首页> 外文学位 >Characterizing Internet Scams through underground Infrastructure Infiltration.
【24h】

Characterizing Internet Scams through underground Infrastructure Infiltration.

机译:通过地下基础设施渗透来表征互联网欺诈。

获取原文
获取原文并翻译 | 示例

摘要

Modern unsolicited bulk email, or spam, is ultimately driven by product sales: goods purchased by customers online. While this model is easy to state in the abstract, our understanding of the concrete business environment---how many orders, of what kind, from which customers, for how much---is poor at best. This situation is unsurprising since such sellers typically operate under questionable legal footing, with ground truth data rarely available to the public. However, absent quantifiable empirical data, "guesstimates" operate unchecked and can distort both policy making and our choice of appropriate technical interventions.;This dissertation presents new methodologies for and results from experiments that characterize and quantify the economics of email based scams. The methodology relies on infrastructure infiltration to gain a view of the mechanisms and revenues of these operations from the point of view of the perpetrators themselves. Through multiple research efforts, we are able to capitalize on the weaknesses of the perpetrators' security to collect information that provides insight into the way these scams work.;The first effort investigates the proportion of spam recipients that act upon the spam messages they receive - the "conversion rate" of spam. Using a parasitic infiltration of an existing botnet's infrastructure, we analyze two spam campaigns comprised of nearly half a billion email messages: one campaign designed to propagate a malware Trojan, the other campaign marketing on-line pharmaceuticals. We identify the number that are successfully delivered, the number that pass through popular anti-spam filters, the number that elicit user visits to the advertised sites, and the number of "sales" and "infections" produced.;The second effort uses two inference techniques to peer inside the business operations of spam-advertised enterprises: purchase pair and basket inference. Using these methodologies, I provide informed estimates on order volumes, product sales distribution, customer makeup and total revenues for a range of spam-advertised businesses.;The results from these studies demonstrate that infiltration of Internet criminal infrastructure allows collection of useful information that can improve our understanding of the operations and economics of adversaries on the Internet. This information informs both technical and policy based defenses so that they can take into consideration the business realities of economically motivated Internet adversaries.
机译:现代不请自来的批量电子邮件或垃圾邮件最终是由产品销售推动的:客户在线购买商品。尽管可以轻松抽象地描述此模型,但我们对具体业务环境的理解(即,多少订单,哪种订单,来自哪个客户,多少客户)的充其量是最好的。这种情况并不令人惊讶,因为这样的卖方通常在可疑的法律基础上开展业务,很少向公众提供实地数据。但是,由于缺乏可量化的经验数据,“猜测”操作不受控制,并且可能扭曲政策制定和我们对适当技术干预措施的选择。;本论文提出了表征和量化基于电子邮件的欺诈行为经济性的实验的新方法和结果。该方法学依靠基础设施渗透来从犯罪者本身的角度了解这些业务的机制和收益。通过多项研究工作,我们能够利用犯罪者安全性的弱点来收集信息,以深入了解这些骗局的工作方式;第一步是调查对接收到的垃圾邮件采取行动的垃圾邮件接收者的比例-垃圾邮件的“转化率”。利用对现有僵尸网络基础设施的寄生渗透,我们分析了两个垃圾邮件活动,其中包括将近十亿条电子邮件:一个活动旨在传播恶意软件Trojan,另一个活动用于营销在线药品。我们确定成功发送的数量,通过流行的反垃圾邮件过滤器传递的数量,引起用户访问广告站点的数量以及产生的“销售”和“感染”的数量。第二项工作使用两个推论垃圾邮件广告企业的业务操作中的推理技术:购买对和购物篮推理。使用这些方法,我对一系列垃圾邮件广告业务的订单量,产品销售分布,客户构成和总收入提供了明智的估计。这些研究的结果表明,互联网犯罪基础设施的渗透允许收集有用的信息,这些信息可以增进我们对互联网上对手的运作和经济状况的了解。此信息可为基于技术和策略的防御提供信息,以便他们可以考虑经济动机的Internet对手的商业现实。

著录项

  • 作者单位

    University of California, San Diego.;

  • 授予单位 University of California, San Diego.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2012
  • 页码 120 p.
  • 总页数 120
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号