Understanding Forgery Properties of Spam Delivery Paths Fernando Sanchez, Zhenhai Duan Florida State University Yingfei Dong University of Hawaii.

Slides:



Advertisements
Similar presentations
Understanding the Network- Level Behavior of Spammers Anirudh Ramachandran Nick Feamster Georgia Tech.
Advertisements

Basic Communication on the Internet:
Detecting Spam Zombies by Monitoring Outgoing Messages Zhenhai Duan Department of Computer Science Florida State University.
CSCI 4550/8556 Computer Networks Comer, Chapter 22: The Future IP (IPv6)
Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces Roberto Perdisci, Igino Corona, David Dagon, Wenke Lee ACSAC.
Forensics. Case Study An attached to a $20 million dollar lawsuit purported to be from the CEO of “Tech.com” to a venture capital broker.
Permission Keys in five easy steps Adrian McElligott
Early Detection of Outgoing Spammers in Large-Scale Service Provider Networks Yehonatan Cohen Daniel Gordon Danny Hendler Ben-Gurion University Yehonatan.
How Will Authentication Reduce Global Spam? OECD Anti-Spam Task Force Pusan – September, 2004 Dave Crocker Brandenburg InternetWorking OECD Anti-Spam Task.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
1 Interdomain Routing Protocols. 2 Autonomous Systems An autonomous system (AS) is a region of the Internet that is administered by a single entity and.
Lecture 5: security: PGP Anish Arora CIS694K Introduction to Network Security.
Distributed Systems Fall 2010 Replication Fall 20105DV0203 Outline Group communication Fault-tolerant services –Passive and active replication Highly.
SMS WATCHDOG: PROFILING SOCIAL BEHAVIORS OF SMS USERS FOR ANOMALY DETECTION Authors: Guanhua Yan, Stephan Eidenbenz, Emannuele Galli Presented by: Ishtiaq.
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
Understanding the Network-Level Behavior of Spammers Anirudh Ramachandran Nick Feamster.
Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and.
Flash Crowds And Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites Aaron Beach Cs395 network security.
Reporting Module for Gateway Yvonne Yao. Recap: What is the Gateway? Web-base system Create, schedule, send mailings Statistics collected and presented.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
Security Jonathan Calazan December 12, 2005.
Netflow and Botnets Steven M. Bellovin Columbia University 1smb.
Spam Sonia Jahid University of Illinois Fall 2007.
Spam Reduction Techniques Using greylisting and SpamAssassin.
Team Excel What is SPAM ?. Spam Offense Team Excel '‘a distinctive chopped pork shoulder and ham mixture'' Image Source:Appscout.com.
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray,
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Towards Modeling Legitimate and Unsolicited Traffic Using Social Network Properties 1 Towards Modeling Legitimate and Unsolicited Traffic Using.
1 Introduction AfNOG CHIX 2011 Blantyre, Malawi By Evelyn NAMARA.
TCP/IP Protocol Suite 1 Chapter 14 Upon completion you will be able to: Unicast Routing Protocols: RIP, OSPF, and BGP Distinguish between intra and interdomain.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Lecturer: Maxim Podlesny Sep CSE 473 File Transfer and Electronic in Internet.
IST346 – Servies Agenda  What is ?  Policies  The technical side of  Components  Protocols  architecture  Security.
1 Applications Electronic Mail. 2 Electronic Mail Many user applications use client-server architecture. Electronic mail client accepts mail.
Computer Networks Zhenhai Duan Department of Computer Science 09/03/2015.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Forensic and Investigative Accounting Chapter 14 Digital Forensics Analysis © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Introduction to Internet Mail Abridged & Updated by Hervey Allen Noah Sematimba Based on Materials by Philip Hazel.
FluXOR: Detecting and Monitoring Fast-Flux Service Networks Emanuele Passerini, Roberto Paleari, Lorenzo Martignoni, and Danilo Bruschi 5th international.
1 Characterizing Botnet from Spam Records Presenter: Yi-Ren Yeh ( 葉倚任 ) Authors: L. Zhuang, J. Dunagan, D. R. Simon, H. J. Wang, I. Osipkov, G. Hulten,
Not So Fast Flux Networks for Concealing Scam Servers Theodore O. Cochran; James Cannady, Ph.D. Risks and Security of Internet and Systems (CRiSIS), 2010.
11 Spamcraft: An Inside Look At Spam Campaign Orchestration Reporter: 林佳宜 Advisor: Chun-Ying Huang /6/3.
Guide to TCP/IP, Third Edition Chapter 8: The Dynamic Host Configuration Protocol.
Detection of Routing Loops and Analysis of Its Causes Sue Moon Dept. of Computer Science KAIST Joint work with Urs Hengartner, Ashwin Sridharan, Richard.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Delivery for Spam Mitigation Usenix Security 2012 Gianluca Stringhini, Manuel Egele, Apostolis Zarras, Thorsten Holz, Christopher.
Understanding the network level behavior of spammers Published by :Anirudh Ramachandran, Nick Feamster Published in :ACMSIGCOMM 2006 Presented by: Bharat.
Detecting Phishing in s Srikanth Palla Ram Dantu University of North Texas, Denton.
Copyright 2010 Florida State University. All Rights Reserved MDMap: Assisting Users in Identifying Phishing s Patrick Dwyer Department of Computer.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
Computer Networks Fall, 2007 Prof Peterson. CIS 235: Networks Fall, 2007 Western State College How’s it going??
Exploiting Network Structure for Proactive Spam Mitigation Shobha Venkataraman * Joint work with Subhabrata Sen §, Oliver Spatscheck §, Patrick Haffner.
1 DMPT: Controlling Spam Through Message Delivery Differentiation Zhenhai Duan, Kartik Gopalan Florida State University Yingfei Dong University of Hawaii.
DNS Security 1. Fundamental Problems of Network Security Internet was designed without security in mind –Initial design focused more on how to make it.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
FNAL Central Systems Jack Schmidt, Al Lilianstrom, Ray Pasetes, and Kevin Hill (Fermi National Accelerator Laboratory) Introduction The FNAL .
Don’t click on that! Kevin Hill.  Spam: Unwanted commercial ◦ Advertising ◦ Comes from people wanting to sell you stuff. ◦ Headers may be forged.
An Application with Active Spoof Monitoring and Control
Forwarding and Routing IP Packets
Unix System Administration
Fix Yahoo Mail Box Error 550 Call for Help
By Ian Foster, Jon Larson, Max Masich, Alex C
Social Media And Global Computing Sending
Overview What is Spoofing Types of Spoofing
Name : __Sajid Ali VU-ID :__ DS
Slides Credit: Sogand Sadrhaghighi
Digital Signatures Network Security.
Presentation transcript:

Understanding Forgery Properties of Spam Delivery Paths Fernando Sanchez, Zhenhai Duan Florida State University Yingfei Dong University of Hawaii

Problem Statement  header forgery  But to what degree and how well they do it?  Why this is important? Investigating -based crimes such as phishing and threats sender accountability Spam control  Focus of this study Received: header fields Sequence of servers in Received: fields shows (claimed) spam delivery path 2

Outline  Background on Received: header fields  Data set and methodology  Results and implications of this study  Summary and future work 3

Received: Header Fields  From-from: xhtuah.vsahd.com  From-address:  From-domain: ppp pppoe.avangarddsl.ru  By-domain: mail.cs.umn.edu 4 Received: from xhtuah.vsahd.com (ppp pppoe.avangarddsl.ru [ ]) by mail.cs.umn.edu (Postfix) with SMTP id 9C6714DE89  Prepended by each mail server into header

Data Sets  Two complementary data sets 3 year spam archive MX records of about 1.2M network domains  Interpret and confirm findings from first data set  Spam archive Untroubled.org spam archive 2007 – 2009, totaling about 1.84M spam messages Bait addresses and domains obtained from Delivered-To: field 5

Data Set: MX Records  MX records of about 1.2M network domains  Domains extracted from 15 day trace Collected on FSU campus network in 2008 Sender’s envelope addresses (MAIL FROM) About 53M msgs, about 47M or 88.7% are spam  Representative of the domains 247 top-level domain (TLD) Containing all major service providers 6

Methodology  Length of spam delivery paths Different internal mail server structures of recipient’s domain  First external and internal MTA servers  MX of untroubled.org mx.futureequest.net 7

Spam Delivery Paths  Raw path From (claimed) origin to first internal MTA server (inclusive)  Network-level consistent (NLC) path f i and b i-1 belong to the same network  Same /16 network prefix  Same domain name 8 R: from f i by b i R: from f i-1 by b i-1

MX Dataset Analyses  Two types of mail servers Load balancing servers: servers within same domain  fsu.edu has 11 mail servers all in fsu.edu Backup servers: servers in different domains  Bemac.com mail servers in two domains: bemac.com and psi.net  Total number of mail servers in each domain  Total number of mail server clusters in each domain Group all mail servers in one domain into a cluster fsu.edu only has one mail server cluster bemac.com has two mail server clusters 9

Results: Spam Delivery Paths 10  Average length of raw paths 2007: 2.57, 2008, 2009: 2.34  Pattern of inconsistency Confused from-domain and by-domain Pretending to be already received by recipient’s domain D R: from A by B R: from A by C R: from A by B R: from C by D

Spam Source Network-Level Distribution 11  Consistent with previous study based on FSU trace To a degree, indicating representativeness of spam archive

MX Records 12  57% of domains have one mail server  90% of domains have one mail server cluster s should be directly delivered to recipient mail servers Helps shorten delivery path

Delivery Model  A mail server on delivery path must be a provider of either sender domain or receiver domain (ignoring open-relays) Forged mail server  delivery path of normal messages should be of 3 hops 13  Borrowing idea of AS relationship in BGP routing

Name Structure of Mail Servers  Extracting local name from domain name of mail servers 14

Naming Structure of First External MTA Servers  a-b-c-d: e.g adsl.net.t-com.hr  xyz-a-b-c-d: e.g. oh dyn.embarqhsd.net  a.b.c.d: e.g dynamic.jazztel.es 15

Implications  Sender authentication schemes Many spam traversed two hops, likely sent from spamming bot  SPF-like can be of great help  Hard to fake a compromised machine as a legitimate server Majority s sent directly from sender to receiver domain  DKIM-like really needed?  Spam control Detecting forged trace records delivery path length Mail servers vs. end-user machines  Helps detect forged Received: (if end-user machine appears in middle of delivery path)  Common naming structure of mail servers? 16

Summary and Future Work  Empirical study on trace record structure of spam messages Based on two complementary data sets Majority spam delivery paths are short, without any attempts to fake We can detect a large part of forged trace records, even if they do so  Implications on various spam control efforts Sender authentication schemes Spam control  Value of Received: header fields in detecting spam  Future Work Detailed study on patterns of inconsistent spam delivery paths Larger and more diverse spam archives Non-spam traces 17