Click trajectories: End-to-end analysis of the spam value chain

Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker, Stefan Savage

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Spam-based advertising is a business. While it has engendered both widespread antipathy and a multi-billion dollar anti-spam industry, it continues to exist because it fuels a profitable enterprise. We lack, however, a solid understanding of this enterprise's full structure, and thus most anti-spam interventions focus on only one facet of the overall spam value chain (e.g., spam filtering, URL blacklisting, site takedown). In this paper we present a holistic analysis that quantifies the full set of resources employed to monetize spam email - including naming, hosting, payment and fulfillment - using extensive measurements of three months of diverse spam data, broad crawling of naming and hosting infrastructures, and over 100 purchases from spam-advertised sites. We relate these resources to the organizations who administer them and then use this data to characterize the relative prospects for defensive interventions at each link in the spam value chain. In particular, we provide the first strong evidence of payment bottlenecks in the spam value chain; 95% of spam-advertised pharmaceutical, replica and software products are monetized using merchant services from just a handful of banks.

    Original languageEnglish (US)
    Title of host publicationProceedings - 2011 IEEE Symposium on Security and Privacy, SP 2011
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages431-446
    Number of pages16
    ISBN (Print)9780769544021
    DOIs
    StatePublished - 2011

    Publication series

    NameProceedings - IEEE Symposium on Security and Privacy
    ISSN (Print)1081-6011

    ASJC Scopus subject areas

    • Software
    • Safety, Risk, Reliability and Quality
    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'Click trajectories: End-to-end analysis of the spam value chain'. Together they form a unique fingerprint.

    Cite this