Correlating Spam Activity with IP Address Characteristics Chris Wilcox, Christos Papadopoulos CSU John Heidemann USC/ISI IEEE Global Internet Symposium.

Slides:



Advertisements
Similar presentations
Nick Feamster Georgia Tech
Advertisements

Revealing Botnet Membership Using DNSBL Counter-Intelligence Anirudh Ramachandran, Nick Feamster, David Dagon College of Computing, Georgia Tech.
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
11/20/09 ONR MURI Project Kick-Off 1 Network-Level Monitoring for Tracking Botnets Nick Feamster School of Computer Science Georgia Institute of Technology.
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Challenges in Making Tomography Practical
Understanding the Network- Level Behavior of Spammers Anirudh Ramachandran Nick Feamster Georgia Tech.
Spamming with BGP Spectrum Agility Anirudh Ramachandran Nick Feamster Georgia Tech.
Spamming with BGP Spectrum Agility Anirudh Ramachandran Nick Feamster Georgia Tech.
Understanding the Network- Level Behavior of Spammers Anirudh Ramachandran Nick Feamster Georgia Tech.
Network-Based Spam Filtering Nick Feamster Georgia Tech Joint work with Anirudh Ramachandran and Santosh Vempala.
Network Operations Research Nick Feamster
Zhiyun Qian, Z. Morley Mao (University of Michigan)
Temporal Query Log Profiling to Improve Web Search Ranking Alexander Kotov (UIUC) Pranam Kolari, Yi Chang (Yahoo!) Lei Duan (Microsoft)
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Using Traffic Analysis to Detect Spam Richard Clayton TERENA, Lyngby, 22 nd May 2007.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
Week 5: Internet Protocol Continue to discuss Ethernet and ARP –MTU –Ethernet and ARP packet format IP: Internet Protocol –Datagram format –IPv4 addressing.
Student : Wilson Hidalgo Ramirez Supervisor: Udaya Tupakula Filtering Techniques for Counteracting DDoS Attacks.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
Spam Sagar Vemuri slides courtesy: Anirudh Ramachandran Nick Feamster.
Understanding the Network-Level Behavior of Spammers Anirudh Ramachandran Nick Feamster.
Network Security: Spam Nick Feamster Georgia Tech CS 6250 Joint work with Anirudh Ramachanrdan, Shuang Hao, Santosh Vempala, Alex Gray.
Accurate Real-Time Identification of IP Prefix Hijacking Z. Morley Mao Xin Hu 2007 IEEE Symposium on and Privacy Oakland, California 2007 IEEE Symposium.
Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
1 Authors: Anirudh Ramachandran, Nick Feamster, and Santosh Vempala Publication: ACM Conference on Computer and Communications Security 2007 Presenter:
Can DNS Blacklists Keep Up With Bots? Anirudh Ramachandran, David Dagon, and Nick Feamster College of Computing, Georgia Tech.
An Effective Defense Against Spam Laundering Paper by: Mengjun Xie, Heng Yin, Haining Wang Presented at:CCS'06 Presentation by: Devendra Salvi.
Team Excel What is SPAM ?. Spam Offense Team Excel '‘a distinctive chopped pork shoulder and ham mixture'' Image Source:Appscout.com.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
Common forms and remedies Neeta Bhadane Raunaq Nilekani Sahasranshu.
Understanding Forgery Properties of Spam Delivery Paths Fernando Sanchez, Zhenhai Duan Florida State University Yingfei Dong University of Hawaii.
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray,
Revealing Botnet Membership Using DNSBL Counter-Intelligence David Dagon Anirudh Ramachandran, Nick Feamster, College of Computing,
CCNA Introduction to Networking 5.0 Rick Graziani Cabrillo College
1 CMPT 471 Networking II ICMP © Janice Regan, 2012.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 8 TCP/IP Suite Error and Control Messages.
Understanding the Network-Level Behavior of Spammers Best Student Paper, ACM Sigcomm 2006 Anirudh Ramachandran and Nick Feamster Ye Wang (sando)
1 Characterizing Botnet from Spam Records Presenter: Yi-Ren Yeh ( 葉倚任 ) Authors: L. Zhuang, J. Dunagan, D. R. Simon, H. J. Wang, I. Osipkov, G. Hulten,
Report on “Spamming Botnets: Signatures and Characteristics ” Heyong Wang Department of Computer Science Iowa State University.
Not So Fast Flux Networks for Concealing Scam Servers Theodore O. Cochran; James Cannady, Ph.D. Risks and Security of Internet and Systems (CRiSIS), 2010.
1 Honeypot, Botnet, Security Measurement, Spam Cliff C. Zou CDA /01/07.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin In First Workshop on Hot Topics in Understanding Botnets,
Cross-Analysis of Botnet Victims: New Insights and Implication Seungwon Shin, Raymond Lin, Guofei Gu Presented by Bert Huang.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, and Ivan Osipkov. SIGCOMM, Presented.
Spamming Botnets: Signatures and Characteristics Authors:Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten+, Ivan Osipkov+ Presenter: Chia-Li.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
A Framework for Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann, Christos Papadopoulos Reviewed by Dave Lim.
Understanding the network level behavior of spammers Published by :Anirudh Ramachandran, Nick Feamster Published in :ACMSIGCOMM 2006 Presented by: Bharat.
Leveraging Delivery for Spam Mitigation.
The Dark Menace: Characterizing Network-based Attacks in the Cloud
Exploiting Network Structure for Proactive Spam Mitigation Shobha Venkataraman * Joint work with Subhabrata Sen §, Oliver Spatscheck §, Patrick Haffner.
Tracking Malicious Regions of the IP Address Space Dynamically.
11 Shades of Grey: On the effectiveness of reputation- based “blacklists” Reporter: 林佳宜 /8/16.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Microsoft Research, Silicon Valley Geoff Hulten,
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
1 Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Speaker: Jun-Yi Zheng 2010/01/18.
Network Layer IP Address.
Heat-seeking Honeypots: Design and Experience John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy and Martin Abadi WWW 2011 Presented by Elias P.
How dynamic are IP addresses? Yinglian Xie, Fang Yu, Kannan Achan, Eliot Gillum, Moises Goldszmidt, Ted Wobber SIGCOMM ‘07 Chulhyun Park
Internet Quarantine: Requirements for Containing Self-Propagating Code
DDoS Attacks on Financial Institutions Presentation
COMPUTER NETWORKS CS610 Lecture-33 Hammad Khalid Khan.
De-anonymizing the Internet Using Unreliable IDs
De-anonymizing the Internet Using Unreliable IDs By Yinglian Xie, Fang Yu, and Martín Abadi Presented by Peng Cheng 03/22/2017.
Presentation transcript:

Correlating Spam Activity with IP Address Characteristics Chris Wilcox, Christos Papadopoulos CSU John Heidemann USC/ISI IEEE Global Internet Symposium 2010 March 19, 2010

2 Introduction Common belief: spamming hosts exhibit specific address characteristics: dynamically allocated addresses specific geographical areas more tolerant spam policies less stability, more volatility, shorter uptimes Our goal: quantify differences in address characteristics between spammers and legitimate hosts.

3 Approach Correlate the results of an IP address visibility study with a commercial IP address blacklist for the same period Quantify differences in address characteristics between spammers and non-spammers Quantify differences in domain names based on the same categorization Investigate collateral damage if a /24 is blocked due to presence of spammers

4 Data Sources Address visibility: Survey of reachable Internet addresses every 3 months Survey of reachable Internet addresses every 3 months Uses active probing (ICMP) over ~24,000 /24 IPV4 blocks (1% of the Internet) Uses active probing (ICMP) over ~24,000 /24 IPV4 blocks (1% of the Internet) Reputation-based block list from eSoft.com, based on sender address verification, sender policy framework, heuristic analysis, reputation filtering, historical averaging, etc…, based on sender address verification, sender policy framework, heuristic analysis, reputation filtering, historical averaging, etc…

5 Visibility Study Census: ping every internet address every three months Survey: select 1% of /24 subnets and ping addresses every 11m This research uses survey data which has more information

6 Visibility Metrics Availability (A) is the fraction of time that an IP address returns positive replies Volatility (V) captures the number of transitions from up to down over survey Uptime (U) is the median duration of positive replies from an IP address Each statistic computed for IP addresses, then averaged over a /24 subnet

7 Spammer List Spammer data from eSoft.com Two lists: Block list and Raw list Two lists: Block list and Raw list Both delivered to CSU every 30mins (yes we archive and we can share) (yes we archive and we can share) List of IP addresses with spam score per address Score range: -60 to +70 Score range: -60 to +70 Score >30: high spamming activity (conservative) Score >30: high spamming activity (conservative) Score <10: low spamming activity Score <10: low spamming activity We use eSoft’s Raw List: ~1.43M addresses spanning 262K /24 subnets daily We assume score >= 20 is spammer Distinguish spammers with high confidence

8 eSoft World Coverage eSoft has pretty good coverage of the world

9 eSoft Score Distribution

10 Research Methodology Correlate ping survey data with eSoft list between Sept , 2009 Intersect data from the survey and eSoft to identify spamming subnets Remainder are non-spamming subnets which have no spammers (yes, this might be a weak assumption!) Study the differences between spamming and non-spamming subnets

11 Spammer Distribution Number of spamming subnets plotted using log scale Most subnets have fewer than 5 spamming hosts

12 Non-Spammer Distribution Non-spamming hosts much more evenly distributed… …but large number of subnets are almost fully populated

13 Question 1: Address Characteristics Question: Do spammer and non-spammer subnets have different IP characteristics (availability, volatility, uptime)? Approach: intersect blacklist and survey subnets and study their characteristics before intersection: 262k blacklist and 20k survey subnets after intersection: 4k spamming and 15k non- spamming subnets.

14 Address Availability 72% of non-spammers but only 50% of spammers have >0.5 availability 50% of non-spammers but only 24% of spammers have >0.8 availability

15 Address Volatility 90% of non-spammers but only 75% of spammers have <0.02 volatility 50% of non-spammers but only 28% of spammers have <0.01 volatility

16 Address Uptime 70% of non-spammers, 42% of spammers have > 14 hour uptime 44% of non-spammers, 22% of spammers have > 28 hour uptime

17 Availability with Spam Score 83% of low spammers have > 0.9 availability. 14% of high spammers have > 0.9 availability.

18 Question 2: Domain Names Question: How do spammer domain names differ from non-spammer names? Approach: Resolve all names in intersected subnets using Linux host command. Categorize based on key strings in the domain name.

19 Domain Name Comparison 2X the spammers in dynamic category, 30.5% vs. 15.3% 3X the non-spammers in static category, 14.1% versus 4.2%

20 Question 3: Collateral Damage Question: Is blocking the entire /24 subnet a good idea when one or more addresses have been used for sending spam? Collateral Damage consists of legitimate mail servers that are incorrectly blacklisted. Approach: 1) Compute population of spamming hosts versus non-spamming hosts per subnet. 2) Quantify the number of legitimate mail servers in subnets with spammers.

21 Collateral Damage: Population Gray: Subnets with few spammers: may get black listed because of this! Black: Highly compromised subnets: negligent or collaborating provider? Blue: High spammer activity in some subnets: further investigation needed.

22 Collateral Damage: Results Collateral damage in 365 subnets out of 4,126 studied (8.8%) This seems significant to us…

23 Robustness Ping-based address probes undercount the number of responsive addresses Spam list may not be complete (depends on eSoft’s customer reach) Spam blacklists vary greatly between vendors, no industry standard for scores volume from servers isn’t considered, some servers may be receive-only

24 Conclusions Network behavior can be used to help identify and mitigate spamming behavior. Significant differences in IP availability, volatility, uptime, and domain names do exist between spamming and non- spamming hosts. Coarse-grained blacklisting of /24 blocks incurs significant collateral damage.

25 Acknowledgements Yuri Pradkin, and Xue Cai (USC/ISI) for access to survey data sets. Dan Massey, and Steve DiBenedetto (CSU) for help in many areas.

26 Challenges The anonymous nature of the Internet makes it hard to detect and block malicious activity such as spamming. Dynamic addressing, network address translation, and network firewalls impede the use of IP for identification. IP addresses are transient and vulnerable to manipulation malicious hosts, such as spoofing or hijacking

27 Probe Responses 1.Echo reply from probe indicates the presence of a host at the probed address. 2.Destination unreachable means that the host is down or the address is currently unused. 3.Administratively prohibited indicates that the owner is prohibiting access to the address. 4.No reply is interpreted as an unoccupied address, lost or intentionally discarded probe.

28 Methodology

29 Domain Name Category Copied from “Understanding Address Usage in the Visible Internet”

30 Related Work  “Census and Survey of the Visible Internet”, Heidemann, Pryadkin, Govindan, Papadopoulos, Bartlett, Bannistger., SIGCOMM 2008  “Understanding the network-level behavior of spammers”, Ramachandran, Feamster, SIGCOMM 2006  “Filtering spam with behavioral blacklisting”, Ramachandran, Feamster, Vempala, CCS 2007  “Spamming botnets: signatures and characteristics”, Xie, Yu, Achan, Panigrahy, Hulten, Osipkov, SIGCOMM 2008  “Behavioral characteristics of spammers and their network reachability properties”, Duan, Gopalan, Yuan, ICC 2007  “Spamming botnets: Are we losing the war?”, Kokkodis, Faloutsos, CEAS 2009  “Can dns-based blacklists keep up with the bots?”, Ramachandran, Feamster, CEAS 2006