identifying infections with spamming malware in a network
play

Identifying Infections with Spamming Malware in a Network, based on - PowerPoint PPT Presentation

Introduction Research Question Background Dataset Approach Results Conclusion Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam


  1. Introduction Research Question Background Dataset Approach Results Conclusion Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam July 2014 Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  2. Introduction Research Question Background Dataset Approach Results Conclusion Acknowledgement Research conducted at Quarantainenet BV, supervised by Casper Joost Eyckelhof Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  3. Introduction Research Question Background Dataset Approach Results Conclusion Outline Introduction Research Question Background DNS MX Dataset Approach Theory Analysis tools Results Frequency Periodicity Entropy Flow Conclusion Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  4. Introduction Research Question Background Dataset Approach Results Conclusion Introduction Spam: Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  5. Introduction Research Question Background Dataset Approach Results Conclusion Introduction Spam: ”Unsolicited means that the Recipient has not granted verifiable permission for the message to be sent. Bulk means that the message is sent as part of a larger collection of messages, all having substantively identical content.” - Spamhaus Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  6. Introduction Research Question Background Dataset Approach Results Conclusion Introduction(2) Spam worldwide problem ◮ Global email: 150-200 billion per day Sources: Symantec and Radicati Group Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  7. Introduction Research Question Background Dataset Approach Results Conclusion Introduction(2) Spam worldwide problem ◮ Global email: 150-200 billion per day ◮ Almost 2/3 is spam Sources: Symantec and Radicati Group Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  8. Introduction Research Question Background Dataset Approach Results Conclusion Introduction(2) Spam worldwide problem ◮ Global email: 150-200 billion per day ◮ Almost 2/3 is spam ◮ Most spam blocked by spamfilters Sources: Symantec and Radicati Group Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  9. Introduction Research Question Background Dataset Approach Results Conclusion Introduction(2) Spam worldwide problem ◮ Global email: 150-200 billion per day ◮ Almost 2/3 is spam ◮ Most spam blocked by spamfilters ◮ Average business user receives 85 emails a day, 10 are spam. Sources: Symantec and Radicati Group Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  10. Introduction Research Question Background Dataset Approach Results Conclusion Introduction(3) ◮ 80% generated by botnet (Symantec) Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  11. Introduction Research Question Background Dataset Approach Results Conclusion Introduction(3) ◮ 80% generated by botnet (Symantec) ◮ Network of infected computers Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  12. Introduction Research Question Background Dataset Approach Results Conclusion Introduction(3) ◮ 80% generated by botnet (Symantec) ◮ Network of infected computers ◮ Owner controlled Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  13. Introduction Research Question Background Dataset Approach Results Conclusion Introduction(3) ◮ 80% generated by botnet (Symantec) ◮ Network of infected computers ◮ Owner controlled ◮ Sold as a service Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  14. Introduction Research Question Background Dataset Approach Results Conclusion Introduction(3) ◮ 80% generated by botnet (Symantec) ◮ Network of infected computers ◮ Owner controlled ◮ Sold as a service ◮ Used for DDoS, Clickfraud, spam Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  15. Introduction Research Question Background Dataset Approach Results Conclusion Introduction(3) ◮ 80% generated by botnet (Symantec) ◮ Network of infected computers ◮ Owner controlled ◮ Sold as a service ◮ Used for DDoS, Clickfraud, spam ◮ Reputation loss, costs for bandwidth, energy Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  16. Introduction Research Question Background Dataset Approach Results Conclusion Introduction(4) Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  17. Introduction Research Question Background Dataset Approach Results Conclusion Introduction(5) What to do? ◮ Prevention Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  18. Introduction Research Question Background Dataset Approach Results Conclusion Introduction(5) What to do? ◮ Prevention ◮ Network monitoring Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  19. Introduction Research Question Background Dataset Approach Results Conclusion Introduction(5) What to do? ◮ Prevention ◮ Network monitoring ◮ Quarantainenet Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  20. Introduction Research Question Background Dataset Approach Results Conclusion Introduction(5) What to do? ◮ Prevention ◮ Network monitoring ◮ Quarantainenet ◮ Different sensors Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  21. Introduction Research Question Background Dataset Approach Results Conclusion Introduction(5) What to do? ◮ Prevention ◮ Network monitoring ◮ Quarantainenet ◮ Different sensors ◮ Accumulate score Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  22. Introduction Research Question Background Dataset Approach Results Conclusion Introduction(5) What to do? ◮ Prevention ◮ Network monitoring ◮ Quarantainenet ◮ Different sensors ◮ Accumulate score ◮ Restrict network acces, put machine in quarantaine Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  23. Introduction Research Question Background Dataset Approach Results Conclusion Research question Research question Is it possible to identify a machine that is in infected with spamming malware by analysing DNS MX requests? Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  24. Introduction Research Question Background Dataset Approach Results Conclusion DNS MX DNS ◮ Domain Name System Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

  25. Introduction Research Question Background Dataset Approach Results Conclusion DNS MX DNS ◮ Domain Name System ◮ Links domain name (google.com) to ip address (74.125.136.138) Bas Vlaszaty Bas.Vlaszaty@os3.nl Universiteit van Amsterdam Identifying Infections with Spamming Malware in a Network, based on Analysis of DNS MX Requests

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend