Dynamics of Online Scam Hosting Infrastructure
|
|
|
- Clinton Murphy
- 10 years ago
- Views:
Transcription
1 Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster, and Jaeyeon Jung 2 Georgia Institute of Technology 2 Intel Research {mkonte,feamster}@cc.gatech.edu, [email protected] Abstract. This paper studies the dynamics of scam hosting infrastructure, with an emphasis on the role of fast-flux service networks. By monitoring changes in DNS records of over 35 distinct spam-advertised domains collected from URLs in 5, spam s received at a large spam sinkhole, we measure the rates and locations of remapping DNS records, and the rates at which fresh IP addresses are used. We find that, unlike the short-lived nature of the scams themselves, the infrastructure that hosts these scams has relatively persistent features that may ultimately assist detection. Introduction Online scam hosting infrastructure is critical to spam s profit cycle; victims must contact point-of-sale Web sites, which must be both highly available and dynamic enough to evade detection and blocking. Until recently, many sites for a scam were hosted by a single IP address for a considerable amount of time (i.e., up to a week) [2]. However, simple countermeasures, such as blocking the IP address called for more sophisticated techniques. For example, the past year has seen the rise of fast-flux service networks [5], which allow the sites that host online scams to change rapidly. This paper studies the dynamics of the Internet infrastructure that hosts point-of-sale sites for scam campaigns. We focus on how fast-flux service networks are used to host these online scams. Beyond offering a better understanding of the characteristics of the infrastructure, our study discovers invariant features of the infrastructure that may ultimately help identify scams and the spam messages that advertise them faster than existing methods. We study the scam sites that were hosted by 384 domains as part of 2 scam campaigns in over 5, s collected over the course of a month at a large spam sinkhole. This paper studies two aspects of the dynamics: What are the rates and extent of change? We examine the rates at which scam infrastructures, via the use of fast-flux service networks, redirect clients to different authoritative name servers (either by changing the authoritative nameserver s name or IP address), or to different Web sites entirely. We find that, while the scam sites DNS TTL values do not differ significantly from other sites that perform DNSbased load balancing, the rates of change () differ from legitimate load balancing activities; and (2) differ across individual scam campaigns. How are dynamics implemented? We study the mechanics by which scam hosting infrastructures change the Web servers to which clients are redirected. We determine the location of change by monitoring any changes of () the authoritative
2 Time: 2:5:52 (GMT) A records TTL NS records TTL IPs of NS records TTL , , 3 ns.nameedns.com, , , , ns.nameedns.com, , , , ns.renewwdns.com, , , ns.renewwdns.com Time: 2:57:49 (GMT) A records TTL NS records TTL IPs of NS records TTL , , , , , , , , 3 ns.nameedns.com, ns.nameedns.com, ns.renewwdns.com, ns.renewwdns.com , , , Table. DNS lookup results for the domain pathsouth.com (responding authoritative nameserver was ): The IP addresses in bold highlight changes between the two lookups taken six minutes apart. For the full list of IPs for this domain, see our technical report [7]. nameservers for the domains that clients resolve (the NS record, or the IP address associated with an NS record) or of (2) the mapping of the domain name to the IP address itself (the A record for the name). We analyze both on the basis of individual spam-advertised domains and campaigns that are formed after domain clustering. We find that behavior differs by campaign, but that many scam campaigns redirect clients by changing all three types of mappings, whereas most legitimate load-balancing activities only involve changes to A records. We also study the infrastructures in terms of the geographical and topological locations of scam hosts and the country in which the domains were registered. Background. Fast-flux is a DNS-based method that cybercriminals use to organize, sustain, and protect their service infrastructures such as illegal Web hosting and spamming. Somewhat similar to a technique used by content distribution networks (CDNs) such as Akamai, a fast-flux domain is served by many distributed machines, and short time-to-live (TTL) values allow a controller to quickly change the mapping between a domain name and its A records, its NS records, or the IP addresses of its NS records) [3]. Cybercriminals can rotate through compromised hosts, which renders traditional blacklisting largely ineffective. We show an example of a fast-flux domain, called pathsouth.com, that we monitored on January 2, 28 (Table ). Related Work. The operation of fast-flux service networks and the use of these platforms to send spam was first described in detail by the Honeynet Project [3]. Compared to other studies of fast-flux networks [4, 8, 5], we focus on fast-flux networks as they relate to hosting online scams. This paper is the largest such study (it is an order of magnitude larger than the previous study [4]), and it is the first to () study the location (within the DNS hierarchy) of dynamics, (2) the behavior of hosting infrastructure across campaigns. We examine scam hosting infrastructure using both spam trap data and content-based scam campaign clustering; we draw on previous studies that analyzed spam trap data [6,, 4] or performed content-based analysis [2, 4, 9], albeit for different purposes. Previous work has used passive DNS monitoring to study the dynamics of botnets [3, ], some of which are now believed to used to host fast-flux networks.
3 Fig.. Data collection diagram. The resolver records all DNS mappings at each level of DNS resolution. Here, we feature the same domain as in Table. The rest of this paper is organized as follows. Section 2 describes our data and its limitations. Section 3 describes the dynamics of scam infrastructure and fast-flux service networks that we observed hosting 2 different spam campaigns over the course of a month. Section 4 refers to topological and geographic location of the observed infrastructures. Section 5 concludes with a summary and discussion of future work. 2 Data Collection Our data collection and processing involves three steps: () passive collection of spam data; (2) active DNS monitoring of domains for scam sites contained in those spam messages; (3) clustering of spam and DNS data by scam campaign. This section describes these methods in detail, our use of popular Web sites as a baseline for comparison, and the limitations of our dataset. We collected 3,36 distinct domain names that appeared at spam messages from a large spam sink hole from October, 27 to December 3, 27. We used a simple URL pattern matcher to extract URLs from the message body. Next, we implemented an iterative resolver (at a fixed location) to resolve every domain name from this set once every five minutes. Figure illustrates the process by which our resolver recorded DNS mappings at each level of DNS resolution, which allows us to monitor fast-flux networks for DNS changes at three distinct locations in the hierarchy: () the A record; (2) the NS record; and (3) the IP addresses corresponding to the names in the NS record. To avoid possible caching effects, the resolver randomly selected a DNS root server at each query. The iterative resolver recorded responses received at every level of the DNS hierarchy, including all referrals and answers. Due to the sheer number of DNS lookups required to monitor the domains arriving at the spam trap, the resolver proceeded through the list of domains sequentially: We began by resolving the first 2 domains received at the spam trap each day. Every day the resolver added 2 new domains to the list. After each domain had been resolved continuously for three weeks, we removed the domain from the list. The resolver operated from January 4, 28 to February 9, 28. We picked the domains and the campaigns they mapped to, by restricting our analysis to the domains that had reachable Web sites and for which we had observed at least one change in any DNS record. To compare
4 Campaign Spam s Spam advertising Campaign Fluxing IPs of IPs of IPs of both IPs domains Domains A rec NS rec A+NS rec Pharmacy-A Watch-A Watch-B All campaigns Alexa data set Table 2. Statistics for the top three scam campaigns compared to Alexa domains. Campaigns are sorted by the total number of IP addresses returned from A records. the dynamics those of legitimate domains, we used the same iterative resolution process to study the dynamics of the 5 most popular Web server domains, according to Alexa []. Clustering spam by scam campaign. To cluster the spam messages into scam campaigns, we retrieved content from the URLs in the messages and cluster s whose URLs retrieve common content. We manually went through snapshot images and cluster URLs if the site is selling the same products under the same brand name using a similar page layout. In the case of slow response or when only a few small nonimage files are received, we checked whether the downloaded file names of each URL is a subset of those of already identified campaign. All 2 campaigns exhibited fluxing behavior in their DNS records to some extent during the measurement period. Table 2 shows the summary data for the three campaigns that used the most hosting servers. We denote each campaign with a category- ID, which we assigned based on the products offered on the Web site. The first two columns show the number of total spam s containing the fluxing domains that we received at our spam trap and the total number of sender IPs of those spam s. The third column is the total number of domains for that campaign, and the fourth column is the number of domain names that we found changing ( fluxing domains ). The last three columns show () the distinct number of IPs returned as A records of domains (IP domains ); (2) the number of IPs returned as A records of name servers (IPnameservers); and (3) the total distinct number of IPs from the combined sets (IP domains IPnameservers). The top campaign is Pharmacy-A, one of the Canadian Pharmacy scam campaigns [2]. The campaign used at least of 9,448 distinct IP addresses as hosting servers (or front end proxies of them) for 49 domains over one month. The next two followers are Watch-A (Exquisite Replica) [2] and Watch-B (Diamond Replicas) [2], both of which offer replica watches. For these campaigns, the average number of A records associated with a single domain name is over 5, demonstrating a lot of activity in moving scam sites. We also witnessed multiple domains that shared a few hosting servers. Registrars. To determine the registrar responsible for each of the 384 scam hosting domains, we performed jwhois queries on May 7, 28 for each domain. Table 3 shows that about 7% of these domains are still marked as active and registered with just eight registrars in China, India, and US. Among these, the three registrars in China are
5 Registrar Country Domains Registrar Country Domains dns.com.cn China 8 ( 46.9%) leadnetworks.com India 3 (.8%) paycenter.com.cn China 65 ( 6.9%) coolhandle.com US 2 (.5%) todaynic.com China 2 ( 3.%) webair.com US (.3%) signdomains.com India 7 (.8%) stargateinc.com US (.3%) total active domains: 27 ( 7.6%) Table 3. Registrars of the 384 scam domains as of May 7, 28. responsible for 257 domains (66% of the total or 95% of the active ones). Our data collection was done before February 28, so all domains were registered before that time. All 384 domains were all active after four months, and 2% of the domains had been active for over 7 months. Interestingly, over 4% of these domains were registered in January 28, just before the scams themselves were hosted; thus, a newly registered domain might also ultimately serve as a useful indicator for detecting scam hosting. Limitations. Our data is derived from spam collected at a single spam trap, which receives a relatively high number of spam messages (6,247,937 messages from October 27 through February 28) but may still reflect some bias in the spam it receives. Because we are primarily looking to analyze the dynamics of widespread campaigns (i.e., domains that are likely visible at many traps), this limitation should not greatly affect our results. The main limitation is that our data may not contain all domains for a particular scam. Some of our measurements occurred months after the spam was received, but our results suggest that the dynamics of these domains remain relatively consistent over the month that we monitored them. 3 Dynamics We studied three aspects of dynamics: () the rate at which DNS records change at each level of the hierarchy; (2) the rate at which scam hosting infrastructure accumulates new IP addresses (both overall and by campaign); and (3) the location in the DNS hierarchy where changes take pace. To understand the nature of these features with respect to legitimate load balancing behavior, we also analyzed the same set of features for 5 popular sites listed by Alexa [] as a baseline. Rate of Change. We studied the rates at which domains for online scams changed DNS record mappings and the corresponding TTL values for these records. We compared with the TTLs for domains listed by Alexa. (Our technical report includes the TTL distribution graphs [7].) The distribution of A record TTLs shows that scam sites have slightly shorter TTL values than popular Web sites; however, both classes of Web sites have A records with a wide range TTL values. Even more surprisingly, almost all scam domains we analyzed had TTL values for NS records of longer than a day. These results make sense: many clients visiting scam sites will visit a particular domain infrequently, and only a small number of times, so the TTL value is less important than the rate at which the mapping itself is changing (i.e., for new clients that attempt to resolve the domain).
6 .8 Alexa Fluxing Domains.8 Alexa Fluxing Domains.8 Alexa Fluxing Domains (a) A records 4 6 (b) NS records 4 6 (c) IP of NS records Fig. 2. Distribution of the average time between changes of A, NS, and IP of NS records Pharmacy A Watch A Watch B Pharmacy B Pharmacy A Watch A Watch B Pharmacy B 4 6 (a) A records (b) NS records.2 Pharmacy A Watch A Watch B Pharmacy B 4 6 (c) IP of NS records Fig. 3. Cumulative distributions of the average time between changes of A, NS, and IP of NS records for Pharmacy-A, Watch-A, Watch-B, and Pharmacy-B. We grouped the responses according to the authoritative server that provided them to account for possible load balancing. We then performed pairwise comparisons across each group of records. In the case of A and NS-record responses, we considered a response to be a change if at least one new record appears or if the number of records returned has otherwise changed since the last response; we did not consider reordering the records as a change. In the case of IP addresses of NS records, we considered the response to be a change if either NS names appear with different IPs or a new NS name appears. We discovered the following two characteristics, both of which might ultimately help automatically detect scams: Scam domains change on shorter time intervals than their TTL values. Figure 2 shows the cumulative distribution of average time between changes for each domain across all 2 scam campaigns; each point on the line represents the average time between changes for a particular domain that we monitored. The distribution shows that scam domains change hosting servers (A records) and name servers (IP addresses of NS records) more frequently than popular Web servers do, and also much more frequent than TTL values of the records. Domains in the same campaign exhibit similar rates of change. We also analyzed the rate of change of DNS records after clustering the scam domains according to campaign. Figure 3 shows these results for the top 4 campaigns (ranked by the
7 Cumulative Number Pharmacy A Watch A Pharmacy B Watch B Pharmacy A Start of DNS queries Pharmacy B, Watch B Start of DNS queries Watch A Start of DNS queries Cumulative Number Pharmacy A Watch A Pharmacy B Watch B Pharmacy A Start of DNS queries Pharmacy B, Watch B Start of DNS queries Watch A Start of DNS queries Week Week 2 Week 3 Week 4 Weeks (a) A records - Top 4 Week Week 2 Week 3 Week 4 Weeks (b) IP of NS records - Top 4 Fig. 4. Cumulative number of distinct IPs for the A records and IP addresses of NS records for the top 4 campaigns across the four weeks of data collection. number of distinct IPs returned in A records for domains hosting the campaigns). The results are striking: different scam campaigns rotate DNS record mappings at distinct rates, and the rates at which DNS records for a particular campaign are remapped are similar across all domains for a particular scam. Rate of Accumulation. We measure the rate at which the network grows over time. In practice, our measurement is limited by the rate at which a domain updates its DNS records and what we present in this section is the rate at which a previously unseen host becomes an active hosting server (A records of a domain) or a name server (IP addresses of names returned by NS records). Using a method similar to the one used by Holz et al. [4], we determined the rate of growth by repeatedly resolving each domain and assigning an increasing sequential ID to each previously unseen IP address. Holz et al. performed this analysis for A records of domains without regard to campaign; we performed this analysis for A records and IP addresses of NS records, both at the level of individual domains and at the level of campaigns: Rates of accumulation differ across campaigns. Figures 4(a) and 4(b) show the total number of distinct IPs for each scam domain (the y-value of the end of each line) over the four weeks of data collection (all iterations, 3 apart from each other) and how fast each campaign accumulated new hosts (slope), for the IP addresses of A records and NS records, respectively. A steeper slope indicates more rapid accumulation of new IP addresses for that campaign. Some domains only begin accumulating IP addresses after some period of dormancy. Some domains appear to exhaust available hosts for a while (days to weeks) before accumulating new IP addresses. We examined two campaigns that exhibited rapid accumulation of IP addresses after some dormancy. Interestingly, only one domain from each campaign begins accumulating IP addresses. These two campaigns shared exactly the same set of NS names. In addition to accumulation, we also saw attrition: % of scam domains became unreachable in the while we were monitoring them. These domains may have been blacklisted and removed by registrars or the scammers.
8 Campaign Domains Location of change A [NS IP] NS A+[NS IP] A+NS NS+[NS IP] A+NS+[NS IP] Pharmacy-A Watch-A Watch-B Pharmacy-B Casino-A Total Alexa Table 4. Location of change for the top five campaigns, sorted by the total number of distinct IPs of A records..8 Spamvertizing IPs Fluxing domains IPs of A rec Alexa IPs of A rec.8 Spamvertizing IPs Fluxing domains IPs of NS rec Alexa IPs of NS rec IPs binned by /24 (a) A records IPs binned by /24 (b) IP of NS records Fig. 5. Distribution of the IPs of A rec of authoritative servers spam senders. Location of Change in DNS Hierarchy. We observed many scam domains with NS records or IP addresses of NS records that change rapidly, often in conjunction with other records: Campaigns change DNS record mappings at different levels of the DNS hierarchy. Table 4 shows the type of change for the top five campaign. In contrast to previous studies [5, 3], we observed many different types of changes in addition to single flux (A records) and double flux (A, and IP address of NS). Another notable point is that each campaign tends to combine techniques: For Pharmacy-A, 52% of domains are double flux and 48% change all three types of records. This result indicates that a single campaign can operate using multiple infrastructures. 4 Location In this section, we examine the network and geographic locations of hosts that are hosting scam Web sites or serving as name servers; we also compare these locations to those of both spamming hosts and legitimate Web sites hosts. Topological Location. To examine whether scam sites use different portions of the IP space than the top 5 domains, we studied the distribution of the IPs across the whole IP range. Figure 5 shows that scam networks use a different portion of the IP space than sites that host popular legitimate content. The IPs that host legitimate sites are considerably more distributed. More than 3% of these sites are hosted in the 3/8-6/8 IP address range, which hosted almost none of the scam sites observed in our study:
9 Alexa Fluxing domains 2 4 Number of distinct /24s (a) A records Alexa Fluxing domains 2 4 Number of distinct /24s (b) IP of NS records Fig. 6. Distribution of unique /24s that appeared for all records in a reply. The predominant networks that host scam sites differ from those that host spammers for the corresponding scam campaigns (Figure 5). Our technical report lists for the top ten ASes by the number of IP addresses for A records (i.e., hosting sites), NS records (i.e., nameservers), and spammers (as observed in the spam trap) [7]. Interestingly, there is almost no overlap between the ASes hosting the scam sites and the nameservers (mostly Asia) and the ASes hosting the spamming IP addresses (mostly Latin America, Turkey, and US). The fact that significant differences exist between networks of scam infrastructure and those of spammers suggest that hosts in different regions of the IP address space do in fact play different roles in spam campaigns. DNS lookups for scam domains often return much more widely distributed IP addresses than lookups for legitimate Web sites. Our intuition was that fast-flux networks that hosted scam sites would be more distributed across the network than legitimate Web hosting sites, particularly from the perspective of DNS queries from a single client (even in the case of a distributed content distribution network, DNS queries typically map a single client to a nearby Web cache). Figure 6 shows the distribution of distinct /24s that appear at the answer section of the DNS replies) for all records in the reply. Roughly 4% of all A records returned for scam domains were distributed across at least 3 distinct /24s, and many were distributed across thousands of /24s. An overly widespread distribution of query replies may indicate that a domain is indeed suspicious (e.g., a fast-flux network). Geographic Location. Hosting servers and name servers are widely distributed. In total, we observed IP addresses for A records in 283 ASes across 5 countries, IP addresses for NS records in 9 ASes across 4 countries, and IP addresses for spammers across 2,976 IP addresses across 57 countries. Although many scam nodes appear to be in Russia, Germany, and the US, the long list of ASes and countries shows that scam networks are truly distributed; this geographical distribution may be necessary to accommodate the diurnal pattern of compromised hosts uptime [3]. Interestingly, the countries that are referred to by the most A records are not the same set of countries that host authoritative nameservers for those domains (as indicated by IP addresses of NS records). In particular, Slovakia, Israel, and Romania appear to host more nameservers
10 than sites, and China appears to host relatively more nameservers. This difference in distribution deserves further study; one possible explanation is that nameserver infrastructure for fast-flux networks must be more robust than the sites that host scams (which might be relatively transient). 5 Summary This paper studied dynamics and roles of fast-flux networks in mounting scam campaigns. We actively monitored the DNS records for URLs for scam campaigns received at a large spam sinkhole over a one-month period to study dynamics features of fastflux service networks as they are used to host online scam and contrast to the dynamics used for load balancing for popular Web sites. Our findings suggest that monitoring the infrastructure for unusual, invariant changes in DNS mappings may be helpful for automating detection. We plan to explore this possibility in future work. References. Alexa. Alexa the Web Information Company D. S. Anderson, C. Fleizach, S. Savage, and G. M. Voelker. Spamscatter: Characterizing Internet Scam Hosting Infrastructure. In USENIX Security Symposium, Aug D. Dagon, C. Zou, and W. Lee. Modeling Botnet Propagation Using Time Zones. In The 3th Annual Network and Distributed System Security Symposium (NDSS 26), San Diego, CA, Feb T. Holz, C. Corecki, K. Rieck, and F. C. Freiling. Measuring and Detecting Fast-Flux Service Networks. In NDSS, Feb ICANN Security and Stability Advisory Committee. SSAC Advisory on Fast Flux Hosting and DNS. Mar J. Jung and E. Sit. An Empirical Study of Spam Traffic and the Use of DNS Black Lists. In Internet Measurement Conference, Taormina, Italy, October M. Konte, N. Feamster, and J. Jung. Fast Flux Service Networks: Dynamics and Roles in Online Scam Hosting Infrastructure. Technical Report GT-CS-8-7, Sept. 28. http: // feamster/papers/fastflux-tr8.pdf. 8. E. Passerini, R. Paleari, L. Martignoni, and D. Bruschi. FluXOR: detecting and monitoring fast-flux service networks. In DIMVA, July A. Pathak, Y. C. Hu, and Z. M. Mao. Peeking into Spammer Behavior from a Unique Vantage Point. In First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Francisco, CA, Apr M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A Multifaceted Approach to Understanding the Botnet Phenomenon. In ACM SIGCOMM/USENIX Internet Measurement Conference, Brazil, Oct A. Ramachandran and N. Feamster. Understanding the Network-Level Behavior of Spammers. In SIGCOMM, Sept Spam Trackers The Honeynet Project. Know Your Enemy: Fast-Flux Service Networks. honeynet.org/papers/ff/, July Y. Xie, F. Yu, K. Achan, E. Gillum, M. Goldszmidt, and T. Wobber. How dynamic are IP addresses? In ACM SIGCOMM, Kyoto, Japan, Aug B. Zdrnja, N. Brownlee, and D. Wessels. Passive Monitoring of DNS Anomalies. In DIMVA, July 27.
Dynamics of Online Scam Hosting Infrastructure
Dynamics of Online Scam Hosting Infrastructure Maria Konte, Nick Feamster, and Jaeyeon Jung 2 Georgia Institute of Technology 2 Intel Research {mkonte,feamster}@cc.gatech.edu, [email protected] Abstract.
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
New Trends in FastFlux Networks
New Trends in FastFlux Networks Wei Xu 408-753-4135 [email protected] Huagang Xie 408-753-4109 [email protected] Xinran Wang 408-753-4108 [email protected] ABSTRACT Fast-flux
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries Kazumichi Sato 1 keisuke Ishibashi 1 Tsuyoshi Toyono 2 Nobuhisa Miyake 1 1 NTT Information Sharing Platform Laboratories,
An Empirical Analysis of Malware Blacklists
An Empirical Analysis of Malware Blacklists Marc Kührer and Thorsten Holz Chair for Systems Security Ruhr-University Bochum, Germany Abstract Besides all the advantages and reliefs the Internet brought
Internet Monitoring via DNS Traffic Analysis. Wenke Lee Georgia Institute of Technology
Internet Monitoring via DNS Traffic Analysis Wenke Lee Georgia Institute of Technology 0 Malware Networks (Botnets) 1 From General-Purpose to Targeted Attacks 11/14/12 2 Command and Control l Botnet design:
A Case Study on Asprox Infection Dynamics
A Case Study on Asprox Infection Dynamics Youngsang Shin 1, Steven Myers 2, and Minaxi Gupta 1 1 Computer Science Department, Indiana University, Bloomington, Indiana {shiny,minaxi}@cs.indiana.edu 2 School
Spamscatter: Characterizing Internet Scam Hosting Infrastructure
Spamscatter: Characterizing Internet Scam Hosting Infrastructure David S. Anderson Chris Fleizach Stefan Savage Geoffrey M. Voelker Collaborative Center for Internet Epidemiology and Defenses Department
Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS
White paper Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS June 2001 Response in Global Environment Simply by connecting to the Internet, local businesses transform themselves
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA
WE KNOW IT BEFORE YOU DO: PREDICTING MALICIOUS DOMAINS Wei Xu, Kyle Sanders & Yanxin Zhang Palo Alto Networks, Inc., USA Email {wei.xu, ksanders, yzhang}@ paloaltonetworks.com ABSTRACT Malicious domains
Spamming Botnets: Signatures and Characteristics
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, Ivan Osipkov Presented by Hee Dong Jung Adapted from slides by Hongyu Gao and Yinglian
Preetham Mohan Pawar (1000919136)
Charles Lever, Manos Antonakakis, Brad Reaves, Patrick Traynor, Wenke Lee Presented By:- Preetham Mohan Pawar (1000919136) University of Texas, Arlington CSE Introduction. Basic concepts.( DNS ) Mobile
Basheer Al-Duwairi Jordan University of Science & Technology
Basheer Al-Duwairi Jordan University of Science & Technology Outline Examples of using network measurements /monitoring Example 1: fast flux detection Example 2: DDoS mitigation as a service Future trends
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
Global Server Load Balancing
White Paper Overview Many enterprises attempt to scale Web and network capacity by deploying additional servers and increased infrastructure at a single location, but centralized architectures are subject
We Know It Before You Do: Predicting Malicious Domains
We Know It Before You Do: Predicting Malicious Domains Abstract Malicious domains play an important role in many attack schemes. From distributing malware to hosting command and control (C&C) servers and
BOTNET Detection Approach by DNS Behavior and Clustering Analysis
BOTNET Detection Approach by DNS Behavior and Clustering Analysis Vartika Srivastava, Ashish Sharma Dept of Computer science and Information security, JIIT Noida, India Abstract -Botnets are one of the
Internet Content Distribution
Internet Content Distribution Chapter 4: Content Distribution Networks (TUD Student Use Only) Chapter Outline Basics of content distribution networks (CDN) Why CDN? How do they work? Client redirection
John S. Otto Fabián E. Bustamante
John S. Otto Fabián E. Bustamante Northwestern, EECS AIMS-4 CAIDA, SDSC, San Diego, CA Feb 10, 2012 http://aqualab.cs.northwestern.edu ! CDNs direct web clients to nearby content replicas! Several motivations
An Efficient Methodology for Detecting Spam Using Spot System
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
SAC 025 SSAC Advisory on Fast Flux Hosting and DNS
Fast and Double Flux Attacks 1 SAC 025 SSAC Advisory on Fast Flux Hosting and DNS An Advisory from the ICANN Security and Stability Advisory Committee (SSAC) January 2008 Fast and Double Flux Attacks 2
Content Delivery and the Natural Evolution of DNS
Content Delivery and the Natural Evolution of DNS Remote DNS Trends, Performance Issues and Alternative Solutions John S. Otto Mario A. Sánchez John P. Rula Fabián E. Bustamante Northwestern University
Exploring the Black Hole Exploit Kit
Exploring the Black Hole Exploit Kit Updated December 20, 2011 Internet Identity Threat Intelligence Department http://www.internetidentity.com http://www.internetidentity.com 12/29/11 Page 1/20 Summary
Fast Flux Hosting and DNS ICANN SSAC
Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal Avoid detection and take down of web sites used for illegal purposes Technique Host illegal content at many sites
EVILSEED: A Guided Approach to Finding Malicious Web Pages
+ EVILSEED: A Guided Approach to Finding Malicious Web Pages Presented by: Alaa Hassan Supervised by: Dr. Tom Chothia + Outline Introduction Introducing EVILSEED. EVILSEED Architecture. Effectiveness of
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic Yizheng Chen, Manos Antonakakis, Roberto Perdisci, Yacin Nadji, David Dagon, and Wenke Lee Domain Name System Machine-level
SPAMMING BOTNETS: SIGNATURES AND CHARACTERISTICS
SPAMMING BOTNETS: SIGNATURES AND CHARACTERISTICS INTRODUCTION BOTNETS IN SPAMMING WHAT IS AUTORE? FACING CHALLENGES? WE CAN SOLVE THEM METHODS TO DEAL WITH THAT CHALLENGES Extract URL string, source server
The Spammer, the Botmaster, and the Researcher: on the Arms Race in Spamming Botnet Mitigation - Major Area Exam
The Spammer, the Botmaster, and the Researcher: on the Arms Race in Spamming Botnet Mitigation - Major Area Exam Gianluca Stringhini December 16, 2011 1 Introduction Spam, or Unsolicited Bulk Email, is
Surveying DNS Wildcard Usage Among the Good, the Bad, and the Ugly
Surveying DNS Wildcard Usage Among the Good, the Bad, and the Ugly Andrew Kalafut, Minaxi Gupta, Pairoj Rattadilok, and Pragneshkumar Patel School of Informatics and Computing, Indiana University {akalafut,minaxi,prattadi,patel27}@cs.indiana.edu
Computer Networks: Domain Name System
Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com
Passive Monitoring of DNS Anomalies
Passive Monitoring of DNS Anomalies Bojan Zdrnja 1, Nevil Brownlee 1, and Duane Wessels 2 1 University of Auckland, New Zealand, {b.zdrnja,nevil}@auckland.ac.nz 2 The Measurement Factory, Inc., [email protected]
A COMBINED METHOD FOR DETECTING SPAM
International Journal of Computer Networks & Communications (IJCNC), Vol.1, No.2, July 29 A COMBINED METHOD FOR DETECTING SPAM MACHINES ON A TARGET NETWORK Tala Tafazzoli and Seyed Hadi Sadjadi,, Faculty
HIDING THE NETWORK BEHIND THE NETWORK. BOTNET PROXY BUSINESS MODEL Alexandru Maximciuc, Cristina Vatamanu & Razvan Benchea Bitdefender, Romania
HIDING THE NETWORK BEHIND THE NETWORK. BOTNET PROXY BUSINESS MODEL Alexandru Maximciuc, Cristina Vatamanu & Razvan Benchea Bitdefender, Romania Email {amaximciuc, cvatamanu, rbenchea}@ bitdefender.com
Threat Spotlight: Angler Lurking in the Domain Shadows
White Paper Threat Spotlight: Angler Lurking in the Domain Shadows Over the last several months Talos researchers have been monitoring a massive exploit kit campaign that is utilizing hijacked registrant
An Intrusion Detection System for Kaminsky DNS Cache poisoning
An Intrusion Detection System for Kaminsky DNS Cache poisoning Dhrubajyoti Pathak, Kaushik Baruah Departement of CSE, IIT Guwahati [email protected], [email protected] Abstract : Domain
Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper
Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges
Domain Name Abuse Detection. Liming Wang
Domain Name Abuse Detection Liming Wang Outline 1 Domain Name Abuse Work Overview 2 Anti-phishing Research Work 3 Chinese Domain Similarity Detection 4 Other Abuse detection ti 5 System Information 2 Why?
Whose IP Is It Anyways: Tales of IP Reputation Failures
Whose IP Is It Anyways: Tales of IP Reputation Failures SESSION ID: SPO-T07 Michael Hamelin Lead X-Force Security Architect IBM Security Systems @HackerJoe What is reputation? 2 House banners tell a story
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
DNS, CDNs Weds March 17 2010 Lecture 13. What is the relationship between a domain name (e.g., youtube.com) and an IP address?
DNS, CDNs Weds March 17 2010 Lecture 13 DNS What is the relationship between a domain name (e.g., youtube.com) and an IP address? DNS is the system that determines this mapping. Basic idea: You contact
Dušan Bernát ([email protected])
Domain Name System as a Memory and Communication Medium Dušan Bernát ([email protected]) Institute of Computer Systems and Networks, Faculty of Informatics and Information Technology, STU Bratislava,
Stanford Computer Security Lab. TrackBack Spam: Abuse and Prevention. Elie Bursztein, Peifung E. Lam, John C. Mitchell Stanford University
Abuse and Prevention Stanford University Stanford Computer Security Lab TrackBack Spam: Introduction Many users nowadays post information on cloud computing sites Sites sometimes need to link to each other
Glossary of Technical Terms Related to IPv6
AAAA Record An AAAA record stores a 128-bit Internet Protocol version 6 (IPv6) address, which does not fit the standard A record format. For example, 2007:0db6:85a3:0000:0000:6a2e:0371:7234 is a valid
The secret life of a DNS query. Igor Sviridov <[email protected]> 20120522
The secret life of a DNS query Igor Sviridov 20120522 Preface Nowadays, when we type URL (or is it a search string? ;-) into a browser (or mobile device) many things happen. While most of
How To Understand The Power Of A Content Delivery Network (Cdn)
Overview 5-44 5-44 Computer Networking 5-64 Lecture 8: Delivering Content Content Delivery Networks Peter Steenkiste Fall 04 www.cs.cmu.edu/~prs/5-44-f4 Web Consistent hashing Peer-to-peer CDN Motivation
Characterization and Analysis of NTP Amplification Based DDoS Attacks
Characterization and Analysis of NTP Amplification Based DDoS Attacks L. Rudman Department of Computer Science Rhodes University Grahamstown [email protected] B. Irwin Department of Computer Science
A Layman's Guide to Global Server Load Balancing
A Layman's Guide to Global Server Load Balancing Zeus Technology Limited (UK) Sales: +44 (0)1223 568555 Zeus Technology, Inc. (U.S.) Phone: (650) 965-4627 The Jeffreys Building Main: +44 (0)1223 525000
Inspecting DNS Flow Traffic for Purposes of Botnet Detection
Inspecting DNS Flow Traffic for Purposes of Botnet Detection Vojtěch Krmíček, GEANT3 JRA2 T4 Internal Deliverable 2011 Abstract The goal of this report is to examine DNS IP flow traffic and its relation
LASTLINE WHITEPAPER. The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic
LASTLINE WHITEPAPER The Holy Grail: Automatically Identifying Command and Control Connections from Bot Traffic Abstract A distinguishing characteristic of bots is their ability to establish a command and
Measuring the Web: Part I - - Content Delivery Networks. Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD
Measuring the Web: Part I - - Content Delivery Networks Prof. Anja Feldmann, Ph.D. Dr. Ramin Khalili Georgios Smaragdakis, PhD Acknowledgement Material presented in these slides is borrowed from presentajons
Scaling with Zeus Global Load Balancer
White Paper Scaling with Zeus Global Load Balancer Zeus. Why wait Contents Introduction... 3 Server Load Balancing within a Datacenter... 3 Global Server Load Balancing between Datacenters... 3 Who might
Blocking Spam Sessions with Greylisting and Block Listing based on Client Behavior
Blocking Spam Sessions with Greylisting and Block Listing based on Client Behavior Pin-Ren Chiou, Po-Ching Lin, Chun-Ta Li Department of Computer Science and Information Engineering National Chung Cheng
Robust and Seamless Control Flow for Load Balancing in Content Delivery Networks
Robust and Seamless Control Flow for Load Balancing in Content Delivery Networks Gopu.Obaiah*1, S.Suresh Babu*2, S.Gopikrishna*3 1*M.Tech Scholar, Dept of CSE, SRI Mittapalli College of Engg, Tummalapalem,
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
ABSTRACT Acknowledgments List of Abbreviations Contents ABSTRACT 3 Acknowledgments 5 List of Abbreviations 7 List of Figures 15 List of Tables 23 1 Introduction 25 2 Motivation and background 29 3 Overview
GLOBAL SERVER LOAD BALANCING WITH SERVERIRON
APPLICATION NOTE GLOBAL SERVER LOAD BALANCING WITH SERVERIRON Growing Global Simply by connecting to the Internet, local businesses transform themselves into global ebusiness enterprises that span the
CSC2231: Akamai. http://www.cs.toronto.edu/~stefan/courses/csc2231/05au. Stefan Saroiu Department of Computer Science University of Toronto
CSC2231: Akamai http://www.cs.toronto.edu/~stefan/courses/csc2231/05au Stefan Saroiu Department of Computer Science University of Toronto Administrivia Project proposals due today!!! No lecture on Monday:
Simulating a File-Sharing P2P Network
Simulating a File-Sharing P2P Network Mario T. Schlosser, Tyson E. Condie, and Sepandar D. Kamvar Department of Computer Science Stanford University, Stanford, CA 94305, USA Abstract. Assessing the performance
Chapter 25 Domain Name System. 25.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 25 Domain Name System 25.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 25.2 Figure 25.1 Example of using the DNS service 25-1 NAME SPACE To be unambiguous,
Mobile Advertising Around the Globe: 2015 Annual Report
BEST PRACTICE SERIES Mobile Advertising Around the Globe: 2015 Annual Report 9 INSIGHT SERIES The Definitive Facebook Advertising Playbook marinsoftware.com Executive Summary In 2014, global smartphone
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
INFORMATION SECURITY REVIEW
INFORMATION SECURITY REVIEW 14.10.2008 CERT-FI Information Security Review 3/2008 In the summer, information about a vulnerability in the internet domain name service (DNS) was released. If left unpatched,
Detecting Hidden Anomalies in DNS Communication
Detecting Hidden Anomalies in DNS Communication Ondrej Mikle, Karel Slaný, Ján Veselý, Tomáš Janoušek and Ondřej Surý CZ.NIC Americka 23, 2 Prague, Czech Republic [email protected], [email protected],
HTG XROADS NETWORKS. Network Appliance How To Guide: EdgeDNS. How To Guide
HTG X XROADS NETWORKS Network Appliance How To Guide: EdgeDNS How To Guide V 3. 2 E D G E N E T W O R K A P P L I A N C E How To Guide EdgeDNS XRoads Networks 17165 Von Karman Suite 112 888-9-XROADS V
Emerging Trends in Fighting Spam
An Osterman Research White Paper sponsored by Published June 2007 SPONSORED BY sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone: +1 253 630 5839 Fax: +1 866
Configuring DNS. Finding Feature Information
The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname.
Understanding the Network-Level Behavior of Spammers
Understanding the Network-Level Behavior of Spammers Anirudh Ramachandran and Nick Feamster College of Computing, Georgia Tech {avr, feamster}@cc.gatech.edu ABSTRACT This paper studies the network-level
Measures to Protect (University) Domain Registrations and DNS Against Attacks. Dave Piscitello, ICANN [email protected]
Measures to Protect (University) Domain Registrations and DNS Against Attacks Dave Piscitello, ICANN [email protected] Why are we talking about Domain names and DNS? Domain names and URLs define
How To Balance A Web Server With Remaining Capacity
Remaining Capacity Based Load Balancing Architecture for Heterogeneous Web Server System Tsang-Long Pao Dept. Computer Science and Engineering Tatung University Taipei, ROC Jian-Bo Chen Dept. Computer
