Trends in Spam Products and Exploits Geoff Hulten, Anthony Penta, Gopalakrishnan Seshadrinathan, and Manav Mishra Microsoft Safety Technology and Strategy.

Slides:



Advertisements
Similar presentations
Microsoft ® Office Outlook ® 2003 Training Outlook can help protect you from junk Upstate Technology Services presents:
Advertisements

How to manage your s Tips and tricks. Use Folders Folders are used to manage files in your hard disk drive. Similarly you can create folders in your.
Dealing With Spam The kind, not the Food product.
Social media threats. Warning! May contain mild peril.
Presented by: Alex Misstear Spam Filtering An Artificial Intelligence Showcase.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Spam May CS239. Taxonomy (UBE)  Advertisement  Phishing Webpage  Content  Links From: Thrifty Health-Insurance Mailed-By: noticeoption.comReply-To:
Significant developments in the evolution of the computer 1977 Apple II is introduced to consumers IBM PC is introduced to consumers Apple.
Anthony Bonomi, Amber Heeg, Elizabeth Newton, Bianca Robinson & Marzi Shabani.
ENewsletters: A Primer. E-Newsletters Newsletters are very important to a business Must do all aspects of the Newsletter well: list, marketing, content,
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Windows Live Services ADVERTISING. Windows Live is a set of Web and client software services from Microsoft These services replace some existing software.
AND SPAM BY OLUWATOBI BAKARE
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Personalized Spam Filtering for Gray Mail Ming-wei Chang University of Illinois at Urbana-Champaign Wen-tau Yih and Robert McCann Microsoft Corporation.
S PAMMING B OTNETS : S IGNATURES AND C HARACTERISTICS Introduction of AutoRE Framework.
1 Abusing the Network: Spam in All its forms Joshua Goodman, Microsoft Research with slides from Geoff Hulten and all the hard work done by other people,
U3A New Technology 4 March 2013 Mike Hender 1.
Comment Spam Identification Eric Cheng & Eric Steinlauf.
Improving Web Spam Classification using Rank-time Features September 25, 2008 TaeSeob,Yun KAIST DATABASE & MULTIMEDIA LAB.
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
SOCIAL MEDIA: OPPORTUNITIES AND CHALLENGES JCG NEW MEDIA.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or computers. However we do not realize how fast internet is getting bigger.
Evaluation of Spam Detection and Prevention Frameworks for and Image Spam - A State of Art Pedram Hayati, Vidyasagar Potdar Digital Ecosystems and.
1 A Study of Supervised Spam Detection Applied to Eight Months of Personal E- Mail Gordon Cormack and Thomas Lynam Presented by Hui Fang.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, and Ivan Osipkov. SIGCOMM, Presented.
Spamming Botnets: Signatures and Characteristics Authors:Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten+, Ivan Osipkov+ Presenter: Chia-Li.
Security Technology Clients and Mail Servers
KNOW THE FACTS: SERIES II Trends and Facts on Prescription Drug Abuse This document is confidential and is intended solely for the use and information.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
1 Figure 9-6: Security Technology  Clients and Mail Servers (Figure 9-7) Mail server software: Sendmail on UNIX, Microsoft Exchange,
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Chad Mills Program Manager Windows Live Safety Platform Microsoft.
1 Spam – a living thing Predicting future evolution based on the past Daniel Raduta.
Parenting 2.0 Raising Responsible Digital Citizens.
 Left Side  Mail/Contacts/Tasks  Labeled Folders  Contacts – “IM” Feature  Right Side  s.
Dealing with Affiliates Search Engine Strategies Conference, December 2006 Chris Henger Vice President Affiliate Marketing.
The problem of spam from IPv6. Modern filters.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Microsoft Research, Silicon Valley Geoff Hulten,
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
Fabricio Benevenuto, Gabriel Magno, Tiago Rodrigues, and Virgilio Almeida Universidade Federal de Minas Gerais Belo Horizonte, Brazil ACSAC 2010 Fabricio.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
What are the Pros and Cons of Advertising Via Newsletters?
You don’t have to sell PLR content directly to make a profit. Instead,... you can use PLR content to get people to sign up to you mailing list.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or coputers. However we do not realize how fast is internet getting bigger.
How to manage your s Tips and tricks. Use Folders Folders are used to manage files in your hard disk drive. Similarly you can create folders in your.
Global One internet, worldwide Uncitral WTO Some laws: –Communications Decency Act –Child Online Protectioon Act –Children’s Internet Protection Act.
ORGANIZING . 1.Sort messages quickly. 2.Group similar messages in folders or labels. 3.Route mail efficiently to specific folders or labels. 4.Reduce.
How do Web Applications Work?
How to manage your s Tips and tricks.
Business mail account in yahoo
OnlineCasino.info. Best Online Casinos 2018 at
Information Security Session October 24, 2005
Activity 1.6: Different Ways to See The World
الاتصالات التسويقية الفصل الثامن عشر.
Filtering Spam Under Attack: some notes from the field
الاتصالات التسويقية الفصل الثامن عشر ..
Training webinar Mekko Graphics.
Tables and Graphs.
Civility, Safety & Interaction Online
Machine Learning with an Adversary
Making Tens.
How to manage your s Tips and tricks.
Making Tens.
Adding Up in Chunks Decompose and associate number to add efficiently.
Adding Up in Chunks.
Text Mining Application Programming Chapter 9 Text Categorization
How to manage your s Tips and tricks.
Presentation transcript:

Trends in Spam Products and Exploits Geoff Hulten, Anthony Penta, Gopalakrishnan Seshadrinathan, and Manav Mishra Microsoft Safety Technology and Strategy Group, MSN

Data Hotmail Feedback Loop –Volunteers classify random samples of their mail as spam or good –Tens of thousands of hand classified messages per day –Large ‘unbiased’ sample of spam Additional analysis on two sets of spam –About a year apart –Type of product being sold –Types of spammer tricks present –Trends in spammer activity

Trends in Spam Products Types of Products –‘Non-graphic’ Sexual Products –Insurance –Rx / Herbal –Financial –Travel / Casino –Scams –Newsletters –Other Spam –Porn/Sex Graphic –Dubious Products

Most Popular Spam Product ‘Non-graphic’ sexual products are big winners Doubled over the past year –17% of spam in 2003 –34% of spam in 2004 About triple the volume of the next most popular product categories –Financial products – 13% –Online Prescriptions – 10% –Dubious Products – 10%

Products on the Way Out Graphic Porn –Spam with a graphic image in it –13% in 2003, 7% in 2004 Dubious Products –20% in 2003, 10% in 2004

Trends in Spam Exploits Types of Exploits –Word Obscuring –URL Spamming –Domain Spoofing –Token Breaking –MIME Attacks –Text Chaff –URL Obscuring –Character Encoding Exploits increasing rapidly –Average spam in 2003 had 1.33 exploits –Average spam in 2004 had 1.73 exploits

Fastest Growing Exploits Word Obscuring –Putting words in images, misspelling, etc. –Designed to fool content based spam filters –4% in 2003, 20% in 2004 URL Chaffing –Adding ‘good’ URLs to spam –Not seen in 2003, present in 10% of spam in 2004 Spammers are reacting to filtering!

Who is Working Hardest? ‘Non-graphic’ Sexual Products –Averages 2.44 exploits per message Prescription drugs online –Averages 2.12 exploits per message

Selling Porn… With a Conscience? Spam with graphic porn –Averaged 2.16 exploits in 2003 –Averaged 1.33 exploits in 2004 The only category of product with a significant decrease in the average number of exploits over the study period

Summary Top Products in Spam –‘Non-graphic’ sexual products –Prescription medicine –Financial services –Dubious products Spammers Adaptive and Working Hard to Get Spam into Inboxes –They are finding effective new tricks –They are putting more work into each spam