Top Banner
Click Trajectories: Click Trajectories: End-to-End Analysis of End-to-End Analysis of the spam value chain the spam value chain Kirill Levchenko , Andreas Pitsillidis , Neha Chachra , Brandon Enright , Tristan Halvorson , Chris Kanich , He Liu , Damon McCoy , Geoffrey M. Voelker , Stefan Savage Dept. of CSEE University of California, San Diego M. Felegyhazi Budapest University of Technology and Economics Chris Grier Dept. of CSEE University of California, Berkeley Christian Kreibich , Nicholas Weaver , Vern Paxson International Computer Science Institute Berkeley , CA
17

Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,

Dec 29, 2015

Download

Documents

Marylou Doyle
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,

Click Trajectories: End-to-Click Trajectories: End-to-End Analysis of the spam End Analysis of the spam value chainvalue chain

Kirill Levchenko , Andreas Pitsillidis , Neha Chachra , Brandon Enright , Tristan Halvorson , Chris Kanich , He Liu , Damon McCoy , Geoffrey M. Voelker , Stefan Savage Dept. of CSEE University of California, San Diego

M. Felegyhazi Budapest University of Technology and Economics

Chris Grier Dept. of CSEE University of California, Berkeley

Christian Kreibich , Nicholas Weaver , Vern Paxson

International Computer Science Institute Berkeley , CA

Presented by Xinruo Zhang 04/04/2012

Page 2: Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,

Outline Outline

IntroductionImplementationAnalysis for a particular exampleData collection methodContributionWeakness & improvement

Page 3: Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,

IntroductionIntroduction

Spam-based advertising to us◦Think of it merely as junk that jamming

inboxTo spammer

◦Think it is a multi-million businessSpam value chain (aka Spam

ecosystem)◦botnet, domain, name server, web

server, hosting or proxy service acquired

Page 4: Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,

Introduction (cont’d)Introduction (cont’d)

Three categories of spam-advertised products◦Illegal pharmaceuticals, replica

luxury goods and counterfeit software

◦Nearly 95% of spam-advertised emails contains these three popular products

Page 5: Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,

ImplementationImplementation

How modern spam works?◦Advertising, Click Support and Realization

Advertising◦Includes all activities focused on attracting

potential customers to pay attention to what the spammers want to sell

◦The most evolved part of the spam ecosystem, particularly, the delivery of email spam

Page 6: Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,

ImplementationImplementation

Click Support◦In this stage, having delivered their

advertisement, a spammer entice the receiver into clicking an embedded URL with their best effort.

◦Redirection sites, Domains, Name servers, Webs servers, and affiliate programs

Page 7: Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,

ImplementationImplementation

Click Support◦Redirection sites: redirect to

additional URLs. Because some spammers directly advertise a URL embedded in email and thus they would encounter various of defensive measures to interfere their activities.

Page 8: Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,

ImplementationImplementation

Click Support◦Domain: typically, a spammer may

purchase domains directly from a registrar, however, in real life, they frequently purchase from reseller.

◦Name server: any registered domain in turn have supporting name server infrastructure. Get infrastructure either by themselves or by third party.

Page 9: Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,

ImplementationImplementation

Click Support◦Stores and Affiliate programs

Today spammers work as affiliates of an online store, earns a commission

The affiliate program provides all technique and materials

Furthermore, affiliate programs even take responsibility for payment and fulfillment service

Page 10: Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,

ImplementationImplementation

Realization◦have brought the customers to an

advertised site, the seller realizes the latent value by acquiring the customer’s payment

◦it contains two processes: Payment service and Fulfillment service

Page 11: Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,

ImplementationImplementation

Payment service◦Standard credit card payment

In order to get the most value ◦Issuing bank

Customer’s bank◦Acquiring bank

Merchant’s bank◦Card association network

Visa or MasterCard

Page 12: Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,

ImplementationImplementation

Fulfillment◦Fulfill an order in return for

customer’s payment◦Shipping issue

Suppliers will offer direct shipping service so affiliate program can avoid warehousing

Virtual products can be got via internet download

Page 13: Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,

Practical ExamplePractical Example

Page 14: Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,

Data Collection MethodData Collection Method

Page 15: Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,

Data Collection MethodData Collection Method

Page 16: Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,

ContributionContribution

Lack a solid understanding of the spam-based enterprise’s full structure before

And most anti-spam interventions focus on only one facet of the overall spam value chain

authors present a whole analysis for spam ecosystem with large-scale practical study

Page 17: Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Tristan Halvorson,

Weakness & ImprovementWeakness & Improvement

lack of legal and ethical concerns◦For some issue concerns the ethics

of any implicit harm caused by criminal supplier

only have one medium – email spam◦Consider twitter spam, other social

network spam