Abstract
This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persistent across time each spamming host is, and characteristics of spamming botnets.
Key takeaways
AI
AI
- The majority of spam originates from a small fraction of IP address space, highlighting concentration in spamming hosts.
- Approximately 70% of spam is sent from Windows hosts, with many sending less than 100 pieces over 17 months.
- A small number of spammers use short-lived BGP route announcements to evade detection, termed 'BGP spectrum agility.'
- The study aims to analyze spammers' network-level behavior to improve spam filtering techniques and effectiveness.
- Filtering strategies should focus on network-level properties rather than solely content-based methods for better spam mitigation.
References (32)
- Announcements, Withdrawals, and Spam from 61.0.0.0/8 Time Announcement Spam Withdrawal Figure 9: Observation of a short-lived BGP route announcement for 61.0.0.0/8, spam arriving from mail relays in that prefix, and the subsequent withdrawal of that prefix. 22:00:00 2004/12/28 05:00:00 2004/12/29 12:00:00 2004/12/29 19:00:00 2004/12/29 02:00:00 2004/12/30 09:00:00 2004/12/30 16:00:00 2004/12/30
- Announcements, Withdrawals, and Spam from 82.0.0.0/8 Time Announcement Spam Withdrawal REFERENCES
- D. Bank and R. Richmond. Where the Dangers Are. The Wall Street Journal, July 2005. http://online.wsj.com/public/ article/ SB112128442038984802-w4qR772hjUeqGT2W0FIcA3 FNjE 20060717.html.
- M. Casado, T. Garfinkel, W. Cui, V. Paxson, and S. Savage. Opportunistic measurement: Extracting insight from spurious traffic. In Proc. 4th ACM Workshop on Hot Topics in Networks (Hotnets-IV), College Park, MD, Nov. 2005.
- CNN Technology News. Expert: Botnets No. 1 emerging Internet threat. http://www.cnn.com/2006/TECH/internet/01/ 31/furst/, Jan. 2006.
- Description of coordinated spamming, Feb. 2005. http://www. waltdnes.org/spam.
- J. Evers. Most spam still coming from the U.S. http://news. com.com/Most+spam+still+coming+from+the+U.S./ 2100-1029 3-6030758.html, Jan. 2006.
- N. Feamster. Open problems in BGP anomaly detection. In CAIDA Workshop on Internet Signal Processing, San Diego, CA, Nov. 2004.
- N. Feamster, D. Andersen, H. Balakrishnan, and M. F. Kaashoek. Measuring the Effects of Internet Path Faults on Reactive Routing. In Proc. ACM SIGMETRICS, pages 126-137, San Diego, CA, June 2003.
- N. Feamster, J. Jung, and H. Balakrishnan. An Empirical Study of "Bogon" Route Advertisements. ACM Computer Communications Review, 35(1):63-70, Nov. 2004.
- J. Goodman. IP Addresses in Email Clients. In First Conference on Email and Anti-Spam, Mountain View, CA, July 2004.
- S. Hansell. Postage is due for companies sending email, February 5, 2006. http://www.nytimes.com/2006/02/05/ technology/05AOL.html.
- Honeynet Project. Know Your Enemy: Tracking Botnets. http:// www.honeynet.org/papers/bots/botnet-commands. html, 2006.
- J. Jung and E. Sit. An Empirical Study of Spam Traffic and the Use of DNS Black Lists. In Proc. ACM SIGCOMM Internet Measurement Conference, pages 370-375, Taormina, Sicily, Italy, Oct. 2004.
- A. Kumar, V. Paxson, and N. Weaver. Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event. In Proc. ACM SIGCOMM Internet Measurement Conference, Berkeley, CA, Oct. 2005.
- R. Mahajan, D. Wetherall, and T. Anderson. Understanding BGP Misconfiguration. In Proc. ACM SIGCOMM, pages 3-17, Pittsburgh, PA, Aug. 2002.
- MailAvenger, 2005. http://www.mailavenger.org/.
- J. Mason. Spam Forensics: Reverse-Engineering Spammer Tactics. http://spamassassin.apache.org/presentations/ 2004-09-Toorcon/html/, Sept. 2004.
- Microsoft security bulletin ms04-011. http://www. microsoft.com/technet/security/bulletin/ ms04-011.mspx, Apr. 2004.
- D. Moore, C. Shannon, and J. Brown. Code-red: A case study on the spread and victims of an internet worm. In Proc. ACM SIGCOMM Internet Measurement Workshop, Marseille, France, Nov. 2002.
- Operating System Market Shares. http://marketshare. hitslink.com/report.aspx?qprid=2, Jan. 2006.
- The Open Relay Database, 2006. http://ordb.org/.
- M. Prince, B. Dahl, L. Holloway, A. Keller, and E. Langheinrich. Understanding How Spammers Steal Your E-Mail Address: An Analysis of the First Six Months of Data from Project Honey Pot. In Second Conference on Email and Anti-Spam, Stanford, CA, July 2005.
- Project Honey Pot. http://www.projecthoneypot.org/.
- A. Ramachandran and N. Feamster. Understanding the Network-Level Behavior of Spammers. Technical Report GT-CSS-2006-001, Georgia Tech, Feb. 2006.
- S. Ramasubramanian. Port 25 filters -how many here deploy them bidirectionally? http://www.merit.edu/mail.archives/ nanog/2005-01/msg00127.html, Jan. 2005.
- The Spam and Open Relay Blocking System (SORBS), 2006. http://www.sorbs.net/.
- SpamAssassin, 2005. http://www.spamassassin.org/.
- Spammer-X. Inside the Spam Cartel. Syngress, Nov 2004.
- S. Staniford, V. Paxson, and N. Weaver. How to 0wn the Internet in Your Spare Time. In Proc. 11th USENIX Security Symposium, San Francisco, CA, Aug. 2002.
- J. Todd. AS number inconsistencies, July 2002. http://www. merit.edu/mail.archives/nanog/2002-07/ msg00259.html.
- ZDNet Security News. Most spam genrated by botnets, expert says. http://news.zdnet.co.uk/internet/security/0, 39020375,39167561,00.htm, Sept. 2004.