1 analysis of smtp connection characteristics for detecting spam relays authors: p. j. sandford, j....

16
1 Analysis of SMTP Connection Characteristics for Detecting Spam Relays Authors: P. J. Sandford, J. M. Sandford, and D. J. Parish Speaker: Shu-Fen Chiou( 邱邱邱 )

Upload: candace-walsh

Post on 23-Dec-2015

225 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: 1 Analysis of SMTP Connection Characteristics for Detecting Spam Relays Authors: P. J. Sandford, J. M. Sandford, and D. J. Parish Speaker: Shu-Fen Chiou(

1

Analysis of SMTP Connection Characteristics for Detecting Spam Relays

Authors: P. J. Sandford, J. M. Sandford, and D. J. ParishSpeaker: Shu-Fen Chiou( 邱淑芬 )

Page 2: 1 Analysis of SMTP Connection Characteristics for Detecting Spam Relays Authors: P. J. Sandford, J. M. Sandford, and D. J. Parish Speaker: Shu-Fen Chiou(

2

Outline

Introduction Spam relay detection Results Conclusion Comments

Page 3: 1 Analysis of SMTP Connection Characteristics for Detecting Spam Relays Authors: P. J. Sandford, J. M. Sandford, and D. J. Parish Speaker: Shu-Fen Chiou(

3

E-mail

Mail Server

Client

SMTP Server

MTA

POP 協定下載郵件

IMAP 協定讀取及

管理郵件

SMTP 協定發送郵件

SMTP 轉送郵件

SMTP 傳遞郵件

SMTP Server

MTA MTA

MUA

SMTP 其它 Mail Sever或

Outlook/fetchmail/mail

Page 4: 1 Analysis of SMTP Connection Characteristics for Detecting Spam Relays Authors: P. J. Sandford, J. M. Sandford, and D. J. Parish Speaker: Shu-Fen Chiou(

4

Spam relay

Sending mail to a destination via a third-party mail server or proxy server in order to hide the address of the source of the mail.

When e-mail servers (SMTP servers) are used, it is known as an "open relay" or "SMTP relay," and this method was commonly used by spammers in the past when SMTP servers were not locked down.

Today, most spam relay is provided by proxy servers and botnets.

Page 5: 1 Analysis of SMTP Connection Characteristics for Detecting Spam Relays Authors: P. J. Sandford, J. M. Sandford, and D. J. Parish Speaker: Shu-Fen Chiou(

5

Prevent spam

Page 6: 1 Analysis of SMTP Connection Characteristics for Detecting Spam Relays Authors: P. J. Sandford, J. M. Sandford, and D. J. Parish Speaker: Shu-Fen Chiou(

6

Specific problem

Spam relay

Compromised host Compromised hostCompromised host …

Mailserver

Mailserver

Mailserver

Spam mail

…Mail

serverMail

serverMail

server

Spam mail

…Mail

serverMail

server

Spam mail

Page 7: 1 Analysis of SMTP Connection Characteristics for Detecting Spam Relays Authors: P. J. Sandford, J. M. Sandford, and D. J. Parish Speaker: Shu-Fen Chiou(

7

Monitoring Architecture

Page 8: 1 Analysis of SMTP Connection Characteristics for Detecting Spam Relays Authors: P. J. Sandford, J. M. Sandford, and D. J. Parish Speaker: Shu-Fen Chiou(

8

Legitimate users V.S. spam relays

Number of connections Legitimate users < spam relays

Connect to a mail server Legitimate users: Fewer times an hour. Spam relays: Thousands of emails

every hour to hundreds of mail servers. Daily pattern

Legitimate users: Can exhibit. Spam relays: Do not exhibit.

Page 9: 1 Analysis of SMTP Connection Characteristics for Detecting Spam Relays Authors: P. J. Sandford, J. M. Sandford, and D. J. Parish Speaker: Shu-Fen Chiou(

9

Result(1/6)

All the example shows come from a single 24 hour period during Sep. 2005.

Total 89,748 hosts were observed. 48 hosts had established over 10,000

SMTP connections. 4 hosts had established over 50,000

SMTP connections.

Page 10: 1 Analysis of SMTP Connection Characteristics for Detecting Spam Relays Authors: P. J. Sandford, J. M. Sandford, and D. J. Parish Speaker: Shu-Fen Chiou(

10

Result(2/6)

Total: 58,000 SMTP connections

Home user

Page 11: 1 Analysis of SMTP Connection Characteristics for Detecting Spam Relays Authors: P. J. Sandford, J. M. Sandford, and D. J. Parish Speaker: Shu-Fen Chiou(

11

Result(3/6)

25,000connections

Mail bombs: occur where very large quantities of email are sent to the same address rendering the address unusable.

Page 12: 1 Analysis of SMTP Connection Characteristics for Detecting Spam Relays Authors: P. J. Sandford, J. M. Sandford, and D. J. Parish Speaker: Shu-Fen Chiou(

12

Result(4/6)

3,000connections

Page 13: 1 Analysis of SMTP Connection Characteristics for Detecting Spam Relays Authors: P. J. Sandford, J. M. Sandford, and D. J. Parish Speaker: Shu-Fen Chiou(

13

Result(5/6)

Page 14: 1 Analysis of SMTP Connection Characteristics for Detecting Spam Relays Authors: P. J. Sandford, J. M. Sandford, and D. J. Parish Speaker: Shu-Fen Chiou(

14

Result(6/6)

Total: over 1,600,000 connections

Page 15: 1 Analysis of SMTP Connection Characteristics for Detecting Spam Relays Authors: P. J. Sandford, J. M. Sandford, and D. J. Parish Speaker: Shu-Fen Chiou(

15

Conclusions

This paper has shown how spam relays installed on compromised hosts could be identified by the ISP networks on which they are hosted.

Given the large disparity between the SMTP connection profiles of legitimate mail clients and servers and spam relays, an automated process could easily be developed to detect spam relays.

Page 16: 1 Analysis of SMTP Connection Characteristics for Detecting Spam Relays Authors: P. J. Sandford, J. M. Sandford, and D. J. Parish Speaker: Shu-Fen Chiou(

16

Comments

提出了一個簡單的方法來預防 spam 。 偵測到 host 是 spam relay 的正確率,方

法的有效性 ? 如何定義連線數量的門檻值,來判定 host

為 spam relay?