SlideShare una empresa de Scribd logo
1 de 15
The Tricks of the Trade:
What Makes Spam Campaigns Successful?
Jane Iedemska, Gianluca Stringhini, Richard Kemmerer,
Christopher Kruegel, and Giovanni Vigna
University of California, Santa Barbara
Spamming Botnets
The Tricks of the Trade: What Makes Spam Campaigns Successful? 2
Which elements influence the success of
a spam operation?
Success in Spamming
Botnets are a distributed system
The throughput of the system is important
We consider a spammer successful if
most of his emails are sent correctly
We do not consider human factors
Previous research [Kanich et al., CCS 2008]
The Tricks of the Trade: What Makes Spam Campaigns Successful? 3
Motivation
Are we helping the bad guys?
Understanding the important elements in
running a botnet allows us to:
• Identify new research directions
• Run a “sanity check” on past research
The Tricks of the Trade: What Makes Spam Campaigns Successful? 4
The Cutwail Botnet
In 2010 we participated to an attempted takedown
We obtained access to 24 C&C servers
• 30% of the botnet
• Each server rent by a different spammer
• Detailed statistics on the spammers’ campaigns
Details in [Stone-Gross et al., LEET 2011]
The Tricks of the Trade: What Makes Spam Campaigns Successful? 5
The Cutwail
Manual
Guidelines for the “good” spammer
Spammers are advised to
• Choose wisely between text and HTML
• Clean up their email lists from non-existing addresses
• Do not use too many bots (2,000-3,000 are good)
• Run campaigns for a short time
The Tricks of the Trade: What Makes Spam Campaigns Successful? 7
Mathematical model
The Cutwail developers provide a mathematical model
on how to optimize the operation of the botnet
Elements that positively influence success:
Duration of campaign, email addresses that exist, bandwidth of the bots
Elements that negatively influence success:
Size of email messages, time taken to generate an email
The Tricks of the Trade: What Makes Spam Campaigns Successful? 8
The mathematical model is invalid
Successful
Spammers
Assessing successful spammers
We look at the fraction of emails successfully sent
• Top 10% - Successful campaigns (25B emails)
• Bottom 10% - Failed campaings (5B emails)
We use these two sets as ground truth
The Tricks of the Trade: What Makes Spam Campaigns Successful? 10
Important settings
Good “housekeeping”
• Clean up email lists for nonexisting addresses
• Limit bots to 5,000 at most
Bots have bad Internet connections
Instruct bots to retry sending emails multiple times
The Tricks of the Trade: What Makes Spam Campaigns Successful? 11
Bot country distribution
Previous research showed that bots located in
certain countries are more expensive
[Caballero et al., USENIX 2011]
The country of the bots does not influence
their spamming capability
Successful spammers purchased cheaper bots
The Tricks of the Trade: What Makes Spam Campaigns Successful? 12
Sanity check on past research
Tamper with spammers cleaning up email lists
[Stringhini et al., USENIX 2012]
Use network errors for spam detection
[Kakavelakis et al., LISA 2011]
Use geographical distance of bots and victims
[Hao et al., USENIX 2009]
The Tricks of the Trade: What Makes Spam Campaigns Successful? 13
Conclusions
Elements that make a spam campaign successful
Successful spammers leverage experience rather than advice
A wealth of research already targets the
important element in a spam campaign
We hope that this paper will help researchers
in developing techniques that hit spammers
where it hurts the most
The Tricks of the Trade: What Makes Spam Campaigns Successful? 14
Questions?
gianluca@cs.ucsb.edu
@gianlucasb

Más contenido relacionado

Similar a The Tricks of the Trade: What Makes Spam Campaigns Successful?

Thinking Like They Do: An Inside Look At Cybercriminal Operations
Thinking Like They Do: An Inside Look At Cybercriminal OperationsThinking Like They Do: An Inside Look At Cybercriminal Operations
Thinking Like They Do: An Inside Look At Cybercriminal OperationsGianluca Stringhini
 
BotMagnifier: Locating Spambots on the Internet
BotMagnifier: Locating Spambots on the InternetBotMagnifier: Locating Spambots on the Internet
BotMagnifier: Locating Spambots on the InternetGianluca Stringhini
 
Email Deliverability: The What, Why & How
Email Deliverability: The What, Why & HowEmail Deliverability: The What, Why & How
Email Deliverability: The What, Why & HowYes Lifecycle Marketing
 
5 surefire tips for effective email marketing
5 surefire tips for effective email marketing5 surefire tips for effective email marketing
5 surefire tips for effective email marketingMary L Wood
 
Reboot Presentation For Business Email Marketing To Post
Reboot Presentation For Business  Email Marketing To PostReboot Presentation For Business  Email Marketing To Post
Reboot Presentation For Business Email Marketing To PostBBBEvents
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Return Path
 
Learn From Your List: How to A/B Test Your SMS Campaigns
Learn From Your List: How to A/B Test Your SMS CampaignsLearn From Your List: How to A/B Test Your SMS Campaigns
Learn From Your List: How to A/B Test Your SMS Campaignsmobilecommons
 
B2B Drip Campaigns - 7 Case Studies - MarketingSherpa Jeanne Jennings Oct-2010
B2B Drip Campaigns - 7 Case Studies - MarketingSherpa Jeanne Jennings Oct-2010B2B Drip Campaigns - 7 Case Studies - MarketingSherpa Jeanne Jennings Oct-2010
B2B Drip Campaigns - 7 Case Studies - MarketingSherpa Jeanne Jennings Oct-2010JeanneJennings.com, Inc.
 
Online Seller Wales Newport - 30th April, University of South Wales
Online Seller Wales Newport - 30th April, University of South WalesOnline Seller Wales Newport - 30th April, University of South Wales
Online Seller Wales Newport - 30th April, University of South WalesDaytodayebay
 
Using Return Path Data to Promote Your Brand: Marketing Session
Using Return Path Data to Promote Your Brand: Marketing SessionUsing Return Path Data to Promote Your Brand: Marketing Session
Using Return Path Data to Promote Your Brand: Marketing SessionReturn Path
 
Video In Email Presentation
Video In Email PresentationVideo In Email Presentation
Video In Email PresentationGoodmail Systems
 
How To Write An Essay Comparing 2 Poems
How To Write An Essay Comparing 2 PoemsHow To Write An Essay Comparing 2 Poems
How To Write An Essay Comparing 2 PoemsAngel Morris
 
eBook Example - Agile Education Marketing - Email Marketing Best Practices.pdf
eBook Example - Agile Education Marketing - Email Marketing Best Practices.pdfeBook Example - Agile Education Marketing - Email Marketing Best Practices.pdf
eBook Example - Agile Education Marketing - Email Marketing Best Practices.pdfBrafton
 
Spam and Viral Marketing
Spam and Viral MarketingSpam and Viral Marketing
Spam and Viral Marketinghey4ndr3w
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Return Path
 
20 Things Successful Email Marketing Programs Do
20 Things Successful Email Marketing Programs Do20 Things Successful Email Marketing Programs Do
20 Things Successful Email Marketing Programs DoLitmus
 
Email marketing : past, present & future
Email marketing : past, present & futureEmail marketing : past, present & future
Email marketing : past, present & futureFlorence consultant
 
FTC Spam Summit - Best Practices
FTC Spam Summit - Best PracticesFTC Spam Summit - Best Practices
FTC Spam Summit - Best PracticesJohn Mathew
 

Similar a The Tricks of the Trade: What Makes Spam Campaigns Successful? (20)

Thinking Like They Do: An Inside Look At Cybercriminal Operations
Thinking Like They Do: An Inside Look At Cybercriminal OperationsThinking Like They Do: An Inside Look At Cybercriminal Operations
Thinking Like They Do: An Inside Look At Cybercriminal Operations
 
BotMagnifier: Locating Spambots on the Internet
BotMagnifier: Locating Spambots on the InternetBotMagnifier: Locating Spambots on the Internet
BotMagnifier: Locating Spambots on the Internet
 
Email Deliverability: The What, Why & How
Email Deliverability: The What, Why & HowEmail Deliverability: The What, Why & How
Email Deliverability: The What, Why & How
 
5 surefire tips for effective email marketing
5 surefire tips for effective email marketing5 surefire tips for effective email marketing
5 surefire tips for effective email marketing
 
Reboot Presentation For Business Email Marketing To Post
Reboot Presentation For Business  Email Marketing To PostReboot Presentation For Business  Email Marketing To Post
Reboot Presentation For Business Email Marketing To Post
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
 
Learn From Your List: How to A/B Test Your SMS Campaigns
Learn From Your List: How to A/B Test Your SMS CampaignsLearn From Your List: How to A/B Test Your SMS Campaigns
Learn From Your List: How to A/B Test Your SMS Campaigns
 
B2B Drip Campaigns - 7 Case Studies - MarketingSherpa Jeanne Jennings Oct-2010
B2B Drip Campaigns - 7 Case Studies - MarketingSherpa Jeanne Jennings Oct-2010B2B Drip Campaigns - 7 Case Studies - MarketingSherpa Jeanne Jennings Oct-2010
B2B Drip Campaigns - 7 Case Studies - MarketingSherpa Jeanne Jennings Oct-2010
 
Startup analytics
Startup analyticsStartup analytics
Startup analytics
 
Online Seller Wales Newport - 30th April, University of South Wales
Online Seller Wales Newport - 30th April, University of South WalesOnline Seller Wales Newport - 30th April, University of South Wales
Online Seller Wales Newport - 30th April, University of South Wales
 
Using Return Path Data to Promote Your Brand: Marketing Session
Using Return Path Data to Promote Your Brand: Marketing SessionUsing Return Path Data to Promote Your Brand: Marketing Session
Using Return Path Data to Promote Your Brand: Marketing Session
 
Emailmarketing Loseangeles
Emailmarketing Loseangeles Emailmarketing Loseangeles
Emailmarketing Loseangeles
 
Video In Email Presentation
Video In Email PresentationVideo In Email Presentation
Video In Email Presentation
 
How To Write An Essay Comparing 2 Poems
How To Write An Essay Comparing 2 PoemsHow To Write An Essay Comparing 2 Poems
How To Write An Essay Comparing 2 Poems
 
eBook Example - Agile Education Marketing - Email Marketing Best Practices.pdf
eBook Example - Agile Education Marketing - Email Marketing Best Practices.pdfeBook Example - Agile Education Marketing - Email Marketing Best Practices.pdf
eBook Example - Agile Education Marketing - Email Marketing Best Practices.pdf
 
Spam and Viral Marketing
Spam and Viral MarketingSpam and Viral Marketing
Spam and Viral Marketing
 
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
Using Return Path Data to Promote Your Brand: Marketing/Research Breakout Ses...
 
20 Things Successful Email Marketing Programs Do
20 Things Successful Email Marketing Programs Do20 Things Successful Email Marketing Programs Do
20 Things Successful Email Marketing Programs Do
 
Email marketing : past, present & future
Email marketing : past, present & futureEmail marketing : past, present & future
Email marketing : past, present & future
 
FTC Spam Summit - Best Practices
FTC Spam Summit - Best PracticesFTC Spam Summit - Best Practices
FTC Spam Summit - Best Practices
 

Más de Gianluca Stringhini

EvilCohort: Detecting Communities of Malicious Accounts on Online Services
EvilCohort: Detecting Communities of Malicious Accounts on Online ServicesEvilCohort: Detecting Communities of Malicious Accounts on Online Services
EvilCohort: Detecting Communities of Malicious Accounts on Online ServicesGianluca Stringhini
 
That Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral ModellingThat Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral ModellingGianluca Stringhini
 
The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...
The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...
The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...Gianluca Stringhini
 
Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages
Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web PagesShady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages
Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web PagesGianluca Stringhini
 
Follow the Green: Growth and Dynamics on Twitter Follower Markets
Follow the Green: Growth and Dynamics on Twitter Follower MarketsFollow the Green: Growth and Dynamics on Twitter Follower Markets
Follow the Green: Growth and Dynamics on Twitter Follower MarketsGianluca Stringhini
 
Detecting Spammers on Social Networks
Detecting Spammers on Social NetworksDetecting Spammers on Social Networks
Detecting Spammers on Social NetworksGianluca Stringhini
 
The Spammer, the Botmaster, and the Researcher: On the Arms Race in Spamming ...
The Spammer, the Botmaster, and the Researcher: On the Arms Race in Spamming ...The Spammer, the Botmaster, and the Researcher: On the Arms Race in Spamming ...
The Spammer, the Botmaster, and the Researcher: On the Arms Race in Spamming ...Gianluca Stringhini
 

Más de Gianluca Stringhini (7)

EvilCohort: Detecting Communities of Malicious Accounts on Online Services
EvilCohort: Detecting Communities of Malicious Accounts on Online ServicesEvilCohort: Detecting Communities of Malicious Accounts on Online Services
EvilCohort: Detecting Communities of Malicious Accounts on Online Services
 
That Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral ModellingThat Ain't You: Detecting Spearphishing Through Behavioral Modelling
That Ain't You: Detecting Spearphishing Through Behavioral Modelling
 
The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...
The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...
The Harvester, the Botmaster, and the Spammer: On the Relations Between the D...
 
Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages
Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web PagesShady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages
Shady Paths: Leveraging Surfing Crowds to Detect Malicious Web Pages
 
Follow the Green: Growth and Dynamics on Twitter Follower Markets
Follow the Green: Growth and Dynamics on Twitter Follower MarketsFollow the Green: Growth and Dynamics on Twitter Follower Markets
Follow the Green: Growth and Dynamics on Twitter Follower Markets
 
Detecting Spammers on Social Networks
Detecting Spammers on Social NetworksDetecting Spammers on Social Networks
Detecting Spammers on Social Networks
 
The Spammer, the Botmaster, and the Researcher: On the Arms Race in Spamming ...
The Spammer, the Botmaster, and the Researcher: On the Arms Race in Spamming ...The Spammer, the Botmaster, and the Researcher: On the Arms Race in Spamming ...
The Spammer, the Botmaster, and the Researcher: On the Arms Race in Spamming ...
 

Último

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 

Último (20)

Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

The Tricks of the Trade: What Makes Spam Campaigns Successful?

  • 1. The Tricks of the Trade: What Makes Spam Campaigns Successful? Jane Iedemska, Gianluca Stringhini, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna University of California, Santa Barbara
  • 2. Spamming Botnets The Tricks of the Trade: What Makes Spam Campaigns Successful? 2 Which elements influence the success of a spam operation?
  • 3. Success in Spamming Botnets are a distributed system The throughput of the system is important We consider a spammer successful if most of his emails are sent correctly We do not consider human factors Previous research [Kanich et al., CCS 2008] The Tricks of the Trade: What Makes Spam Campaigns Successful? 3
  • 4. Motivation Are we helping the bad guys? Understanding the important elements in running a botnet allows us to: • Identify new research directions • Run a “sanity check” on past research The Tricks of the Trade: What Makes Spam Campaigns Successful? 4
  • 5. The Cutwail Botnet In 2010 we participated to an attempted takedown We obtained access to 24 C&C servers • 30% of the botnet • Each server rent by a different spammer • Detailed statistics on the spammers’ campaigns Details in [Stone-Gross et al., LEET 2011] The Tricks of the Trade: What Makes Spam Campaigns Successful? 5
  • 7. Guidelines for the “good” spammer Spammers are advised to • Choose wisely between text and HTML • Clean up their email lists from non-existing addresses • Do not use too many bots (2,000-3,000 are good) • Run campaigns for a short time The Tricks of the Trade: What Makes Spam Campaigns Successful? 7
  • 8. Mathematical model The Cutwail developers provide a mathematical model on how to optimize the operation of the botnet Elements that positively influence success: Duration of campaign, email addresses that exist, bandwidth of the bots Elements that negatively influence success: Size of email messages, time taken to generate an email The Tricks of the Trade: What Makes Spam Campaigns Successful? 8 The mathematical model is invalid
  • 10. Assessing successful spammers We look at the fraction of emails successfully sent • Top 10% - Successful campaigns (25B emails) • Bottom 10% - Failed campaings (5B emails) We use these two sets as ground truth The Tricks of the Trade: What Makes Spam Campaigns Successful? 10
  • 11. Important settings Good “housekeeping” • Clean up email lists for nonexisting addresses • Limit bots to 5,000 at most Bots have bad Internet connections Instruct bots to retry sending emails multiple times The Tricks of the Trade: What Makes Spam Campaigns Successful? 11
  • 12. Bot country distribution Previous research showed that bots located in certain countries are more expensive [Caballero et al., USENIX 2011] The country of the bots does not influence their spamming capability Successful spammers purchased cheaper bots The Tricks of the Trade: What Makes Spam Campaigns Successful? 12
  • 13. Sanity check on past research Tamper with spammers cleaning up email lists [Stringhini et al., USENIX 2012] Use network errors for spam detection [Kakavelakis et al., LISA 2011] Use geographical distance of bots and victims [Hao et al., USENIX 2009] The Tricks of the Trade: What Makes Spam Campaigns Successful? 13
  • 14. Conclusions Elements that make a spam campaign successful Successful spammers leverage experience rather than advice A wealth of research already targets the important element in a spam campaign We hope that this paper will help researchers in developing techniques that hit spammers where it hurts the most The Tricks of the Trade: What Makes Spam Campaigns Successful? 14