skip to main content
article

Understanding the network-level behavior of spammers

Published:11 August 2006Publication History
Skip Abstract Section

Abstract

This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persistent across time each spamming host is, and characteristics of spamming botnets. We try to answer these questions by analyzing a 17-month trace of over 10 million spam messages collected at an Internet "spam sinkhole", and by correlating this data with the results of IP-based blacklist lookups, passive TCP fingerprinting information, routing information, and botnet "command and control" traces.We find that most spam is being sent from a few regions of IP address space, and that spammers appear to be using transient "bots" that send only a few pieces of email over very short periods of time. Finally, a small, yet non-negligible, amount of spam is received from IP addresses that correspond to short-lived BGP routes, typically for hijacked prefixes. These trends suggest that developing algorithms to identify botnet membership, filtering email messages based on network-level properties (which are less variable than email content), and improving the security of the Internet routing infrastructure, may prove to be extremely effective for combating spam.

References

  1. D. Bank and R. Richmond. Where the Dangers Are. The Wall Street Journal, July 2005. http://online.wsj.com/public/article/SB112128442038984802-4qR772hjUeqGT2W0FIcA3FNjE_20060717.html.Google ScholarGoogle Scholar
  2. M. Casado, T. Garfinkel, W. Cui, V. Paxson, and S. Savage. Opportunistic measurement: Extracting insight from spurious traffic. In Proc. 4th ACM Workshop on Hot Topics in Networks (Hotnets-IV), College Park, MD, Nov. 2005.Google ScholarGoogle Scholar
  3. CNN Technology News. Expert: Botnets No. 1 emerging Internet threat. http://www.cnn.com/2006/TECH/internet/01/31/furst/, Jan. 2006.Google ScholarGoogle Scholar
  4. Description of coordinated spamming, Feb. 2005. http://www.waltdnes.org/spam.Google ScholarGoogle Scholar
  5. J. Evers. Most spam still coming from the U.S. http://news.com.com/Most+spam+still+coming+from+the+U.S./2100-1029_3-6030758.html, Jan. 2006.Google ScholarGoogle Scholar
  6. N. Feamster. Open problems in BGP anomaly detection. In CAIDA Workshop on Internet Signal Processing, San Diego, CA, Nov. 2004.Google ScholarGoogle Scholar
  7. N. Feamster, D. Andersen, H. Balakrishnan, and M. F. Kaashoek. Measuring the Effects of Internet Path Faults on Reactive Routing. In Proc. ACM SIGMETRICS, pages 126--137, San Diego, CA, June 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. N. Feamster, J. Jung, and H. Balakrishnan. An Empirical Study of "Bogon" Route Advertisements. ACM Computer Communications Review, 35(1):63--70, Nov. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Goodmail Systems, 2006. http://www.goodmailsystems.com/.Google ScholarGoogle Scholar
  10. J. Goodman. IP Addresses in Email Clients. In First Conference on Email and Anti-Spam, Mountain View, CA, July 2004.Google ScholarGoogle Scholar
  11. S. Hansell. Postage is due for companies sending email, February 5, 2006. http://www.nytimes.com/2006/02/05/technology/05AOL.html.Google ScholarGoogle Scholar
  12. Honeynet Project. Know Your Enemy: Tracking Botnets. http://www.honeynet.org/papers/bots/botnet-commands.html, 2006.Google ScholarGoogle Scholar
  13. J. Jung and E. Sit. An Empirical Study of Spam Traffic and the Use of DNS Black Lists. In Proc. ACM SIGCOMM Internet Measurement Conference, pages 370--375, Taormina, Sicily, Italy, Oct. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Kumar, V. Paxson, and N. Weaver. Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event. In Proc. ACM SIGCOMM Internet Measurement Conference, Berkeley, CA, Oct. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Mahajan, D. Wetherall, and T. Anderson. Understanding BGP Misconfiguration. In Proc. ACM SIGCOMM, pages 3--17, Pittsburgh, PA, Aug. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. MailAvenger, 2005. http://www.mailavenger.org/.Google ScholarGoogle Scholar
  17. J. Mason. Spam Forensics: Reverse-Engineering Spammer Tactics. http://spamassassin.apache.org/presentations/2004-09-Toorcon/html/, Sept. 2004.Google ScholarGoogle Scholar
  18. Microsoft security bulletin ms04-011. http://www.microsoft.com/technet/security/bulletin/ms04-011.mspx, Apr. 2004.Google ScholarGoogle Scholar
  19. D. Moore, C. Shannon, and J. Brown. Code-red: A case study on the spread and victims of an internet worm. In Proc. ACM SIGCOMM Internet Measurement Workshop, Marseille, France, Nov. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Operating System Market Shares. http://marketshare.hitslink.com/report.aspx?qprid=2, Jan. 2006.Google ScholarGoogle Scholar
  21. The Open Relay Database, 2006. http://ordb.org/.Google ScholarGoogle Scholar
  22. M. Prince, B. Dahl, L. Holloway, A. Keller, and E. Langheinrich. Understanding How Spammers Steal Your E-Mail Address: An Analysis of the First Six Months of Data from Project Honey Pot. In Second Conference on Email and Anti-Spam, Stanford, CA, July 2005.Google ScholarGoogle Scholar
  23. Project Honey Pot. http://www.projecthoneypot.org/.Google ScholarGoogle Scholar
  24. A. Ramachandran and N. Feamster. Understanding the Network-Level Behavior of Spammers. Technical Report GT-CSS-2006-001, Georgia Tech, Feb. 2006.Google ScholarGoogle Scholar
  25. S. Ramasubramanian. Port 25 filters - how many here deploy them bidirectionally? http://www.merit.edu/mail.archives/nanog/2005-01/msg00127.html, Jan. 2005.Google ScholarGoogle Scholar
  26. The Spam and Open Relay Blocking System (SORBS), 2006. http://www.sorbs.net/.Google ScholarGoogle Scholar
  27. SpamAssassin, 2005. http://www.spamassassin.org/.Google ScholarGoogle Scholar
  28. Spammer-X. Inside the Spam Cartel. Syngress, Nov 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. S. Staniford, V. Paxson, and N. Weaver. How to 0wn the Internet in Your Spare Time. In Proc. 11th USENIX Security Symposium, San Francisco, CA, Aug. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. J. Todd. AS number inconsistencies, July 2002. http://www.merit.edu/mail.archives/nanog/2002-07/msg00259.html.Google ScholarGoogle Scholar
  31. ZDNet Security News. Most spam genrated by botnets, expert says. http://news.zdnet.co.uk/internet/security/0,39020375,39167561,00.htm, Sept. 2004.Google ScholarGoogle Scholar

Index Terms

  1. Understanding the network-level behavior of spammers

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGCOMM Computer Communication Review
      ACM SIGCOMM Computer Communication Review  Volume 36, Issue 4
      Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
      October 2006
      445 pages
      ISSN:0146-4833
      DOI:10.1145/1151659
      Issue’s Table of Contents
      • cover image ACM Conferences
        SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
        September 2006
        458 pages
        ISBN:1595933085
        DOI:10.1145/1159913

      Copyright © 2006 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 August 2006

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader