EPL682 82 – Advance ced d Security ty Topics Paper Reviews
Name: Ioannis Yiangou Instructor:
- Dr. Elias Athanasopoulos
EPL682 82 Advance ced d Security ty Topics Paper Reviews Name: - - PowerPoint PPT Presentation
EPL682 82 Advance ced d Security ty Topics Paper Reviews Name: Ioannis Yiangou Instructor: Dr. Elias Athanasopoulos Date: 27 February 2020 Term: rm: Irrelevant online content sent to numerous users Forms: rms: Emails, Social
No transaction evidences Spammers do not fill formal financial reports anywhere Campaigns act entirely online etc.
Build an e-commerce site & market it via spam Record sales Conversion rate (how many “ads” turned to “purchases”) Become a convincing spammer Use technologies used by spammers utilize botnets for email distribution affect proxy responses etc.
Authors used an existing botnet to use a part of its spam Redirected users to their own (harmless) servers, instead Took measurements
Request works from higher levels Receive orders & send spam
Link Workers w/ Master servers Give status reports
Directed by the Bot Master Give commands, workloads Interpret status reports
IDEA:
Ensure e spam can be passed successfully
Append those accounts to the delivery list of every workload Remove references to those accounts from every report Ensure Bot master does not notice authors’ changes
Design:
No functi
Log all accesses
E.g. trying to: perform well, enhance spam defense, ensure quality measurements, retrieve info
e.g. visiting the pharmacy site, with the same IP, multiple times using different unique identifiers Could be taking measurements/studying spam mechanisms
e.g. downloading post-card files more than 10 times
st of April
8 proxie
Most workers
Few cases (90 workers) connected to all
Most connec
Average
Many Connection cases (40%) did not even
Longe
Shows the whole process of spam distribution From workers receiving target e-mail addresses, to user conversion Shows how
Time:
Importance
conversion, using time-to-click (little correlation)
long periods of time for good profit
OBSERVA
CONCL
triggers the blacklisting process
Post the same spam links excessively Avoid spam detection measures
Generation of click traffic Attraction of victims Masking of suspicious spam pages from users
Attachment of “trends” to a spam message Searching for the topic see spam message Mixed with other posts spam goes unnoticed
Use many accounts more clicks
Send to more people more clicks
Involve/create “trends” more clicks
Re-posting more does NOT also mean more clicks
Career
Examine tweet timestamps for posting patterns (mins & secs) Check if posting behavior is a uniform distribution If YES : Likely an automatio ion Posts s at standard ard times Likely y to be a career r spam account
“Tweet text & link entropy test”
Examine tweet history of each spam account “Binning” of text & URLs (similar to hashing) distribution Cases of binning: No repetit itions s = High Entropy py Important/new information Probab bably y not a spammer r account nt Strong ng repetit itio ions s = Low Entropy py Unimportant/old information Probab bably y a spammer r account Uniform repetitions = Average Entropy No conclusions
Running χ2 & Entropy
RESULTS
Comprom
Use a victim’s reputation to promote spam to followers
Build reputation & concentrate followers
Automa
Thir
Typica
Many spam tweets posted from
If exists: Cluster in the same campaign
Crawler visited many shortening sites before reaching the landing scam page 8 different URL shortening sites found to have been used
Analyzed history timestamp mps for each tweet w/ blacklisted URLs Measured delay between a tweet’s posting & blackli listin ing times Problem: m: spam is active ve until blackli list sted ed Millions of users might click blacklist failed to prevent
random spam links
PROBLEM M IF: emails/tweets contained unique domains URL shortening services “mimic” new domains (w/ shortened URLs) with small cost
After a point of redirecting from site to site: Spam links appear from non-blacklisted page, although landing page is blacklisted Evades blacklisting 55% of blacklisted URLs cross a domain border SOLUTION ION: Keep crawling until reaching landing page blacklist it!
Entire domains blacklisted, although not affiliated with spam campaigns
Abused by spammers Spam activity found in domains, BUT most accounts legitimate users
Remove sources of spam from domains Use blacklists that go beyond domains (e.g. target full URLs)
st ever study
https://gracenet.org/gnblog/%E2%80%A2-how-to-deal-with-spam-part-1/
https://cyprus-mail.com/2019/02/17/us-still-seeking-extradition-of-teen-hacker/
https://contactyahoohelpdesk.blogspot.com/2019/03/how-to-set-up-yahoo-mail- account.html
https://www.interactivesearchmarketing.com/web-crawlers-search-engines/
https://siliconangle.com/2013/05/29/twitter-shoots-down-tweetadder-in-war-on-spam/
https://www.semplaza.com/uribl-review/
https://www.manageengine.com/browser-security/safe-browsing.html
http://mrmattyoung.co.uk/wp-content/uploads/2015/12/Screen-Shot-2015-12-03-at- 11.59.38.png
https://variety.com/2017/digital/news/twitter-ad-transparency-center-1202598380/
https://ccn.waag.org/navigator/tool/mini-campaign-challenge
https://www.bankinfosecurity.com/compromised-rdp-server-tally-from-xdedic-may-be- higher-a-9218
http://thetechnews.com/2018/04/18/googles-safe-browsing-now-by-default-comes-with- android-apps/
https://davejsteele.wordpress.com/2012/09/15/google-safe-browsing-diagnostic-page/
https://zapier.com/blog/best-url-shorteners/