Thwarting E-mail Spam Laundering

被引:5
作者
Xie, Mengjun [1 ]
Yin, Heng [1 ]
Wang, Haining [1 ]
机构
[1] Coll William & Mary, Williamsburg, VA 23187 USA
关键词
Security; Spam; proxy; SPRT;
D O I
10.1145/1455518.1455525
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Laundering e-mail spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in the underground e-mail spam industry. Spammers have plagued the Internet by exploiting a large number of spam proxies. The facility of breaking spam laundering and deterring spamming activities close to their sources, which would greatly benefit not only e-mail users but also victim ISPs, is in great demand but still missing. In this article, we reveal one salient characteristic of proxy-based spamming activities, namely packet symmetry, by analyzing protocol semantics and timing causality. Based on the packet symmetry exhibited in spam laundering, we propose a simple and effective technique, DBSpam, to online detect and break spam laundering activities inside a customer network. Monitoring the bidirectional traffic passing through a network gateway, DBSpam utilizes a simple statistical method, Sequential Probability Ratio Test, to detect the occurrence of spam laundering in a timely manner. To balance the goals of promptness and accuracy, we introduce a noise-reduction technique in DBSpam, after which the laundering path can be identified more accurately. Then DBSpam activates its spam suppressing mechanism to break the spam laundering. We implement a prototype of DBSpam based on libpcap, and validate its efficacy on spam detection and suppression through both theoretical analyses and trace-based experiments.
引用
收藏
页数:32
相关论文
共 48 条
  • [1] Andreolini Mauro, 2005, P 1 USENIX WORKSH ST, P77
  • [2] [Anonymous], 2001, 2821 RFC
  • [3] [Anonymous], ACM T INTERNET TECHN
  • [4] [Anonymous], 2005, P 11 ACM SIGKDD INT
  • [5] [Anonymous], 2002, A plan for spam
  • [6] BACHER P, 2005, KNOW YOUR ENEMY TRAK
  • [7] Back Adam, 1997, HASHCASH DENIAL SERV
  • [8] Blosser J, 2004, USENIX Association Proceedings of the Eighteenth Large Installation System Administration Conference, P1
  • [9] BLUM A, 2004, P 7 INT S REC ADV IN
  • [10] DELANY M, 2006, 4870 RFC