Malicious Spam: The Impact of Prosecuting Spammers on Fraud and Malware Contained in Email Spam Alex Kigerl, PhD Washington State University 2015-10-15.

Slides:



Advertisements
Similar presentations
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems © 2002, Predictive Systems.
Advertisements

What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Data Mining Methodology 1. Why have a Methodology  Don’t want to learn things that aren’t true May not represent any underlying reality ○ Spurious correlation.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
1 CANTINA : A Content-Based Approach to Detecting Phishing Web Sites WWW Yue Zhang, Jason Hong, and Lorrie Cranor.
An Overview of the Law on Spam Anti-Spam Research Group San Francisco, CA March 20, 2003 Jon Praed Internet Law Group
PHISHING By, Himanshu Mishra Parrag Mehta. OUTLINE What is Phishing ? Phishing Techniques Message Delivery Effects of Phishing Anti-Phishing Techniques.
CSC 380 Algorithm Project Presentation Spam Detection Algorithms Kyle McCombs Bridget Kelly.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Using “Account-free” Services to Combat Phishing, Brand Infringement, and Other Online Threats Qi-fense LLC © 2009 Sebastian Holst
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and.
Llad Phillips1 Part I Strategies to Estimate Deterrence Part II Optimization of the Criminal Justice System.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
1 Unsolicited Electronic Messages Ordinance An Overview of Implementation and Enforcement 28 May 2007.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Detection of Internet Scam Using Logistic Regression
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray,
Untouchable?: A Canadian Perspective on the Anti- Spam Battle Michael Geist Canada Research Chair in Internet & E- commerce Law University of Ottawa, Faculty.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Should there be a law that forbids people from sending to thousands of people (spam)? By: Bennett Moss Daniel Hoyt Hizkias Neway Junyu Wang.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream.
Cyber Crimes.
Prevent Cross-Site Scripting (XSS) attack
APT29 HAMMERTOSS Jayakrishnan M.
2002 Symantec Corporation, All Rights Reserved The dilemma European Security Policy and Privacy Ilias Chantzos Government Relations EMEA Terena Conference,
Price Stability Economic Growth Full Employment. Economic Indicators.
Final Lab - Spam Group 10: Scott Durr Stephen Thompson.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 9/19/2015Slide 1 (of 32)
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
Topics to be covered 1. What are bots,botnet ? 2.How does it work? 4.Prevention of botnet. 3.Types of botnets.
Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.
Detecting Semantic Cloaking on the Web Baoning Wu and Brian D. Davison Lehigh University, USA WWW 2006.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Office of Campus Information Security Incident Response Briefing Jeffrey Savoy, CISSP.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
1 Tracking an Offender. 2 Communication Between Layers in Different Hosts sender receiver data AH data PH data SH data TH data NH data DH DT data BITS.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Phishing Problem Kristián Kučerák Milan Just. Abstract In this age of broadband, wireless, and network interconnectivity, we enjoy the unprecedented power.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Detecting Phishing in s Srikanth Palla Ram Dantu University of North Texas, Denton.
© 2008 McGraw-Hill Higher Education The Statistical Imagination Chapter 11: Bivariate Relationships: t-test for Comparing the Means of Two Groups.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
11 Shades of Grey: On the effectiveness of reputation- based “blacklists” Reporter: 林佳宜 /8/16.
The World Wide Web. What is the worldwide web? The content of the worldwide web is held on individual pages which are gathered together to form websites.
INTRODUCTION & QUESTIONS.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida Universidade Federal de Minas Gerais Belo Horizonte, Brazil ACSAC 2010 Fabricio.
© 2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
How do Web Applications Work?
CASL Compliance & Enforcement Update: Impact on Business
TMG Client Protection 6NPS – Session 7.
IT Security  .
Measurement of Economic Performance
ethical issues in business
Cross-Site Scripting Issues and Defenses Ed Skoudis Predictive Systems
Marcial Quinones-Cardona
Internet Safety By: Ayana Shiggs.
Internet Safety By: Ayana Shiggs.
Presentation transcript:

Malicious Spam: The Impact of Prosecuting Spammers on Fraud and Malware Contained in Spam Alex Kigerl, PhD Washington State University

Introduction Spam has grown since its inception, making up 70% of all internet traffic today CAN SPAM Act created in 2004 to regulate spam Prior research of the CAN SPAM Act suggests a deterrent effect of spam rates and some types of compliance However, it is not known the effect of prosecuting spammers on more serious forms of cybercrime contained in spam, such as malware and fraud

Fraud and Malware in Spam Malware in spam – A quarter of URLs in spam link to malware – A quarter of malicious URLs are hosted in U.S. servers – All other countries are just 3% or less – A third of malware victimizations result in financial loss Fraud in spam – Humans are the weakest link – Phishing: Steal credential goods; advance fee fraud: Confidence trick – U.S. is targeted by phishing the most, 60% of worldwide phishing volumes

The CAN SPAM Act CAN SPAM Act passed and went into enforcement in January 1, 2004 Regulates spam, doesn’t criminalize it- – Forbids falsified headers – Requires meaningful subject field – Include valid physical postal address – Provide opt-out mechanism

Evaluations of the CAN SPAM Act Impact of the Act on spam rates – Fines ineffective. Spammers can make good money – Short incarceration periods have emboldening effect – Longer incarceration periods decrease spam rates Impact of the Act on spam compliance – Increases compliance with Act regulations unrelated to header forgery – Increases noncompliance with header forgery – Header forgery might be a precaution against being caught

The Present Study Sample: 5,490,905 spam messages received beween 3/1998 and 11/2013 in honeynet accounts The sample was processed via a software program and coded into 3 variables The variables were then aggregated into monthly time series data of 189 observations (months)

The Spam Sample

DVs: Fraudulent Spam Average probability a message is fraudulent per month Coded via a spam filter using a Naïve Bayes classifier Spam filter trained using a sample of 2,339 fraudulent messages and 1,000 non-fraudulent spam messages to distinguish the 2 categories Cross validated using AUC. AUC =.83

DVs: Malware in Spam Two measures representing the percent of messages distributing malware per month Executable download link – Software extracts URLs from messages and identifies if the URL is a direct download of a file – If the file extension is for an executable file, the message is coded as malicious – e.g. Embedded scripts – Identifies any script tags anywhere in the , of the form – Executable code contained in unsolicited spam is usually malicious

IVs: CAN SPAM Act Activity Code LexisNexis search articles on the CAN SPAM Act on different dimensions CAN SPAM Act enforcement: Number of prosecutions, arrests, convictions, and damages awarded per month Number of articles critical of the CAN SPAM Act Articles attributing spam to individual spammer

CVs: Technological, Economic, and Demographic Predictors Time series data acquired from various sources Technological: Internet users per capita, number of tech jobs, Wilshire Internet Market index Economic: Real disposable personal income per capita, GDP growth rate, unemployment Demographic: Population size, percent Crime: Arrest rates from UCR

Analysis 3 time series regression models Variables selected for each model using AIC backward stepwise elimination starting with 31 variables Final models using time series GLS to control for serial correlation

Results: Malicious Links in Spam MeasureB (Malicious Links) Unemployment rate.072 Count of spammers arrested-.128† Count of trial ongoing articles.165† Count of damages awarded articles-.205* Percent of articles with spammer attribution.13** * <.05, ** <.01, *** <.001, † <.1 Fines appear to be effective in lowering malicious links, contrary to prior research on spam rates Spammer attribution significant, but in a direction opposite of that predicted

Results: Malicious Scripts in Spam MeasureB (Malicious Scripts) Percent internet users-.088† Percent population aged ** Count of CAN SPAM articles-.144* Count of spammer detained articles.067 Percent of articles without spammer attribution.071* * <.05, ** <.01, *** <.001, † <.1 Internet use marginally associated with lower malicious scripts, consistent with prior studies More articles on the CAN SPAM Act predicts decreased malicious scripts

Results: Fraudulent Spam MeasureB (Fraudulent Spam) UCR arrest rate.107*** Percent internet users-.137** Unemployment rate-.116*** Technology jobs-.072*** Population aged * Consumer price index-.06* Count of trial spammer acquitted articles.059 Percent of articles negative about CAN SPAM-.007 Percent of articles without spammer attribution.006 * <.05, ** <.01, *** <.001, † <.1 No measures of deterrence (e.g. CAN SPAM Act) significant. Instead economic predictors highly significant Fraud rates positively correlated with UCR street crime rates Again internet users predicts less crime (spam fraud in this case)

Discussion: Possible Implications of Findings Findings suggest the CAN SPAM Act might have an impact on malware, but not fraud – Spammers in the U.S. may be less likely to rely on fraud and more on malware – Fraud might originate from other countries (Nigeria, Russia) CAN SPAM Act activity consistent in leading to lower malware – No evidence of marginal deterrence, increasing malware due to less serious offenders being deterred Attribution not consistent for malware: Increases links, decreases scripts

Discussion Continued Limitations – Spam sample skewed towards web crawler harvester bot method for collecting lists – Limited measures of malware, many false negatives – Recommend blacklist of malicious URLs or machine learning to identify malware in future research Future research: Investigate the impact of prosecuting malware writers and fraudsters on these measures, rather than just spammers

Questions