Abuse and Prevention

Abuse and Prevention

TrackBack Spam: Abuse and Prevention Elie Bursztein, Peifung E. Lam, John C. Mitchell Stanford University Stanford Computer Security Lab Security Computer Stanford Introduction • Many users nowadays post information on cloud computing sites • Sites sometimes need to link to each other • However, cross-referencing can become a vehicle for abuses (such as spamming) • This calls for a study of security issues on cross-referencing between cloud sites Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu Introduction (cont.) • Blog cross-referencing offers one such example • Blogs have automated mechanisms, called Linkbacks, to facilitate cross-referencing, and this has been exploited by spammers Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu Introduction (cont.) • We carried out a 1-year study of a major spamming platform, and analyzed 10 million spams • Gained insight on attacker’s method of operation and resources • Propose a defense against blog spams Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu Outline • Blog Spam • Experiment setup : Honey blog ! • Results • Defense Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu General Stats on Blogs Source: universalmccann • 184 Million blogs world-wide • 73% of internet users have read a blog • 50% post comments Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu Common Blog Platforms Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu Why blogs are special • Blog are designed around the idea of user pushing content • As an example, Linkbacks allow cross-linking between blogs. • More specifically, when blog A cites another blog B, a notification of the citation can be sent to B, which can then link back to blog A automatically. Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu TrackBack - a type of LinkBack The URL of TrackBack TrackBack URL capture script Auto discovery of Resource Description TrackBack URL Framework (RDF) Code on blog site extracts Trigger citations to other blogs Notification HTTP Post Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu TrackBack URL and Blog Comments Trackback Post variables [title] => Title of the referencing blog entry [url] => http://www.mysite.com/page [excerpt] => Post excerpt .... [blog_name] => Mysite blog Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu Problem • Trackbacks are used to • push spam • do malevolent Search Engine Optimization • One blog spam can reach thousand of users Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu How big is the problem? Source: Akismet.com Blog Spam Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu Honey Blog • A blog acting as a potential target for spamming • Instrumented our blog site and analyzed spams Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu Setup • Hosted a real blog (dotclear) with a modified TrackBack mechanism • Record TrackBacks • Passive fingerprinting • Sample the lure site Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu Activity 100000 75000 50000 Number of Spams http://seclab.stanford.edu Elie Bursztein, Peifung E. Lam, John C. Mitchell 25000 Trackback Spams 0 Mar-Apr Mar 1, Mar-Apr2007 2007 Mar2007 18, 2007 Apr 4, 2007 Apr 21, 2007 May-JunMay-Jun May 8, 2007 2007 May2007 25, 2007 Jun 11, 2007 Jun 28, 2007 Jul 15, 2007 Aug 1, 2007 Aug 18, 2007 Sep 4, 2007 Trackback Spams: Abuse and Prevention July 2007-Apr 2008 Sep 21,July 2007 2007-Apr 2008 Oct 8, 2007 Oct 25, 2007 Nov 11, 2007 Nov 28, 2007 Dec 15, 2007 Jan 1, 2008 Jan 18, 2008 Feb 4, 2008 Feb 21, 2008 Mar 9, 2008 Mar 26, 2008 Apr 12, 2008 Apr 29, 2008 Unique Spammer IPs 2800 2100 Unique1400 IPs http://seclab.stanford.edu Elie Bursztein, Peifung E. Lam, John C. Mitchell 700 Unique Spammer IPs 0 Mar-Apr Mar 1,Mar-Apr 2007 Mar2007 18,2007 2007 Apr 4, 2007 Apr 21, 2007May-Jun May 8, 2007May-Jun 2007 May 25,2007 2007 Jun 11, 2007 Jun 28, 2007 Jul 15, 2007 Aug 1, 2007 Aug 18, 2007 Sep 4, 2007 Sep 21,July 20072007-Apr 2008 Trackback Spams: Abuse and Prevention July 2007-Apr 2008 Oct 8, 2007 Oct 25, 2007 Nov 11, 2007 Nov 28, 2007 Dec 15, 2007 Jan 1, 2008 Jan 18, 2008 Feb 4, 2008 Feb 21, 2008 Mar 9, 2008 Mar 26, 2008 Apr 12, 2008 Apr 29, 2008 IP Geolocation Distribution IP Geolocation Distribution 100 75 50 Percentage % Percentage 25 0 July 2007- Mar-Apr 2007 May-Jun 2007 Mar 1, 2007 Apr 6, 2007 Jun 8, 2007 Apr 2008 Apr 15, 2007 Apr 24, 2007 May 3, 2007 Mar 10, 2007 Mar 19, 2007 Mar 28, 2007 May 12, 2007May 21, 2007May 30, 2007 Jun 17, 2007 Jun 2007-Apr 2008 RussiaRussia USAUSA GermanyGermany UK UK Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu Max Uptime of Spamming IPs by Day 12000 9000 Uptime in6000 Hours http://seclab.stanford.edu Elie Bursztein, Peifung E. Lam, John C. Mitchell Max Uptime of All Spamming IPs by Day 3000 0 Jan 4,January 2008 Jan 9, 2008 January Jan 14, 2008 Jan 19, 2008 Jan 24, 2008 Jan 29, 2008 Feb 3, 2008 February Feb 8, 2008 February Feb 13, 2008 Feb 18, 2008 Feb 23, 2008 Trackback Spams: Abuse and Prevention Feb 28, 2008 Mar 4,March 2008 Mar 9, 2008 Mar 14,March 2008 Mar 19, 2008 Mar 24, 2008 Mar 29, 2008 Apr 3, 2008 Apr 8, 2008 Apr 13, 2008 Apr 18,April 2008 Apr 23, 2008 Apr 28, 2008 2008 User Agents in Spamming User Agents in Spamming 100 75 50 Percentage % Percentage 25 0 Mar-AprMar-Apr May-Jun May-Jun Jul 2007-Apr 2008 July 2007-Apr 2008 20072007 2007 2007Jul 1, 2007 Apr 1, 2007 Oct 1, 2007 Jan 1, 2008 Apr 1, 2008 Mar 1, 2007 May 1, 2007 Jun 1, 2007 Aug 1, 2007 Sep 1, 2007 Nov 1, 2007 Dec 1, 2007 Feb 1, 2008 Mar 1, 2008 WordPress/1.9 WordPress 1.9 WordPress/2.0 WordPress/2.1.2 WordPress 2.1.2 WordPress 2.1 IE 6 XP Firefox Opera Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu Trackback content • Random keywords revolving around adult theme • Blog URLs in the Trackback pings are of the form random-words.nx.cn Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu Trackback Post sample Apparent Bayesian poisoning against spam filters: [title] => Please teacher hentai pics [url] =>http://please-teacher-hentai- pics.howdsl.nx.cn/index.html [excerpt] => pics Please teacher hentai pics ... [blog_name] =>Please teacher hentai pics Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu Created using Wordle Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu Spam Workflow Servers submit Trackback spam Spam points to Social network site exploited as relay site obscufaction Relay site links to lure sites with purported adult content obscufaction Lure site badgers user to download fake video plugins hosted on malware site Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu Relay URL • Www.nx.cn, a community hosting site at Ningxia province, PRC • Exploited by attackers as relay • The hosting site started to use CAPTCHA (some in Chinese) around May, 2008 • We observed a corresponding drop of spam activities using them as relay Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu Behind the relay • Lead to various sites • selectedclipz.com, gogomovz.com (purported adult site) • vidzwares.com (malware distribution site) • Need an id in the url download.php?id=429 Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu The Lure site Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu Whois Domain Name: GOGOMOVZ.COM Registrar: ONLINENIC, INC. Whois Server: whois.onlinenic.com Referral URL: http://www.OnlineNIC.com Name Server: NS1.GOGOMOVZ.COM Name Server: NS2.GOGOMOVZ.COM. Updated Date: 22-oct-2008 Creation Date: 22-oct-2008 Expiration Date: 22-oct-2009 Registrant: ... ul Beketova 3 Nijnii Novgorod,n/a,RUSSIAN FEDERATION 603057 Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu DNS analysis : related domains • ns1.clipzsaloon.com • ns1.clipztube.com • ns1.freexxxmovz.com • ns1.itunnelz.com • ns1.vidzselector.com, and more... Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu Malware • Binary flagged as • TrojanDownloader:Win32/Zlob.gen!dll • Trojan.Popuper.origin • Downloader.Zlob.LI Elie Bursztein, Peifung E. Lam, John C. Mitchell Trackback Spams: Abuse and Prevention http://seclab.stanford.edu TalkBack • Designed a secure protocol: TalkBack • Address the root of the problem: prevent spammers to post notifications • Key ideas : • Lightweight PKI • Global rate limiting Elie Bursztein, Peifung E.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    37 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us