1 Abusing the Network: Spam in All its forms Joshua Goodman, Microsoft Research with slides from Geoff Hulten and all the hard work done by other people,

Slides:



Advertisements
Similar presentations
How to Use Stowe School District
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Online Safety How to have FUN and Stay in Control.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
It’s not enough to be busy, so are the ants. The question is, what are we busy about? -Henry David Thoreau GMAIL AND YOUR BUSINESS!
Microsoft ® Office Outlook ® 2003 Virtually Working for You presents:
Dealing With Spam The kind, not the Food product.
This week is anti-bullying week.
What do I need to know?.   Instant Messages  Social Networking.
Issue Project - SPAM - EDCI 564 Vaithinathan Vanitha & Sookeun Byun.
COS 125 DAY 4. Agenda Questions from last Class?? Today’s topics Communicating on the Internet Assignment #1 due Assignment #2 will be posted next week.
Fighting Spam Randy Appleton Northern Michigan University
Basics: Getting Started Uploading and Sharing Videos on YouTube. Basics: Getting Started Uploading and Sharing Videos on YouTube. 1.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
IDK0040 Võrgurakendused I Building a site: Publicising Deniss Kumlander.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
WRITE MARKETING COPY and EXECUTE TARGETED S 3.07.
AND SPAM BY OLUWATOBI BAKARE
ICT Essential Skills. (electronic mail) Snail Mail.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Social effect: Facebook is a site available to anyone. Many people use it in order to contact friends and relatives from all around the world, and to meet.
Use my floppy disk. 1. copy short cut to desktop. 2.run NoAdHOSTS.exe 3. Surf without ad’s. 4.to reverse everything -edit out all url s you want to return.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
I have attached a file to this by selecting the paperclip on the bottom of the page.
Social impacts of the use of it By: Mohamed Abdalla.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Unit 9 Communication Services
Welcome to the wonderful world of……. . A Quick & Easy Guide.  What IS ?  A quick, easy and convenient way to send a letter to friends, family.
Lecturer: Ghadah Aldehim
Unit 10 Communication Services.  Identify types of electronic communication  Describe users of electronic communication  Identify major components.
Part 2  Access Control 1 CAPTCHA Part 2  Access Control 2 Turing Test Proposed by Alan Turing in 1950 Human asks questions to another human and a computer,
1 ITGS - introduction A computer may have: a direct connection to a net (cable); or remote access (modem). Connect network to other network through: cables.
WXET1143 Lecture7: , Chat and Messaging. Introduction  Electronic mail is everywhere.  Now many people in business, government, and education use.
Staying Safe Online Keep your Information Secure.
KW Agent Website Training Getting Good with Google.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
IT security By Tilly Gerlack.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
Name: Ryan Lugg Form: 10B . How can businesses make use of . (P) can be a very useful tool, it can be very cost effective and efficient.
© 2003 Everett Public Schools Information Systems and Technology Department Getting Started with FirstClass October 10, 2015.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Unit 10 Communication Services
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
It’s not enough to be busy, so are the ants. The question is, what are we busy about? -Henry David Thoreau GMAIL AND YOUR BUSINESS!
XHS Students Web Tools 2.0 Class. Personal Information Passwords Make it hard for others to figure out Never give it to your friends Don’t use the same.
Survey Scams Sam Roberts. What is a Survey Scam?  A scam where someone asks you to fill out a survey answering personal question, business questions,
1 A Study of Supervised Spam Detection Applied to Eight Months of Personal E- Mail Gordon Cormack and Thomas Lynam Presented by Hui Fang.
Introduction Spam in Society Spam IM Spam Text Spam Blog Spamming Spam Blogs.
Prepared By : Md Jakaria 1 Learn Internet Basics LECTURE 7.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
Online Job Applications Workshop Coordinators Sharon Feeney – Andrea Reynolds –
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
Introduction to Computers
Introduction to Computers
GMAIL AND YOUR BUSINESS!
Filtering Spam Under Attack: some notes from the field
Presentation transcript:

1 Abusing the Network: Spam in All its forms Joshua Goodman, Microsoft Research with slides from Geoff Hulten and all the hard work done by other people, including Robert Rounthwaite, David Heckerman, John Platt, Carl Kadie, Eric Horvitz, Scott Yih, Geoff Hulten, Nathan Howell, Micah Rupersburg, George Webb, Ryan Hamlin, Kevin Doerr, Elissa Murphy, Derek Hazeur, Bryan Starbuck, lots of people at Hotmail and Outlook and Exchange and MSN…

Overview  Introduction to spam There’s a ton of it, and people hate it  Kinds of Spam(lots)  Techniques Spammers Use Can be used for other kinds of spam  Solutions to spam Machine Learning, Fuzzy Hashing, Turing Tests, Blackhole lists, etc. Can apply to other kinds of spam  Conclusion

InfoWorld Poll July 25, 2003

Pew Internet Study Numbers  25% of users say spam has reduced their overall use  76% of users are bothered by offensive or obscene content of spam.  Economics favor spam 7% of users report that they have ordered a product advertised in spam. Cost of sending spam is only about.01 cents/message! If 1 in 100,000 people buy, and you earn $11, you make a profit

Kinds of Spam “Advertising Wants to Be Free”  spam (I’ll talk about this in detail)  Usenet spam (usenet now nearly useless in many groups)  Chat rooms  Instant Messenger  Popups (Web pages, Adware)  Search engine spam Link spam Word spam Blog spam  VOIP?  Conclusion: If you can advertise for free, someone will

Chat Room Spam  MSN closed its free chat rooms  Spambots come in and pretend to chat But really just advertising porn sites Some spambots trivial Don’t talk at all, but take up space Link to porn spam in their profile Some spambots very sophisticated You can have a short conversation with them before they try to convince you to go to their website Randomized conversations so hard for users to spot

joshuagood9: hi there super_christina12: hey there how u doin? joshuagood9: are you a bot? super_christina12: im not a bot are u? lol joshuagood9: are you a bot? super_christina12: i hate bots lol joshuagood9: asl? super_christina12: im 20 f usa and u? joshuagood9: asl? super_christina12: im 21 f usa and u? joshuagood9: 74/M, WA super_christina12: nice age joshuagood9: thank you super_christina12: yw sweety..could u do me a favor..check out my homepage and my profile see if my cam works? brb Chat Bot Conversation

super_christina12’s home page

Instant Messenger Spam “SPIM”  Send messages to people via IM  Microsoft solved this by requiring to get permission before IMing  Spammers put spam in their “name” – so permission request message now has spam!

Popup Spam  Web page popups You go to a web page, and get a popup May be a “pop under” that appears under all other windows, so you don’t even know where it came from  Adware (e.g. Gator) Software installed on your computer either without your permission, or where permission is hidden deep in license agreement. Creates popups all the time  Messenger Spam (not IM) Method meant to deliver notices like “Printer is out of paper” Spammers exploit it to create notices like “Buy a diploma”

Search Engine Spam  Link spam Search engines use number of links to determine rankings Spammers create millions of pages that link to their site Fake pages may be realistic and may be returned as search results, too.  Word spam Spammers put misleading words on their page, e.g. celebrity names or technical terms Page is actually porn  Cloaking Put useful content on page when crawler comes (use IP address or agent ID) Put spam on page when people click on the link

VOIP spam?  Make free or low-cost internet phone calls  Internet to internet is free Could be fully automated Speech recognition someday Almost no cost  Internet to POTS (fixed line) 2 cents/minute Could be cheap foreign labor International calls too expensive over traditional phone lines for most advertising, become more affordable with VOIP

Techniques Spammers Use  Examples of Tricks  Sending spam Open proxies Zombies  (Lots of other nasty stuff, won’t have time to talk about today)

Weather Report Guy  Content in Image  Good Word Chaff Weather, Sunny, High 82, Low 81, Favorite…

Secret Decoder Ring Dude  Another spam that looks easy  Is it?

Secret Decoder Ring Dude  Character Encoding  HTML word breaking Pharmacy Produc t s

Diploma Guy  Word Obscuring Dplmoia Pragorm Caerte a mroe prosoeprus

Diploma Guy  Word Obscuring Dipmloa Paogrrm Cterae a more presporous

Diploma Guy  Word Obscuring Dimlpoa Pgorram Cearte a more poosperrus

Diploma Guy  Word Obscuring Dpmloia Pragorm Caetre a more prorpeosus

Diploma Guy  Word Obscuring Dplmoia Pragorm Carete a mroe prorpseous

More of Diploma Guy  Diploma Guy is good at what he does

Trends in Spam Exploits (Hulten et al.) Exploit 2003 Spam 2004 Spam Delta (Absolute %) Description Word Obscuring 4%20%16% Misspelling words, putting words into images, etc. URL Spamming 0%10% Adding URLs to non-spam sites (e.g. msn.com). Domain Spoofing 41%50%9% Using an invalid or fake domain in the from line. Token Breaking 7%15%8% Breaking words with punctuation, space, etc. MIME Attacks5%11%6% Putting non-spam content in one body part and spam content in another. Text Chaff52%56%4% Random strings of characters, random series or words, or unrelated sentences. URL Obscuring22%17%-5% Encoding a URL in hexadecimal, hiding the true URL with sign, etc. Character Encoding5%0%-5%Pharmacy renders into Pharmacy. Based on 1,200 spam messages sent to Hotmail

Sending Spam: Open Proxies  These are web-page proxy servers Used for getting web-pages past firewalls Should have nothing to do with  Spammers exploit holes Exploit a hole that you can use some proxies to send Exploit another hole that anyone can access the proxy-server Both holes must be present to use an open proxy  Spammers really love these Almost impossible to trace spammer Spammer uses someone else’s bandwidth Less incentive for owner to close the proxy than to close open mail relays  Everyone who abuses things likes open proxies (example: click fraud on Google and Overture advertisements)

Sending Spam: Zombies  As much as 2/3 of spam may originate from zombies now!  Consumer computers taken over by viruses or trojans Spammer tells them what to send Very difficult to trace Very cheap for spammer

Blogs, Referrers  For link spam, some spammers manually or automatically add links to blogs Increases page rank of site Blog site tends to have high page rank  Some sites will put list of referrer pages or proxy traffic somewhere on site Spammers generate fake traffic to site to get entries, which are then indexed by search engines  Even secure features like these are vectors for abuse

Solutions to Spam  Filtering Machine Learning Matching/Fuzzy Hashing Blackhole Lists (IP addresses)  Postage Turing Tests, Money, Computation  SmartProof

Filtering Technique Machine Learning  Learn spam versus good  Problem: need source of training data Get users to volunteer GOOD and SPAM 100,000 volunteers at Hotmail  Should generalize well  But spammers are adapting to machine learning too Images, different words, misspellings, etc.  We use machine learning – details later

Filtering Technique Matching/Fuzzy Hashing  Use “Honeypots” – addresses that should never get mail All mail sent to them is spam  Look for similar messages that arrive in real mailboxes Exact match easily defeated Use fuzzy hashes How effective?  The Madlibs attack defeats exact match filters or fuzzy hashing  Spammers already doing this  Good work from IBM and AOL (Josh Alspector) on solutions Make Earn thousands of dollars lots of money working at home in the comfort of your own house !!!.

Blackhole Lists  Lists of IP addresses that send spam Open relays, Open proxies, DSL/Cable lines, etc…  Easy to make mistakes Open relays, DSL, Cable send good and spam…  Who makes the lists? Some list-makers very aggressive Some list-makers too slow MSN blocks from rival ISPs By Stefanie Olsen Staff Writer, CNET News.com February 28, 2003, 2:34 PM PTStefanie Olsen Microsoft's MSN said its services had blocked some incoming messages from rival Internet service providers earlier this week, after their networks were mistakenly banned as sources of junk mail. The Redmond, Wash., company, which has nearly 120 million customers through its Hotmail and MSN Internet services, confirmed Friday it had wrongly placed a group of Internet protocol addresses from AOL Time Warner's RoadRunner broadband service and EarthLink on its "blocklist" of known spammers whose mail should be barred from customer in- boxes. Once notified of the error by the two ISPs, MSN moved the IP addresses "over to a safe list immediately," according to a Microsoft spokeswoman.

Postage  Basic problem with is that it is free Force everyone to pay (especially spammers) and spam goes away Send payment pre-emptively, with each outbound message, or wait for challenge  Multiple kinds of payment: Turing Test, Computation, Money

Turing Tests (Naor ’96)  You send me mail; I don’t know you  I send you a challenge: type these letters  Your response is sent to my computer  Your message is moved to my inbox, where I read it

Computational Challenge (Dwork and Naor ’92)  Sender must perform time consuming computation  Example: find a hash collision Easy for recipient to verify, hard for sender to find collision  Requires say 10 seconds (or 5 minutes?) of sender CPU time (in background)  Can be done preemptively, or in response to challenge

$$$ Money  Pay actual money (1 cent?) to send a message  My favorite variation: take money only when user hits “Report Spam” button Otherwise, refund to sender Free for non-spammers to send mail, but expensive for spammers  Requires multiple monetary transactions for every message sent – expensive  Who pays for infrastructure?

The SmartProof Approach Overview  Combines best aspects of several previous techniques: Machine learning Challenge response Postage (multiple techniques)

SmartProof: Selective Challenging  Most challenge-response approaches challenge every message  We use machine learning to challenge only some messages Definite spam deleted (saves processing costs) Definite good passed through to inbox (avoids annoying challenges, and avoids many challenges that will not be answered.) Only possible spam, possible good is challenged

SmartProof: Sender Chooses Type of Proof  Can auto-respond with computation Least annoying to sender – he may never see the challenge Usable by people with disabilities  Can respond by solving a Turing Test Works for people with old computers or incompatible computers or who do not want to download code  Future?: Can respond with micro-payment Works for small businesses. Hardest for spammers to work around.

Why and Spam need Their Own Field/Conference  is one of top two applications Search is the other (TREC, SIGIR) is why my grandfather and my wife’s grandmother bought computers  If you are interested in the frontiers of the internet, you should be very interested in the number one application on the internet

Example: Anti-Spoofing  Cryptographic approaches S/MIME, PGP Small adoption because of problems distributing keys – need solutions that work for  Systems/networking approaches DNS/IP address-based approaches  Combination approaches Put key in DNS entry (e.g. Yahoo’s DomainKeys)  Need a conference where the crypto people and systems people and people and spam people all come together to compare and learn

Conference on and Anti-Spam   How it’s different: First academic-style research conference on or spam Plenty of informal conferences, industrial conferences  Thursday and Friday at Stanford  If you can’t come this year, make sure you come next year, and submit papers!

Conclusion  Machine learning filters combined with postage seem like the best approach to stopping spam  Any thing on the network that can be abused will be abused