Detecting Spam Zombies by Monitoring Outgoing Messages

被引:26
作者
Duan, Zhenhai [1 ]
Chen, Peng [2 ]
Sanchez, Fernando [1 ]
Dong, Yingfei [3 ]
Stephenson, Mary [4 ]
Barker, James Michael [5 ]
机构
[1] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
[2] Juniper Networks, Sunnyvale, CA 94089 USA
[3] Univ Hawaii, Dept Elect Engn, Honolulu, HI 96822 USA
[4] Florida State Univ, Informat Technol Serv, Tallahassee, FL 32310 USA
[5] Univ N Carolina, Informat Technol Serv, Chapel Hill, NC 27599 USA
基金
美国国家科学基金会;
关键词
Compromised machines; spam zombies; compromised machine detection algorithms;
D O I
10.1109/TDSC.2011.49
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as spamming and spreading malware, DDoS, and identity theft. Given that spamming provides a key economic incentive for attackers to recruit the large number of compromised machines, we focus on the detection of the compromised machines in a network that are involved in the spamming activities, commonly known as spam zombies. We develop an effective spam zombie detection system named SPOT by monitoring outgoing messages of a network. SPOT is designed based on a powerful statistical tool called Sequential Probability Ratio Test, which has bounded false positive and false negative error rates. In addition, we also evaluate the performance of the developed SPOT system using a two-month e-mail trace collected in a large US campus network. Our evaluation studies show that SPOT is an effective and efficient system in automatically detecting compromised machines in a network. For example, among the 440 internal IP addresses observed in the e-mail trace, SPOT identifies 132 of them as being associated with compromised machines. Out of the 132 IP addresses identified by SPOT, 126 can be either independently confirmed (110) or highly likely (16) to be compromised. Moreover, only seven internal IP addresses associated with compromised machines in the trace are missed by SPOT. In addition, we also compare the performance of SPOT with two other spam zombie detection algorithms based on the number and percentage of spam messages originated or forwarded by internal machines, respectively, and show that SPOT outperforms these two detection algorithms.
引用
收藏
页码:198 / 210
页数:13
相关论文
共 26 条
[1]  
[Anonymous], AP SPAMASSASSIN PROJ
[2]  
Bacher P., 2011, KNOW YOUR ENEMY TRAC
[3]  
Chen Z., 2007, P IEEE INT PERF COMP
[4]  
Droms R., 1997, 2131 IETF RFC
[5]  
DUAN Z, 2006, TR060602 FLOR STAT U
[6]  
Duan Z., 2007, P IEEE INT C COMM IC
[7]   DMTP: Controlling spam through message delivery differentiation [J].
Duan, Zhenhai ;
Dong, Yingfei ;
Gopalan, Kartik .
COMPUTER NETWORKS, 2007, 51 (10) :2616-2630
[8]  
Gu G., 2008, P 17 USENIX SEC S JU
[9]  
Gu G., 2007, P 16 USENIX SEC S AU
[10]  
Gu Guofei, 2008, P 15 ANN NETWORK DIS