Скачать презентацию Click Trajectories End-to-End Analysis of the spam value Скачать презентацию Click Trajectories End-to-End Analysis of the spam value

69c448757d1b80d4a85cf5fb6bdf47de.ppt

  • Количество слайдов: 17

Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko , Andreas Pitsillidis Click Trajectories: End-to-End Analysis of the spam value chain Kirill Levchenko , Andreas Pitsillidis , Neha Chachra , Brandon Enright , Tristan Halvorson , Chris Kanich , He Liu , Damon Mc. Coy , Geoffrey M. Voelker , Stefan Savage Dept. of CSEE University of California, San Diego M. Felegyhazi Budapest University of Technology and Economics Chris Grier Dept. of CSEE University of California, Berkeley Christian Kreibich , Nicholas Weaver , Vern Paxson International Computer Science Institute Berkeley , CA Presented by Xinruo Zhang 04/04/2012

Outline Introduction Implementation Analysis for a particular example Data collection method Contribution Weakness & Outline Introduction Implementation Analysis for a particular example Data collection method Contribution Weakness & improvement

Introduction Spam-based advertising to us ◦ Think of it merely as junk that jamming Introduction Spam-based advertising to us ◦ Think of it merely as junk that jamming inbox To spammer ◦ Think it is a multi-million business Spam value chain (aka Spam ecosystem) ◦ botnet, domain, name server, web server, hosting or proxy service acquired

Introduction (cont’d) Three categories of spam-advertised products ◦ Illegal pharmaceuticals, replica luxury goods and Introduction (cont’d) Three categories of spam-advertised products ◦ Illegal pharmaceuticals, replica luxury goods and counterfeit software ◦ Nearly 95% of spam-advertised emails contains these three popular products

Implementation How modern spam works? ◦ Advertising, Click Support and Realization Advertising ◦ Includes Implementation How modern spam works? ◦ Advertising, Click Support and Realization Advertising ◦ Includes all activities focused on attracting potential customers to pay attention to what the spammers want to sell ◦ The most evolved part of the spam ecosystem, particularly, the delivery of email spam

Implementation Click Support ◦ In this stage, having delivered their advertisement, a spammer entice Implementation Click Support ◦ In this stage, having delivered their advertisement, a spammer entice the receiver into clicking an embedded URL with their best effort. ◦ Redirection sites, Domains, Name servers, Webs servers, and affiliate programs

Implementation Click Support ◦ Redirection sites: redirect to additional URLs. Because some spammers directly Implementation Click Support ◦ Redirection sites: redirect to additional URLs. Because some spammers directly advertise a URL embedded in email and thus they would encounter various of defensive measures to interfere their activities.

Implementation Click Support ◦ Domain: typically, a spammer may purchase domains directly from a Implementation Click Support ◦ Domain: typically, a spammer may purchase domains directly from a registrar, however, in real life, they frequently purchase from reseller. ◦ Name server: any registered domain in turn have supporting name server infrastructure. Get infrastructure either by themselves or by third party.

Implementation Click Support ◦ Stores and Affiliate programs Today spammers work as affiliates of Implementation Click Support ◦ Stores and Affiliate programs Today spammers work as affiliates of an online store, earns a commission The affiliate program provides all technique and materials Furthermore, affiliate programs even take responsibility for payment and fulfillment service

Implementation Realization ◦ have brought the customers to an advertised site, the seller realizes Implementation Realization ◦ have brought the customers to an advertised site, the seller realizes the latent value by acquiring the customer’s payment ◦ it contains two processes: Payment service and Fulfillment service

Implementation Payment service ◦ Standard credit card payment In order to get the most Implementation Payment service ◦ Standard credit card payment In order to get the most value ◦ Issuing bank Customer’s bank ◦ Acquiring bank Merchant’s bank ◦ Card association network Visa or Master. Card

Implementation Fulfillment ◦ Fulfill an order in return for customer’s payment ◦ Shipping issue Implementation Fulfillment ◦ Fulfill an order in return for customer’s payment ◦ Shipping issue Suppliers will offer direct shipping service so affiliate program can avoid warehousing Virtual products can be got via internet download

Practical Example Practical Example

Data Collection Method Data Collection Method

Data Collection Method Data Collection Method

Contribution Lack a solid understanding of the spambased enterprise’s full structure before And most Contribution Lack a solid understanding of the spambased enterprise’s full structure before And most anti-spam interventions focus on only one facet of the overall spam value chain authors present a whole analysis for spam ecosystem with large-scale practical study

Weakness & Improvement lack of legal and ethical concerns ◦ For some issue concerns Weakness & Improvement lack of legal and ethical concerns ◦ For some issue concerns the ethics of any implicit harm caused by criminal supplier only have one medium – email spam ◦ Consider twitter spam, other social network spam