2013 Proceedings IEEE INFOCOM 2013
DOI: 10.1109/infcom.2013.6567184
|View full text |Cite
|
Sign up to set email alerts
|

SpamTracer: How stealthy are spammers?

Abstract: The Internet routing infrastructure is vulnerable to the injection of erroneous routing information resulting in BGP hijacking. Some spammers, also known as fly-by spammers, have been reported using this attack to steal blocks of IP addresses and use them for spamming. Using stolen IP addresses may allow spammers to elude spam filters based on sender IP address reputation and remain stealthy. This remains a open conjecture despite some anecdotal evidences published several years ago.In order to confirm the fir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 14 publications
0
10
0
Order By: Relevance
“…Our system to detect malicious BGP hijacks was partly designed upon findings of previous studies on the root causes of BGP hijack events, like Ramachandran et al's study [1] on short-lived BGP announcements, the correlation between BGP hijack alerts and spam by Hu et al [2] and a validated hijack case performed by a spammer described by Vervier et al in [12] and by Schlamp et al in [13]. Comparing our findings presented in Section III with those reported in previous work quickly led us to the conclusion that the Bulgarian Case was indeed a malicious BGP hijack.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…Our system to detect malicious BGP hijacks was partly designed upon findings of previous studies on the root causes of BGP hijack events, like Ramachandran et al's study [1] on short-lived BGP announcements, the correlation between BGP hijack alerts and spam by Hu et al [2] and a validated hijack case performed by a spammer described by Vervier et al in [12] and by Schlamp et al in [13]. Comparing our findings presented in Section III with those reported in previous work quickly led us to the conclusion that the Bulgarian Case was indeed a malicious BGP hijack.…”
Section: Discussionmentioning
confidence: 99%
“…In Section II we present the methodology and the experimental environment we have setup to study at large scale the existence and prevalence of malicious BGP hijacking events. It extends on the previous work [12] with a control/routing plane based detection of prefix ownership attacks, a routing consistency analysis using Internet Routing Registries and an analysis of the network traffic from suspect hijacked networks using NetFlow data. In Section III we perform an in-depth analysis of a real case where suspicious routing events were correlated with spam and web scam traffic strongly suggesting a BGP hijack performed for malicious purposes.…”
Section: Introductionmentioning
confidence: 90%
See 3 more Smart Citations