Dušan Klinec, Vashek Matyáš Faculty of Informatics, Masaryk University.
Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and.
BotGraph: Large Scale Spamming Botnet Detection Yao Zhao Yinglian Xie *, Fang Yu *, Qifa Ke *, Yuan Yu *, Yan Chen and Eliot Gillum ‡ EECS Department,
Middleboxes & Network Appliances EE122 TAs Past and Present.
Introduction to Honeypot, Botnet, and Security Measurement
Understanding the Network-Level Behavior of Spammers Best Student Paper, ACM Sigcomm 2006 Anirudh Ramachandran and Nick Feamster Ye Wang (sando)
A Dynamic Packet Stamping Methodology for DDoS Defense Project Presentation by Maitreya Natu, Kireeti Valicherla, Namratha Hundigopal CISC 859 University.
1 Honeypot, Botnet, Security Measurement, Spam Cliff C. Zou CDA /01/07.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Understanding the network level behavior of spammers Published by :Anirudh Ramachandran, Nick Feamster Published in :ACMSIGCOMM 2006 Presented by: Bharat.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Microsoft Research, Silicon Valley Geoff Hulten,
Presentation transcript:

Investigation of Triangular Spamming: a Stealthy and Efficient Spamming Technique Zhiyun Qian, Z. Morley Mao (University of Michigan) Yinglian Xie, Fang Yu (Microsoft Research Silicon Valley)

Introduction Security is an arms race, so is spam New spamming techniques invented New prevention/detection proposed People always say security is an arms race, we think so is spam. If we look at the history of battling spam, it always goes through the loop where new spamming techniques are invented and then corresponding prevention and detection are proposed.

Network-level spamming arms race Attack: Botnet-based spamming to hide real identity Defense: IP-based blacklist: making IP addresses important resources, limit spammer’s throughput Port 25 blocking: limit end-user IP addresses for spamming An example of arms race from the network’s perspective is that today’s spam are mostly sent from botnets which hides the real identity of spammers. The large scale of the distributed botnets can effectively deliver spam messages at a very high rate. As shown in the figure, the spammer instructs bots in various networks to send spam. One of the corresponding defenses is IP-based blacklist. The idea is that if one IP address sends too many spam, it will be listed on the blacklist and subsequent emails delivered from this IP address will be marked as spam. IP-based blacklisting effectively makes IP addresses important resources and limits the spammer’s throughput because if an IP address sends too many spam, it will be blacklisted very quickly. The problem with this approach though is that it can be incomplete. Port 25 blocking: a little bit of background of port 25. Port 25 is used by SMTP protocol for communication between mail servers. Many ISPs are blocking port 25 in an attempt to reduce the spam traffic originated from their network. For example, ISPs like comcast or AT&T may block such traffic. This defense effectively limits the end-user IP addresses for spamming. However, not all of the ISPs will do that.

Yet another new attack: Triangular spamming Relatively unknown but real attack [NANOG Mailing list Survey] Not proposing a new attack But studying “how serious it can be? how prevalent it is?” Normal mail server communication Src IP Dst IP Msg Type Legend It is a relatively unknown but real attack. We actually have done a survey on nanog mailing list and found out that some network operators do know about this attack. So we are not proposing a new attack. Instead, we are interested in knowing How serious this attack can be? How big of an impact it can have? And how prevalent this attack is? In normal cases without triangular spamming, there would be two entities involved – one sending mail server and one receiving mail server. In the normal case, the sending mail server would send TCP SYN packet to the mail server and then the receiving mail server would respond with a SYN-ACK packet. Based on the TCP sequence number in the SYN-ACK packet, the sending mail server will reply with the appropriate ACK packet to complete the TCP connection. DDoS attack using IP spoofing, reverse traceroute Important to explain how it works and requirement Different color for Src and Dst IP Add two machines setup 1.1.1.1 2.2.2.2 SYN 2.2.2.2 1.1.1.1 SYN-ACK 1.1.1.1 2.2.2.2 ACK

Yet another new attack: Triangular spamming How it works IP spoofing Network-level packet relay Legend Src IP Dst IP Msg Type 3.3.3.3 3.3.3.3 2.2.2.2 SYN-ACK With triangular spamming, there are three entities involved – high bandwidth bot on the right, which has a high bandwidth to deliver spam at a high rate. And there is relay bot on the left which relays packets from the mail server to the high bandwidth bot. Finally, there is the mail server which is the victim. The attack has two requirements: IP spoofing and network-level packet relay. As shown in the figure, the high bandwidth bot sends the TCP SYN packet to the mail server. Instead of putting its own IP address as source IP, it puts the relay bot’s IP address as source IP. When mail server receives the packet, it will respond to the relay bot since the IP is spoofed. The relay bot will then relay the packet back to the high bandwidth bot so that it can send ACK packet to complete the TCP connection. Note that relay bot is necessary because the high bandwidth bot needs the sequence number in the SYN-ACK packet in order to send a correct ACK packet. DDoS attack using IP spoofing, reverse traceroute Important to explain how it works and requirement 2.2.2.2 3.3.3.3 SYN 2.2.2.2 1.1.1.1 SYN-ACK 2.2.2.2 1.1.1.1

Benefits of triangular spamming Stealthy and efficient Evade IP-based blacklist High bandwidth bot will not be blacklisted (due to IP spoofing) Yet can send at high throughput (can use multiple relay bots) Evade port 25 blocking Relay bot can potentially bypass port 25 blocking Src Port: 25 Dst Port: * Packet format (src and port 25). We consider that the network of the relay bot is vulnerable Src Port: * Dst Port: 25 Src Port: * Dst Port: *

Questions of interest How to evade IP-based blacklist? Two techniques to improve spam throughput while hiding high-bandwidth bot IP addresses How to evade port 25 blocking? A large-scale measurement on port 25 blocking policy 97% of the blocking networks are vulnerable Is there evidence in the wild? Implement and deploy proof-of-concept attack on planetlab Collected evidence at a mail server

Questions of interest How to evade IP-based blacklist? Two techniques to improve spam throughput while hiding high-bandwidth bot IP addresses How to evade port 25 blocking? A large-scale measurement on port 25 blocking policy 97% of the blocking networks are vulnerable Is there evidence in the wild? Implement and deploy proof-of-concept attack on planetlab Collected evidence at a mail server

Spamming high throughput analysis Strategy 1: All bots directly send spam at their full speed Can achieve good throughput Expose high-bandwidth bots Strategy 2: Triangular spamming is used where only high bandwidth bots send spam Hide the high bandwidth bots’ IP addresses Evade IP-based blacklist Present two new techniques to improve throughput Show pictures instead of text Triangular spamming exists! Say it in the upfront.

Technique 1 – Selectively relaying packets No need to relay response data packets Intuition: always succeed in common cases Save bandwidth for high-bandwidth bot (Response traffic constitutes 15% - 25% traffic) 3.3.3.3 Legend Src IP Dst IP Msg Type 3.3.3.3 2.2.2.2 Welcome 2.2.2.2 3.3.3.3 HELO 2.2.2.2 1.1.1.1

Technique 2 – aggressive pipelining Pipelining – send multiple commands without waiting for response from previous commands - Normal Pipelining send(command1); send(command2); recv_and_process(response); send(command3); send(command4); - Aggressive Pipelining send(command1); send(command2); sleep(t); send(command3); send(command4); Control packets (SYN-ACK packets need to be relayed) Multiple connections to increase throughput Multiple relay bots Minimize t (improve throughput of individual connection) Subject to constraint: t > processing time on the server - Can be learned in triangular spamming easily

Questions of interest How to evade IP-based blacklist? Two techniques to improve spam throughput while hiding high-bandwidth bot IP addresses How to evade port 25 blocking? A large-scale measurement on port 25 blocking policy 97% of the blocking networks are vulnerable Is there evidence in the wild? Implement and deploy proof-of-concept attack on planetlab Collected evidence at a mail server

Port 25 blocking study X Hypothesis on current ISP’s policy Directional traffic blocking Blocking outgoing traffic with dst port 25 (OUT) NOT blocking incoming traffic with src port 25 (IN) Relay bot’s IP can be used to send spam Src Port: 25 Dst Port: * Port 25 blocking background Explain OUT blocking is more common Focus on the ISP of relay bots22 Remove the incoming firewall If incoming blocking, then relay bot won’t be able to relay packets for high bandwidth bot and triangular spamming would not work. X Src Port: * Dst Port: 25 Src Port: * Dst Port: 25 Src Port: * Dst Port: *

Port 25 blocking experiments Step 1: Obtain candidate network/prefixes that enforce port 25 blocking Step 2: Answer whether they are vulnerable to triangular spamming To verify our hypothesis, we conduct experiments in two steps

Port 25 blocking experiments Step 1: Obtain candidate network/prefixes that enforce port 25 blocking Instrument multiple websites Verify via active probing Step 2: Answer whether they are vulnerable to triangular spamming

Step 1: Obtain candidate network/prefixes that enforce port 25 blocking Inserted a flash script in educational websites in US and China for two months Flash script: try to connect to our server on port 25 If connection unsuccessful, two possible reasons: 1) host firewall blocking 2) ISP-level blocking (either IN or OUT) More data points needed to distinguish the 1) and 2) via active probing Active probing Assumption: ISP level policy is similar in a large IP range Src: 25 Dst: 80 Src: 80 Dst: 25

Port 25 blocking networks Results 21,131 unique IPs, 7016 BGP prefixes 688 prefixes (9.8%) have port 25 blocked More detailed analysis in the paper Mention US and CN Order the table Add highlights on both figures Total number of prefixes % of blocking prefixes

Port 25 blocking experiments Step 1: Obtain candidate network/prefixes that enforce port 25 blocking Instrument multiple websites Verify via active probing Step 2: Answer whether they are vulnerable to triangular spamming Conduct novel active probing

IN or OUT blocking? IPID value (unique identifier in IP header) Src: 25 Dst: 80 Src: 25 Dst: 80 Src: 80 Dst: 25 IPID value (unique identifier in IP header) Monotonically increasing Src: 25 Dst: 80 Src: 25 Dst: 80 Src: 25 Dst: 80 Src: 25 Dst: 80 Src: 25 Dst: 80 Src: 80 Dst: 80 Src: 80 Dst: 80 Src: 80 Dst: 80 IPID: 7 Src: 80 Dst: 25 IPID: 4 Src: 80 Dst: 25 IPID: 2 Src: 80 Dst: 25 IPID: 3 Src: 80 Dst: 25 IPID: 5 Src: 80 Dst: 25 IPID: 6 Src: 80 Dst: 80 IPID: 1

IN or OUT blocking results Only 22 out of 688 prefixes performed IN blocking (3.2%) The remaining 666 prefixes are vulnerable to triangular spamming Next step Are these prefixes usable to the spammers? Are they listed on the blacklists? Directly say whether triangular spamming is allowed or not

Defense in depth – IP blacklisting Spamhaus Policy Blocking List (PBL) End-user IP address ranges which “should not deliver unauthenticated SMTP email” (e.g. dynamic IP) Maintained by voluntary ISPs and PBL team Only 296 out of 666 (44%) vulnerable prefixes on PBL Not covered by port 25 blocking or IP-based blacklist Still exploitable by spammers via triangular spamming

Questions of interest How to evade IP-based blacklist? Two techniques to improve spam throughput while hiding high-bandwidth bot IP addresses How to evade port 25 blocking? A large-scale measurement on port 25 blocking policy 97% of the blocking networks are vulnerable Is there evidence in the wild? Implement and deploy proof-of-concept attack on planetlab Collected evidence at a mail server

Prevention and detection Prevention – ISP side Do not allow IP spoofing Operationally challenging (one reason: multi-homing) Block incoming traffic with src port 25 More feasible Stateful firewall to disable relay bot Overhead Detection – mail server side, look for IP addresses that are blocked for port 25 (they should not send emails, so likely use triangular spamming) Different network characteristics (network topology and network delay) No ground truth

Detection results at a mail server Data 7-day network traces at our departmental mail server Methodology For any incoming connection, active probing to look for port 25 blocking behavior (These IPs should not be delivering emails in the first place) May be incomplete Results 1% of all IP addresses have port 25 blocking behavior Spam ratio for these IP addresses: 99.9% Other analysis in the paper Remove the figures Compare with baseline spam ratio

Conclusion A new stealthy and efficient spamming technique – triangular spamming Present techniques to improve throughput under triangular spamming Demonstrate today’s ISP port 25 blocking policy allows triangular spamming Collect evidence for triangular spamming in the wild

Thanks Q/A