Understanding Large-Scale Spamming Botnets From Internet Edge Sites
نویسندگان
چکیده
This paper aims to understand empirically the impact of a largescale spamming botnet, and the effectiveness of targeting its core infrastructure – C&C servers – from the viewpoint of several Internet edge sites. We also attempt to study the characteristics of the spamming botnet in the long-term to see how quickly bot masters react and what type of action they take. Our primary target in this paper is one of the world’s previously worst known spamming botnets, Srizbi, whose C&C servers were shutdown by its upstream ISPs on November 11, 2008. We conduct an extensive measurement study spanning a large volume of e-mail delivery logs and packet traces collected at five vantage points. The measurement period spans three years and includes of the rise and fall of the botnet. We leverage passive TCP fingerprinting on the collected packet traces to identify bot-infected hosts and spam messages sent from them. We first extract variants of the known TCP signatures that are associated with the spamming botnet by correlating the data sets in the time and space domains. Next, by using the signatures, we quantify the volume of spam sent from the botnet and the effectiveness of the C&C server shutdown from an Internet edge siteperspective. We attempt to study the characteristics of the spamming botnet in both the time and space domains. We reveal several findings that are useful in understanding the spread of spamming botnets; specifically, we note the steady growth of the botnet’s size and the rapid version transition after the shutdown of C&C servers. We also estimate the entire size of Srizbi botnet. We then study how the botnet membership is distributed around the globe and how its size changed over time.
منابع مشابه
Understanding the World’s Worst Spamming Botnet
On November 11, 2008, the primary web hosting company, McColo, for the command and control servers of Srizbi botnet was shutdown by its upstream ISPs. Subsequent reports claimed that the volume of spam dropped significantly everywhere on that very same day. In this work, we aim to understand the world’s worst spamming botnet, Srizbi, and to study the effectiveness of targeting the botnet’s comm...
متن کاملBOTMAGNIFIER: Locating Spambots on the Internet
Unsolicited bulk email (spam) is used by cybercriminals to lure users into scams and to spread malware infections. Most of these unwanted messages are sent by spam botnets, which are networks of compromised machines under the control of a single (malicious) entity. Often, these botnets are rented out to particular groups to carry out spam campaigns, in which similar mail messages are sent to a ...
متن کاملSocial Networking for Botnet Command and Control
A botnet is a group of compromised computers— often a large group—under the command and control of a malicious botmaster. Botnets can be used for a wide variety of malicious attacks, including spamming, distributed denial of service, and identity theft. Botnets are generally recognized as a serious threat on the Internet. This paper discusses SocialNetworkingBot, a botnet we have developed that...
متن کاملThe Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns
Spam accounts for a large portion of the email exchange on the Internet. In addition to being a nuisance and a waste of costly resources, spam is used as a delivery mechanism for many criminal scams and large-scale compromises. Most of this spam is sent using botnets, which are often rented for a fee to criminal organizations. Even though there has been a considerable corpus of research focused...
متن کاملHoneynet-based Botnet Scan Traffic Analysis
With the increasing importance of Internet in everyone’s daily life, Internet security poses a serious problem. Now-a-days, botnets are the major tool to launch Internet-scale attacks. A “botnet” is a network of compromised machines that is remotely controlled by an attacker. In contrast of the earlier hacking activities (mainly used to show off the attackers’ technique skills), botnets are bet...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010