Title
Spamming botnets: signatures and characteristics
Abstract
In this paper, we focus on characterizing spamming botnets by leveraging both spam payload and spam server traffic properties. Towards this goal, we developed a spam signature generation framework called AutoRE to detect botnet-based spam emails and botnet membership. AutoRE does not require pre-classified training data or white lists. Moreover, it outputs high quality regular expression signatures that can detect botnet spam with a low false positive rate. Using a three-month sample of emails from Hotmail, AutoRE successfully identified 7,721 botnet-based spam campaigns together with 340,050 unique botnet host IP addresses. Our in-depth analysis of the identified botnets revealed several interesting findings regarding the degree of email obfuscation, properties of botnet IP addresses, sending patterns, and their correlation with network scanning traffic. We believe these observations are useful information in the design of botnet detection schemes.
Year
DOI
Venue
2008
10.1145/1402958.1402979
SIGCOMM
Keywords
Field
DocType
false positive rate,regular expression,spam,botnet
Cutwail botnet,Rustock botnet,Srizbi botnet,Computer science,Botnet,Computer security,Asprox botnet,Computer network,Obfuscation,Spamming,Payload
Conference
Volume
Issue
ISSN
38
4
0146-4833
Citations 
PageRank 
References 
184
9.68
22
Authors
6
Search Limit
100184
Name
Order
Citations
PageRank
Yinglian Xie1114076.73
Fang Yu273342.23
Kannan Achan342535.52
Rina Panigrahy43203269.05
Geoff Hulten51923108.90
Ivan Osipkov626213.70