skip to main content
10.1145/1592568.1592579acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free Access

De-anonymizing the internet using unreliable IDs

Authors Info & Claims
Published:16 August 2009Publication History

ABSTRACT

Today's Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. In this paper, we present a system called HostTracker that tracks dynamic bindings between hosts and IP addresses by leveraging application-level data with unreliable IDs. Using a month-long user login trace from a large email provider, we show that HostTracker can attribute most of the activities reliably to the responsible hosts, despite the existence of dynamic IP addresses, proxies, and NATs. With this information, we are able to analyze the host population, to conduct forensic analysis, and also to blacklist malicious hosts dynamically.

References

  1. D. G. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker. Accountable Internet Protocol (AIP). In Proc. of ACM SIGCOMM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. S. Anderson, C. Fleizach, S. Savage, and G. M. Voelker. Spamscatter: Characterizing Internet scam hosting infrastructure. In Proc. of the 14th USENIX Security Symposium, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Bellovin, M. Leech, and T. Taylor. ICMP traceback messages. Internet draft, work in progress, 2001.Google ScholarGoogle Scholar
  4. Multi-NDSBL lookup. http://www.completewhois.com/cgi2/rbl_lookup.cgi?query=148.202.33.219&display=webtable, 2007.Google ScholarGoogle Scholar
  5. A. Blum, D. Song, and S. Venkataraman. Detection of interactive stepping stones: Algorithms and confidence bounds. In Proc. of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID), 2004.Google ScholarGoogle ScholarCross RefCross Ref
  6. H. Burch and B. Cheswick. Tracing anonymous packets to their approximate source. In Proc. of USENIX LISA Systems Administration Conference, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. Casado and M. J. Freedman. Peering through the shroud: The effect of edge opacity on IP-based client identification. In Proc. of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. K. Chiang and L. Lloyd. A case study of the rustock rootkit and spam bot. In Prof. of the First Workshop on Hot Topics in Understanding Botnets (HotBot), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. L. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford--Chen. Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay. In Proc. of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. R. Droms. Dynamic host configuration protocol. RFC 2131, March 1997.Google ScholarGoogle Scholar
  11. Dynablock dynamic IP list. http://www.spamhaus.org/pbl/index.lasso, recently aquired by spamhaus, 2007.Google ScholarGoogle Scholar
  12. P. Ferguson and D. Senie. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2827, May 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. Gu, R. Perdisci, J. Zhang, and W. Lee. Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In Proc. of the 15th USENIX Security Symposium, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. G. Gu, J. Zhang, and W. Lee. Botsniffer: Detecting botnet command and control channels in network traffic. In Proc. of NDSS, 2008.Google ScholarGoogle Scholar
  15. T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling. Measurements and mitigation of peer-to-peer-based botnets: A case study on Storm worm. In First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. T. Killalea. Internet service provider security services and procedures. IETF RFC 3013, Nov 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. T. Kohno, A. Broido, and K. Claffy. Remote physical device fingerprinting. In Proc. of the IEEE Symposium on Security and Privacy, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. B. W. Lampson. Computer security in the real world. IEEE Computer, 37(6):37--46, June 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. J. Li, M. Sung, J. Xu, L. Li, and Q. Zhao. Large-scale IP traceback in high-speed Internet: Practical techniques and theoretical foundation. In Proc. of the IEEE Symposium of Security and Privacy, 2004.Google ScholarGoogle Scholar
  20. X. Liu, A. Li, X. Yang, and D. Wetherall. Passport: Secure and adoptable source authentication. In Proc. of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Nmap free security scanner. http://www.insecure.org/nmap/.Google ScholarGoogle Scholar
  22. Project details for p0f. http://freshmeat.net/projects/p0f/.Google ScholarGoogle Scholar
  23. RFC1661: The Point-to-Point Protocol. http://tools.ietf.org/html/rfc1661.Google ScholarGoogle Scholar
  24. A. Ramachandran and N. Feamster. Understanding the network-level behavior of spammers. In Proc. of ACM Sigcomm, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. A. Ramachandran, N. Feamster, and D. Dagon. Revealing botnet membership using DNSBL counter-intelligence. In 2nd Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. A. Ramachandran, N. Feamster, and S. Vempala. Filtering spam with behavioral blacklisting. In Proc. of ACM Conference on Computer and Communications Security (CCS), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Route views project. http://www.routeviews.org.Google ScholarGoogle Scholar
  28. S. Savage, D. Wetherall, A. Karlin, and T. Anderson. Practical network support for IP traceback. In Proc. of ACM SIGCOMM, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent, and W. T. Strayer. Hash-based IP traceback. In Proc. of ACM SIGCOMM, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Spamhaus policy block list (PBL). http://www.spamhaus.org/pbl/, Jan 2007.Google ScholarGoogle Scholar
  31. P. Syverson, D. Goldschlag, and M. Reed. Anonymous connections and onion routing. In Proc. of the IEEE symposium on Security and Privacy, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Trojan now uses Hotmail, Gmail as spam hosts. http://news.bitdefender.com/NW544-en-Trojan-Now-Uses-Hotmail-Gmail-as-Spam-Hosts.html.Google ScholarGoogle Scholar
  33. X. Wang and D. Reeves. Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays. In Proc. of ACM Conference on Computer and Communications Security (CCS), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Whois.net-domain research tools. http://www.whois.net/.Google ScholarGoogle Scholar
  35. Y. Xie, F. Yu, K. Achan, E. Gillum, M. Goldszmidt, and T. Wobber. How dynamic are IP addresses. In Proc. of ACM SIGCOMM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming botnets: Signatures and characteristics. In Proc. of ACM SIGCOMM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Y. Zhang and V. Paxson. Detecting stepping stones. In Proc. of the 9th USENIX Security Symposium, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu, Y. Chen, and E. Gillum. Botgraph: Large scale spamming botnet detection. In Proc. of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. L. Zhuang, J. Dunagan, D. R. Simon, H. J. Wang, and J. D. Tygar. Characterizing botnets from email spam records. In Proc. of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. De-anonymizing the internet using unreliable IDs

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGCOMM '09: Proceedings of the ACM SIGCOMM 2009 conference on Data communication
      August 2009
      340 pages
      ISBN:9781605585949
      DOI:10.1145/1592568
      • cover image ACM SIGCOMM Computer Communication Review
        ACM SIGCOMM Computer Communication Review  Volume 39, Issue 4
        SIGCOMM '09
        October 2009
        325 pages
        ISSN:0146-4833
        DOI:10.1145/1594977
        Issue’s Table of Contents

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 August 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate554of3,547submissions,16%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader