Featured Research

from universities, journals, and other organizations

Computer Scientists Shed Light On Internet Scams

Date:
August 10, 2007
Source:
University of California - San Diego
Summary:
Computer scientists have found striking differences between the infrastructure used to distribute spam and the infrastructure used to host the online scams advertised in these unwanted email messages. This discovery should aid in the fight to reduce spam volume and shut down illegal online businesses and malware sites. 94 percent of spam-advertised online scams are hosted on individual Web servers.

Left to Right: Geoff Voelker and Stefan Savage, Professors, Department of Computer Science and Engineering, UCSD Jacobs School of Engineering.
Credit: Image courtesy of University of California - San Diego

Computer scientists from UC San Diego have found striking differences between the infrastructure used to distribute spam and the infrastructure used to host the online scams advertised in these unwanted email messages. This discovery should aid in the fight to reduce spam volume and shut down illegal online businesses and malware sites.

While hundreds or thousands of compromised computers may be used to relay spam to users, most scams are hosted by individual Web servers, computer scientists from the UCSD Jacobs School of Engineering have found. Based on an analysis of over one million spam emails, 94 percent of the scams advertised via embedded links are hosted on individual Web servers, according to new peer-reviewed research to be presented@the USENIX Security 2007 conference in Boston on August 09, 2007.

Using new Internet monitoring approaches developed@UCSD, the computer scientists studied a spam feed over the course of a week. They analyzed spam-advertised Web servers hosting online scams that either offer merchandise and services (e.g., pharmaceuticals, luxury watches, mortgages) or use malicious means to defraud users (e.g., phishing, spyware, rootkits). The researchers followed the URLs embedded in spam back to the hosting servers, probed the servers and analyzed the Web pages advertised in the spam.

"A given spam campaign may use thousands of mail relay agents to deliver its millions of messages, but only use a single server to handle requests from recipients who respond. A single takedown of a scam server or a spammer redirect can curtail the earning potential of an entire spam campaign," write the UCSD computer scientists in their paper accepted for publication@USENIX Security 2007 conference.

These new insights on the Web server infrastructure for online scams pertain to the scams advertised via spam that contain embedded links.

In 2006, industry estimates suggest that spam comprises over 80 percent of all Internet email with a total volume up to 85 billion messages per day. What drives spam are the various money-making scams (legal or illegal) that are advertised in email messages.

"The availability of scam infrastructure is critical to spam profitability. Our findings suggest that the current scam infrastructure is particularly vulnerable to common blocking techniques such as blacklisting," said Geoff Voelker, a computer science and engineering professor@the UCSD Jacobs School involved in the study.

Through the Collaborative Center for Internet Epidemiology and Defenses (CCIED) funded by the National Science Foundation, the UCSD researchers are continuing their efforts to measure and understand the infrastructure used to support the active underground market for illegal online goods and services as a basis for developing controls and defenses against them.

Using their new "spam-scatter" approach, the computer scientists studied over 1 million spam messages from a live feed (all the messages sent, over the course of a week, to any email address@a four-letter top-level domain that has no active email accounts). Spamscatter allows researchers to mine emails, identify URLs in real time and follow these links through any redirection mechanisms and on to the Web page on the destination server.

"Spamscatter provides a mechanism for studying global Internet behavior from a single vantage point," said Voelker.

The computer scientists recorded the server locations and captured screenshots of the spam URL destination Web pages. From these screen shots, the researchers grouped the scams using a technique called "image shingling." This approach matches visually similar Web pages based upon images rendered in a Web browser rather than on HTML source, URL text, or spam email contents. Image shingling enables spamscatter to foil common scammer techniques for avoiding detection in which, for example, the scammers compose their Web sites entirely with images.

"Our image shingling approach breaks new ground in determining which servers are running the same scams," said Chris Fleizach, the second author on the USENIX security paper who recently earned a Master's degree from the Computer Science and Engineering Department@the UCSD Jacobs School of Engineering.

Using this approach, the computer scientists identified scams across servers and domains and reported on distributed and shared infrastructure, lifetime, stability, and location.

By clustering the Web pages that were visually equivalent and integrating this information into the other data collected from the spam feed, the computer scientists determined that about 94 percent of the scams advertised in spam emails with embedded URLs were hosted only a single web server.

Of the 6 percent of scam servers that were distributed across multiple servers, a few used more than ten IP addresses, and one scam used 45 servers.

"Scams might use multiple hosts for fault-tolerance, for resilience in anticipation of administrative takedown or blacklisting, for geographic distribution, or even for load balancing," the authors write, noting that most scammers are not currently taking this precaution.

The computer scientists also found that more than half of the scam servers identified in the live spam feed were in the United States, 14 percent in Western Europe and 13 percent in Asia. This finding is particularly interesting given that only about 14 percent of spam relays used to send spam to the feed used in this study were located in the United States, while 28 percent of the spam relays were located in Western Europe and 16 percent in Asia.

"The strong bias of locating scam hosts in the United States suggests that geographic location is more important to scammers than spammers," the authors write. There are a number of possible reasons for this bias, including the perceived enhanced credibility of scams hosted in the United States. Another possibility, the authors say, is that scam hosts benefit more from stability than spam relays do, and that hosts and networks within the United States can provide this stability.

"We're learning about the hosting infrastructure of online scams from the networking point of view. We also took an inventory of what kinds of Web sites are advertising with spam," said David Anderson, the first author on the USENIX security paper. Anderson recently earned a Master's degree from the Computer Science and Engineering Department@the UCSD Jacobs School of Engineering.

Scams fell into more than 60 categories. The most prevalent scam category was Information Technology, which includes click affiliates, survey and free merchandise offers and some merchandise for sale (e.g., hair loss, software). Just over 2 percent of the scams were labeled as malicious sites (e.g., containing malware such as phishing, spyware, rootkits).

Paper Citation: "Spamscatter: Characterizing Internet Scam Hosting Infrastructure," by David S. Anderson, Chris Fleizach, Stefan Savage and Geoffrey M. Voelker; Department of Computer Science and Engineering@the Jacobs School of Engineering, University of California, San Diego. USENIX Security 2007 conference, Boston, MA, August 6-10, 2007.


Story Source:

The above story is based on materials provided by University of California - San Diego. Note: Materials may be edited for content and length.


Cite This Page:

University of California - San Diego. "Computer Scientists Shed Light On Internet Scams." ScienceDaily. ScienceDaily, 10 August 2007. <www.sciencedaily.com/releases/2007/08/070806122901.htm>.
University of California - San Diego. (2007, August 10). Computer Scientists Shed Light On Internet Scams. ScienceDaily. Retrieved August 28, 2014 from www.sciencedaily.com/releases/2007/08/070806122901.htm
University of California - San Diego. "Computer Scientists Shed Light On Internet Scams." ScienceDaily. www.sciencedaily.com/releases/2007/08/070806122901.htm (accessed August 28, 2014).

Share This




More Computers & Math News

Thursday, August 28, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

JPMorgan Chase Confirms Possible Cyber Attack

JPMorgan Chase Confirms Possible Cyber Attack

Reuters - US Online Video (Aug. 28, 2014) Attackers stole checking and savings account information and lots of other data from JPMorgan Chase, according to the New York Times. Other banks are believed to be victims as well. Fred Katayama reports. Video provided by Reuters
Powered by NewsLook.com
Spend 2 Minutes Watching This Smartwatch Roundup

Spend 2 Minutes Watching This Smartwatch Roundup

Newsy (Aug. 28, 2014) LG announces a round-faced smartwatch, Samsung adds 3G connectivity to its latest wearable, and Apple will reportedly announce the iWatch on Sept. 9. Video provided by Newsy
Powered by NewsLook.com
Why Apple Might Add Mobile Payment Options To iPhone 6

Why Apple Might Add Mobile Payment Options To iPhone 6

Newsy (Aug. 28, 2014) A report by Wired suggests Apple's next iPhone will feature a mobile payment system and near-field communication. Video provided by Newsy
Powered by NewsLook.com
Hackerspace Provides Hackers Creative Haven

Hackerspace Provides Hackers Creative Haven

AP (Aug. 27, 2014) HeatSync Labs, a so-called hackerspace in Mesa, Arizona provides members and the public alike a space to allow their creative juices to flow and make their tech dreams into a reality. (Aug 27) Video provided by AP
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins