Top Banner
Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research
18

1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.

Mar 27, 2015

Download

Documents

Molly Caldwell
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.

Dynamics of Online Scam Hosting Infrastructure

Maria Konte, Nick FeamsterGeorgia Tech

Jaeyeon JungIntel Research

Page 2: 1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.

2

Online Scams

• Often advertised in spam messages

• URLs point to various point-of-sale sites

• These scams continue to be a menace– As of August 2007, one

in every 87 emails constituted a phishing attack

• Scams often hosted on bullet-proof domains

• Problem: Study the dynamics of online scams, as seen at a large spam sinkhole

Page 3: 1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.

3

Online Scam Hosting is Dynamic

• The sites pointed to by a URL that is received in an email message may point to different sites

• Maintains agility as sites are shut down, blacklisted, etc.

• One mechanism for hosting sites: fast flux

Page 4: 1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.

4

Mechanism for Dynamics: “Fast Flux”

Source: HoneyNet Project

Page 5: 1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.

5

Why Study Dynamics?

• Understanding of fundamental behavior– What are the possible invariants?

– How many different scam-hosting sites are there?

• Automated detection– Today: Blacklisting based on URLs

– Instead: Identify the network-level behavior of a scam-hosting site, and blacklist based on dynamics

Page 6: 1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.

6

Summary of Findings

• What are the rates and extents of change?– Different from legitimate load balance

– Different cross different scam campaigns

• How are dynamics implemented?– Many scam campaigns change DNS mappings at all

three locations in the DNS hierarchy

• A, NS, IP address of NS record

• Conclusion: Might be able to detect based on monitoring the dynamic behavior of URLs

Page 7: 1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.

7

Data Collection Method

• Three months of spamtrap data– 384 scam hosting domains

– 21 unique scam campaigns

• Baseline comparison: Alexa “top 500” Web sites

Page 8: 1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.

8

Top 3 Spam Campaigns

• Some campaigns hosted by thousands of IPs• Most scam domains exhibit some type of flux• Sharing of IP addresses across different roles

(authoritative NS and scam hosting)

Page 9: 1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.

9

Rates of Change

• How (and how quickly) do DNS-record mappings change?

• Rates of change are much faster than for legitimate load-balanced sites.– Scam domains change on shorter intervals than their

TTL values.

• Domains for different scam campaigns exhibit different rates of change.

Page 10: 1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.

10

Rates of Change

• Domains that exhibit fast flux change more rapidly than legitimate domains

• Rates of change are inconsistent with actual TTL values

Rates of change are much faster than for legitimate load-balanced sites.

Page 11: 1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.

11

Rates of Change by CampaignDomains for different scam campaigns exhibit different

rates of change.

Page 12: 1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.

12

Rates of Accumulation

• How quickly do scams accumulate new IP addresses?

• Rates of accumulation differ across campaigns• Some scams only begin accumulating IP

addresses after some time

Page 13: 1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.

13

Rates of Accumulation

Page 14: 1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.

14

Location

• Where in IP address space do hosts for scam sites operate?

• Scam networks use a different portion of the IP address space than legitimate sites– 30/8 – 60/8 --- lots of legitimate sites, no scam sites

• Sites that host scam domains (both sites and authoritative DNS) are more widely distributed than those for legitimate sites

Page 15: 1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.

15

Location: Often in Specific IP Ranges

Scam campaign infrastructure is concentrated in the 80/8-90/8 range.

Page 16: 1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.

16

Location: Many Distinct SubnetsScam sites appear in many more distinct networks than

legitimate load-balanced sites.

Page 17: 1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.

17

Registrars Involved in Changes

• About 70% of domains still active are registered at eight domains

• Three registrars responsible for 257 domains (95% of those still marked as active)

Page 18: 1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster Georgia Tech Jaeyeon Jung Intel Research.

18

Conclusion• Scam campaigns rely on a dynamic hosting

infrastructure• Studying the dynamics of that infrastructure may

help us develop better detection methods

• Dynamics– Rates of change differ from legitimate sites, and differ

across campaigns– Dynamics implemented at all levels of DNS hierarchy

• Location– Scam sites distributed across distinct subnets

Data: http://www.gtnoise.net/scam/fast-flux.html TR: http://www.cc.gatech.edu/research/reports/GT-CS-08-07.pdf