The Spammer, the Botmaster, and the Researcher: on the Arms Race in Spamming Botnet Mitigation - Major Area Exam

نویسنده

  • Gianluca Stringhini
چکیده

Spam, or Unsolicited Bulk Email, is a big problem in nowadays internet. Recent studies report that spam accounts for more than 90% of the worldwide email traffic [40]. Spam is not only annoying for users, who receive content they did not request, but is also a burden for the whole email delivery infrastructure, that needs to keep delivering legitimate emails with a short delays, but also make sure that unsolicited messages are detected and blocked. Spam can have different goals, from carrying out scams to spread malware with malicious email attachments. However, one of the most common types of spam is the one that promotes e-commerce sites selling illicit goods, such as pharmaceutical products or counterfeit watches and accessories. The e-commerce sites selling such products present the same functionalities of popular legitimate sites (e.g., Amazon), and offer customer service, daily deals, and even refunds if the user is not satisfied. The reason of this is that the cybercriminals behind such sites want to appear as legitimate as possible. Also, unlike what people commonly think, these sites are not scamming their users, and the purchased goods are actually delivered to the recipients [30, 36]. Whether the drugs produces by these companies are equivalent to the branded ones or not is an open question. Large spam e-commerce sites offer affiliate programs (partnerka in Russian) [51]. People who join these affiliate programs send spam through their own email delivery infrastructures, and receive a cut of the revenue in exchange for their services. Past research showed that spam e-commerce sites are quite profitable, with estimates going from $300,000 to $1 Million a month for a large affiliate site [29, 30]. The operations of spam e-commerce involve parties located in most parts of the world, from the domain registrars, to the hosting providers, to the banks processing the payments [36]. For this reason, although many countries have good anti-spam laws, effectively fight them on the law side is hard. Nowadays, most of worldwide spam is sent by botnets, which are networks of compromised computers that act under the control of a single entity, the so called botmaster. Recent reports show how botnets are responsible for 85% of worldwide spam [59]. Botnets

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Social Networking for Botnet Command and Control

A botnet is a group of compromised computers— often a large group—under the command and control of a malicious botmaster. Botnets can be used for a wide variety of malicious attacks, including spamming, distributed denial of service, and identity theft. Botnets are generally recognized as a serious threat on the Internet. This paper discusses SocialNetworkingBot, a botnet we have developed that...

متن کامل

iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation

A vast majority of spam emails today are sent from botnets with forged sender addresses. This has attracted researchers over the years to develop email sender authentication mechanism as a promising way to verify identity of the senders. In this paper we introduce iSATS, a new email sender authentication system based on Identity-based public key cryptography. iSATS leverages an identity based s...

متن کامل

SkyNET: A 3G-Enabled Mobile Attack Drone and Stealth Botmaster

SkyNET is a stealth network that connects hosts to a botmaster through a mobile drone. The network is comprised of machines on home Wi-Fi networks in a proximal urban area, and one or more autonomous attack drones. The SkyNET is used by a botmaster to command their botnet(s) without using the Internet. The drones are programmed to scour an urban area and compromise wireless networks. Once compr...

متن کامل

Exploring A Root-Cause Methodology to Prevent Emerging Internet Threat

A “botnet” consists of a network of compromised computers controlled by an attacker often called botmaster. Recently, botnets have become the root cause of many Internet attacks. To be well-prepared for future attacks, it is not only study how to detect and defend against the botnets that have appeared in the past. More importantly, we should study advanced botnet designs that could be develope...

متن کامل

RB-Seeker: Auto-detection of Redirection Botnets

A Redirection Botnet (RBnet) is a vast collection of compromised computers (called bots) used as a redirection/proxy infrastructure and under the control of a botmaster. We present the design, implementation and evaluation of a system called Redirection Botnet Seeker (RB-Seeker) for automatic detection of RBnets by utilizing three cooperating subsystems. Two of the subsystems are used to genera...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011