+ All Categories
Home > Documents > BOTNET-GENERATED SPAMprojects.csail.mit.edu/spamconf/SC2009/Areej_Al-Bataineh/Bataineh... ·...

BOTNET-GENERATED SPAMprojects.csail.mit.edu/spamconf/SC2009/Areej_Al-Bataineh/Bataineh... ·...

Date post: 06-Oct-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
13
3/27/2009 1 BOTNET-GENERATED SPAM By Areej Al-Bataineh University of Texas at San Antonio MIT Spam Conference 2009 www.securitycartoon.com 3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 2
Transcript
Page 1: BOTNET-GENERATED SPAMprojects.csail.mit.edu/spamconf/SC2009/Areej_Al-Bataineh/Bataineh... · 3/27/2009 1 BOTNET-GENERATED SPAM By Areej Al-Bataineh University of Texas at San Antonio

3/27/2009

1

BOTNET-GENERATED SPAM

By Areej Al-Bataineh

University of Texas at San Antonio

MIT Spam Conference 2009

www.securitycartoon.com

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 2

Page 2: BOTNET-GENERATED SPAMprojects.csail.mit.edu/spamconf/SC2009/Areej_Al-Bataineh/Bataineh... · 3/27/2009 1 BOTNET-GENERATED SPAM By Areej Al-Bataineh University of Texas at San Antonio

3/27/2009

2

Botnets: “A Global Pandemic”

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 3

Botnet is a network of compromised machines (Bots) under the command and control (C&C) of one person (master)

Machines become infected when users click on email attachmentsor URLs, visit malicious/legitimate web sites, or install softwarefrom untrusted sources

C&C protocols include IRC, HTTP, P2P

Botnets used for attacks like DDoS, spamming, phishing, identity theft, …etc

According Panda Labs, in 2Q 2008, 10 million bot computers were used to distribute spam and malware across the Internet each day

Botnets are mostly used for spamming!

According to Marshal’s TRACE center :

In the 1Q of 2008, about 85% of spam is generated by 6 Botnets: Mega-D,

Srizbi, Storm, Pushdo, Rustock, Cutwail.

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 4

According to Symantec’s Message Labs Intelligence:

The McColo ISP shutdown

Page 3: BOTNET-GENERATED SPAMprojects.csail.mit.edu/spamconf/SC2009/Areej_Al-Bataineh/Bataineh... · 3/27/2009 1 BOTNET-GENERATED SPAM By Areej Al-Bataineh University of Texas at San Antonio

3/27/2009

3

Questions

� How does a typical spamming botnet work?

� How do botnets transmit spam?

� What can be done to make it nearly impossible for botnets to deliver spam?

� What tools and policies can be utilized at network edges?

� What tools and policies can be utilized at mail servers?

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 5

Spamming Botnet

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 6

Botnet Master

Control Servers

Spammer

Email templatesEmail listsDNS MX recordsBinary updates…

Page 4: BOTNET-GENERATED SPAMprojects.csail.mit.edu/spamconf/SC2009/Areej_Al-Bataineh/Bataineh... · 3/27/2009 1 BOTNET-GENERATED SPAM By Areej Al-Bataineh University of Texas at San Antonio

3/27/2009

4

Questions

� How does a typical spamming botnet work?

� How do botnets transmit spam?

� What can be done to make it nearly impossible for botnets to deliver spam?

� What tools and policies can be utilized at network edges?

� What tools and policies can be utilized at mail servers?

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 7

Email Transmission

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 8

MUA

MTA MX Server

MUA

Alice Bob

Page 5: BOTNET-GENERATED SPAMprojects.csail.mit.edu/spamconf/SC2009/Areej_Al-Bataineh/Bataineh... · 3/27/2009 1 BOTNET-GENERATED SPAM By Areej Al-Bataineh University of Texas at San Antonio

3/27/2009

5

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 9

Spam Transmission 1

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 9

MUA

Relay Server MX Server

MUA

Spambot Victim

Spambot forwards email to an open relay server

Spambot composes message according to the given template

Open Relay

Mail server relays email to recipient mail server

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 10

Spam Transmission 2

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 10

Proxy Client

Proxy Server MX Server

MUA

Spambot Victim

Proxy server forwards email traffic to a mail server

Spambot initiate a proxy connection (HTTP/SOCKS)

Open Proxy

Page 6: BOTNET-GENERATED SPAMprojects.csail.mit.edu/spamconf/SC2009/Areej_Al-Bataineh/Bataineh... · 3/27/2009 1 BOTNET-GENERATED SPAM By Areej Al-Bataineh University of Texas at San Antonio

3/27/2009

6

Areej Al-Bataineh - Botnet-generated Spam 11

Spam Transmission 3

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 11

Proxy Client

Proxy Server

MX Server

MUA

Spambot Victim

Proxy server forwards email traffic through mail server of its own domain

Spambot initiate a proxy connection (HTTP/SOCKS)

ProxyLock

MX Server

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 12

Spam Transmission 4

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 12

MUA+MTA

MX Server

MUA

Spambot

Victim

Spambot initiate SMTP connection with recipient mail server

Direct-To-MX

Page 7: BOTNET-GENERATED SPAMprojects.csail.mit.edu/spamconf/SC2009/Areej_Al-Bataineh/Bataineh... · 3/27/2009 1 BOTNET-GENERATED SPAM By Areej Al-Bataineh University of Texas at San Antonio

3/27/2009

7

Questions

� How does a typical spamming botnet work?

� How do botnets transmit spam?

� What can be done to make it nearly impossible for botnets to deliver spam?

� What tools and policies can be utilized at network edges?

� What tools and policies can be utilized at mail servers?

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 13

Spam Control

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 14

MTA MX Server

Message Transmission Path

Router Router

Page 8: BOTNET-GENERATED SPAMprojects.csail.mit.edu/spamconf/SC2009/Areej_Al-Bataineh/Bataineh... · 3/27/2009 1 BOTNET-GENERATED SPAM By Areej Al-Bataineh University of Texas at San Antonio

3/27/2009

8

Questions

� How does a typical spamming botnet work?

� How do botnets transmit spam?

� What can be done to make it nearly impossible for botnets to deliver spam?

� What tools and policies can be utilized at network edges?

� What tools and policies can be utilized at mail servers?

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 15

Egress Spam control at Routers

1. Manage port 25 traffic (MAAWG 2008)

� Block mail traffic except from designated servers

In some networks, this cannot be adopted!!

2. Monitor DNS queries (Romana et al. 2008)

� Identify spambots within a network

� based on their frequent DNS queries for MX records

Some botnets maintains DB for MX records

3. DBSpam (Xie et al. 2006)

� Block/throttle spam laundry traffic

� Discover proxy bots inside the network

Detect proxy traffic, not regular spam traffic

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 16

Page 9: BOTNET-GENERATED SPAMprojects.csail.mit.edu/spamconf/SC2009/Areej_Al-Bataineh/Bataineh... · 3/27/2009 1 BOTNET-GENERATED SPAM By Areej Al-Bataineh University of Texas at San Antonio

3/27/2009

9

Ingress Spam Control at Routers

1. Local and dynamic Blacklists (Cook et al. 2006)

� Identify IPs of spambots based on spam filters

� Keep IPs in blacklists for a chosen period of time

Spambots have dynamic IP addresses

2. Spam streams classification (Argawal et al. 2005)

� Identify bulk email streams based on message similarities

� Classify them as spam using a Bayesian classifier

Template-based spam messages do not look similar

3. SpamFlow (Beverly & Sollins 2008)

� Identify distinguishing features of spam TCP flows (RTT, idle, FIN)

� Use machine learning classifier trained on open relay MTA mail

connections

Choosing the right features is key

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 17

Summary – Control at Routers

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 18

Method Direction Effect

Cook InBlock email traffic from locally-

blacklisted sources

Argawal In Detect bulk spam traffic

SpamFlow In Detect spam TCP flows

Manage Port 25 OutDrop email traffic except from

legitimate outbound servers

Romana Out Detect spambots DNS MX queries

DBSpam In/Out Block/Throttle proxy traffic

Page 10: BOTNET-GENERATED SPAMprojects.csail.mit.edu/spamconf/SC2009/Areej_Al-Bataineh/Bataineh... · 3/27/2009 1 BOTNET-GENERATED SPAM By Areej Al-Bataineh University of Texas at San Antonio

3/27/2009

10

Questions

� How does a typical spamming botnet work?

� How do botnets transmit spam?

� What can be done to make it nearly impossible for botnets to deliver spam?

� What tools and policies can be utilized at network edges?

� What tools and policies can be utilized at mail servers?

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 19

Spam Control at MTAs

1. Email forwarding best practices

� Specify inbound/outbound mail servers

� Different port number (not 25) and user authentication

spambot knows the port # and the user credentials

2. SMTP transaction Delay

� Impose delay on suspicious requests

� Suspicion based on SMTP RFCs compliance checks

This delay will not affect spambots

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 20

Page 11: BOTNET-GENERATED SPAMprojects.csail.mit.edu/spamconf/SC2009/Areej_Al-Bataineh/Bataineh... · 3/27/2009 1 BOTNET-GENERATED SPAM By Areej Al-Bataineh University of Texas at San Antonio

3/27/2009

11

Incoming Spam Control

1. Source IP address checking� Authorized mail server (SPF, DKIM, Sender ID)

Spambots domain may not have such DNS records

� Blacklists

35% of spam comes from sources not listed in any blacklist

2. Greylisting� Refuse first delivery attempt, accept the second one

Spambots can adapt and include this feature

3. SMTP session abort

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 21

Summary – Spam Control at Servers

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 22

Method Direction Effect

Reject open

relays In/Out Block open relay attempts

Forwarding

best practicesOut

Drop email from unauthorized

users

SMTP delay InDelay spam and reduce its

volume

Source IP

checkingIn

Drop email from untrusted

servers

Greylisting InRefuse delivery attempts by

untrusted sources

SMTP abort InRefuse delivery attempts from

known suspicious sources

Page 12: BOTNET-GENERATED SPAMprojects.csail.mit.edu/spamconf/SC2009/Areej_Al-Bataineh/Bataineh... · 3/27/2009 1 BOTNET-GENERATED SPAM By Areej Al-Bataineh University of Texas at San Antonio

3/27/2009

12

Review

Anti-spam is improving, but …

Why the spam volume is not decreasing?

Answer: Botnets

� Efficient Generation

� Guaranteed Delivery

Solutions: Spam control at …

� Routers or network edges

� Mail servers

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 23

Conclusions

� Botnet-generated spam:

� Brings out new challenges

� Opens new directions for solutions

� Intercepting spam while in transit is crucial

� New solutions should consider the nature of

botnet-generated spam:

� Distributed

� Anonymous

3/27/2009 Areej Al-Bataineh - Botnet-generated Spam 24

Page 13: BOTNET-GENERATED SPAMprojects.csail.mit.edu/spamconf/SC2009/Areej_Al-Bataineh/Bataineh... · 3/27/2009 1 BOTNET-GENERATED SPAM By Areej Al-Bataineh University of Texas at San Antonio

3/27/2009

13

3/27/2009 25Areej Al-Bataineh - Botnet-generated Spam

Questions?

Comments?

Ideas?

[email protected]


Recommended