Top Banner
Spamming Botnets: Signatures and Characteristics Authors:Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten+, Ivan Osipkov+ Presenter: Chia-Li Lin
22

Spamming Botnets: Signatures and Characteristics

Jan 02, 2016

Download

Documents

shelby-wolfe

Spamming Botnets: Signatures and Characteristics. Authors:Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten+, Ivan Osipkov+. Presenter: Chia-Li Lin. References. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Spamming Botnets: Signatures and Characteristics

Spamming Botnets: Signatures and Characteristics     

Authors:Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten+, Ivan Osipkov+

Presenter: Chia-Li Lin

Page 2: Spamming Botnets: Signatures and Characteristics

2

References

Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming botnets: Signatures and characteristics. In SIGCOMM, 2008

Page 3: Spamming Botnets: Signatures and Characteristics

3

Outline

IntroductionSpam Activity TrendsAutoRE StructureStudy ResultsConclusion

Page 4: Spamming Botnets: Signatures and Characteristics

4

Introduction

Developed a spam signature generation framework called:

AutoRE

To detect botnet-based spam emails and botnet membership

It outputs high quality regular expression signatures

Page 5: Spamming Botnets: Signatures and Characteristics

5

Contribution

Ability to detect frequent domain modifications

In-depth analysis of identified spamming botnet characteristics and their activity trends

Page 6: Spamming Botnets: Signatures and Characteristics

6

Two Observations

First, spammers often add random, legitimate URLs to content

legitimate and very general (e.g.,http://www.w3.org)

Second, customize polymorphic URLs

Page 7: Spamming Botnets: Signatures and Characteristics

7

Multi-URL spam emails

Page 8: Spamming Botnets: Signatures and Characteristics

8

Polymorphic URLs

Page 9: Spamming Botnets: Signatures and Characteristics

9

AutoRE

Automatically generating URL signatures to identify botnet-based spam campaigns

Produces two outputs:

a set of spam URL signatures complete URL string (CU) URL regular Expression (RE)

a related list of botnet host IP addresses

Page 10: Spamming Botnets: Signatures and Characteristics

10

Three modules

AutoRE is comprised of the following three modules

URL preprocessor Group selector RegEx generator

domain-specific domain-agnostic

Page 11: Spamming Botnets: Signatures and Characteristics

11

AutoRE Structure[1/2]

Page 12: Spamming Botnets: Signatures and Characteristics

12

AutoRE Structure[2/2]

Page 13: Spamming Botnets: Signatures and Characteristics

13

Suffix-array algorithm

Page 14: Spamming Botnets: Signatures and Characteristics

14

keyword-based signature tree

Page 15: Spamming Botnets: Signatures and Characteristics

15

Detailing and Generalization

Detailing returns a domain specific regular expression

using a keyword-based signature as input.

Generalization returns a more general domain-agnostic

regular expression by merging very similar domain-specific regular expressions

Page 16: Spamming Botnets: Signatures and Characteristics

16

Generalization

Page 17: Spamming Botnets: Signatures and Characteristics

17

Detect Results

Using three months of sampled emails from Hotmail

November 2006, June 2007, July 2007

AutoRE successfully detected

7,721 spam campaigns 340,050 distinct botnet host IP addresses spanning 5,916 ASes.

Page 18: Spamming Botnets: Signatures and Characteristics

18

CU & RE Statistics

Page 19: Spamming Botnets: Signatures and Characteristics

19

Page 20: Spamming Botnets: Signatures and Characteristics

20

False positive rate

Page 21: Spamming Botnets: Signatures and Characteristics

21

Conclutions

This is the first successful attempt to automatically generate regular expression signatures

The existence of botnet spam signatures and the feasibility of detecting botnet hosts using them

Page 22: Spamming Botnets: Signatures and Characteristics

22

Questions