Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,

Slides:



Advertisements
Similar presentations
Click Trajectories: End-to-End Analysis of the Spam Value Chain Author : Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, M’ark F’elegyh’azi,
Advertisements

Zenith Visa Web Acquiring A quick over view. Web Acquiring Allows merchants to receive payments for goods and services through the Internet Allows customers.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.
Electronic Commerce Systems (e-commerce)
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
Threats To A Computer Network
September 2001Chapter 10: B2B Grows Up Key questions answered in this chapter: What are the four stages to the evolution of B2B capabilities? What are.
DESCRIPTION ThePDFCloud.com is a website that offers free hosting for PDF documents with the intention of selling online. The site provides sales pages.
Electronic Commerce Systems
Chapter 9 e-Commerce Systems.
Virtual Point of Sale (VPOS)
SMALL BUSINESS MANAGEMENT Chapter 9 Small Business and Electronic Commerce.
Payment Systems for Electronic Commerce
“If you build it, they will come.”. Virtual Business  There is much more that goes into a virtual business than just building the web site.  You will.
Distribution in E-Commerce Back to Table of Contents.
Traditional and Electronic Payment Methods Chapter 3.
By: Mr Hashem Alaidaros MKT 445 Lecture 3 Title: Affiliate Marketing.
BUSINESS TO CONSUMER.
Web Payments via Christopher Woods Aaron Buma. Agenda  Introduction  About it  Why to use it  Services they Provide  Seller Protection  Ebay Aspect.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Topics in Business English E-Business: Doing Business Online
Course code: ABI 204 Course Name: Introduction to E-Commerce
Computer fundamentals
Chapter 10 E-Commerce: A Revolution in the Way We Do Business.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 43 Shopping on the Internet.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
CS28310 E-commerce On-Line Selling  eCatalogues  eMarketplaces  Implement an eCatalogue   Implement On-line Selling  On-line Payments  International.
Economics of Malware: Spam Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See the last.
Virtual Business CREATING A WEB PRESENCE Copyright © Texas Education Agency, All rights reserved.
Traditional and Electronic Payment Methods Chapter 3.
2010/6/7 Spamalytics An Empirical Analysis of Spam Marketing Conversion Author: Chris Kanich Christian Kreibich Kirill Levchenko Brandon Enright Geoffrey.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
9 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Electronic Commerce Systems Chapter 9.
E-business 2009 Turid Hedlund Lecture 3 E-business strategy E-business models chapters 2 and 14 from textbook Hanken Svenska handelshögskolan / Hanken.
Goran Nagradic Own Theater. Introduction The idea is to offer an online access to customers of movies premieres Soon as some movie comes out in theaters.
Promotion of e-Commerce sites. A business which uses e- commerce to trade online must also advertise. Several traditional methods can be used, such as.
Chapter 9 Electronic Commerce Systems Slide 1 Well, Sort-of.
Learning Objectives Understand the shifts that are occurring with regard to online payments. Discuss the players and processes involved in using credit.
E-commerce and International Markets. Key topics What is e-commerce? Why should small businesses trade online? How can it help a small business reach.
Chapter 11 Working with Credit Card Methods of Processing Credit Cards Preparing for Cyber Cash Authoring a Credit card Transaction.
Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Botnet Judo: Fighting Spam with Itself.
Presentation Topic CYBERGOLD ( MYPOINTS) Presented To: Sir Adnan Rafiq.
Chapter Twelve Digital Interactive Media Arens|Schaefer|Weigold Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution.
E-Payment Methods Fazal rehman shamil. 2001Daniel L. Silver2 Major Architectural Components of the Web Internet Browser Database Server Client 1 Server.
Chapter 1 Introduction to Electronic Commerce. Learning Objectives In this chapter, you will learn about: The basic elements of electronic commerce Differences.
9 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Electronic Commerce Systems Chapter 9.
Web Hosting Simplified!. 01 Everyone who owns a domain has most definitely hosted their domain on the internet. But there are some people (not everyone.
Web Hosting Info Guide.  It is service that allows user to post web pages to the internet.  It allows users to publish their own information resources.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Spamalytics: An Empirical Analysis of Spam Marketing Conversion
HCS 212: Introduction to MIS
Electronic Commerce Systems
Own Theater Goran Nagradic.
Chapter 9 e-Commerce Systems.
E-Commerce and Shopping Cart
Order Fulfillment, eCRM, and Other Support Services
Electronic Commerce Systems
Online Retailing The consumer is not primarily price-driven when shopping on the Internet but instead considers brand name, trust, reliability, delivery.
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
Creating a Winning E-Business Second Edition
Taxation of Digital Economy and Services
Click Trajectories: End to End Analysis of the Spam Value Chain
Digital marketing refers to advertising delivered through digital channels such as search engines, websites, social media, , and mobile apps. While.
BOTNET JUDO : Fighting Spam with Itself
E-Commerce Lecture 6.
Internet CyberCrime Economics
Presentation transcript:

Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson, Chris Kanich, He Liu, Damon McCoy, Geoffrey M. Voelker, Stefan Savage Dept. of CSEE University of California, San Diego M. Felegyhazi Budapest University of Technology and Economics Chris Grier Dept. of CSEE University of California, Berkeley Christian Kreibich, Nicholas Weaver, Vern Paxson International Computer Science Institute Berkeley, CA Presented by Xinruo Zhang 04/04/2012

Outline Introduction Implementation Analysis for a particular example Data collection method Contribution Weakness & improvement

Introduction Spam-based advertising to us ◦ Think of it merely as junk that jamming inbox To spammer ◦ Think it is a multi-million business Spam value chain (aka Spam ecosystem) ◦ botnet, domain, name server, web server, hosting or proxy service acquired

Introduction (cont’d) Three categories of spam-advertised products ◦ Illegal pharmaceuticals, replica luxury goods and counterfeit software ◦ Nearly 95% of spam-advertised s contains these three popular products

Implementation How modern spam works? ◦ Advertising, Click Support and Realization Advertising ◦ Includes all activities focused on attracting potential customers to pay attention to what the spammers want to sell ◦ The most evolved part of the spam ecosystem, particularly, the delivery of spam

Implementation Click Support ◦ In this stage, having delivered their advertisement, a spammer entice the receiver into clicking an embedded URL with their best effort. ◦ Redirection sites, Domains, Name servers, Webs servers, and affiliate programs

Implementation Click Support ◦ Redirection sites: redirect to additional URLs. Because some spammers directly advertise a URL embedded in and thus they would encounter various of defensive measures to interfere their activities.

Implementation Click Support ◦ Domain: typically, a spammer may purchase domains directly from a registrar, however, in real life, they frequently purchase from reseller. ◦ Name server: any registered domain in turn have supporting name server infrastructure. Get infrastructure either by themselves or by third party.

Implementation Click Support ◦ Stores and Affiliate programs  Today spammers work as affiliates of an online store, earns a commission  The affiliate program provides all technique and materials  Furthermore, affiliate programs even take responsibility for payment and fulfillment service

Implementation Realization ◦ have brought the customers to an advertised site, the seller realizes the latent value by acquiring the customer’s payment ◦ it contains two processes: Payment service and Fulfillment service

Implementation Payment service ◦ Standard credit card payment  In order to get the most value ◦ Issuing bank  Customer’s bank ◦ Acquiring bank  Merchant’s bank ◦ Card association network  Visa or MasterCard

Implementation Fulfillment ◦ Fulfill an order in return for customer’s payment ◦ Shipping issue  Suppliers will offer direct shipping service so affiliate program can avoid warehousing  Virtual products can be got via internet download

Practical Example

Data Collection Method

Contribution Lack a solid understanding of the spam- based enterprise’s full structure before And most anti-spam interventions focus on only one facet of the overall spam value chain authors present a whole analysis for spam ecosystem with large-scale practical study

Weakness & Improvement lack of legal and ethical concerns ◦ For some issue concerns the ethics of any implicit harm caused by criminal supplier only have one medium – spam ◦ Consider twitter spam, other social network spam