异常SMTP讯务与EmailSpam的自动通告课件.ppt

上传人:本田雅阁 文档编号:3285203 上传时间:2019-08-08 格式:PPT 页数:52 大小:629.04KB
返回 下载 相关 举报
异常SMTP讯务与EmailSpam的自动通告课件.ppt_第1页
第1页 / 共52页
异常SMTP讯务与EmailSpam的自动通告课件.ppt_第2页
第2页 / 共52页
异常SMTP讯务与EmailSpam的自动通告课件.ppt_第3页
第3页 / 共52页
异常SMTP讯务与EmailSpam的自动通告课件.ppt_第4页
第4页 / 共52页
异常SMTP讯务与EmailSpam的自动通告课件.ppt_第5页
第5页 / 共52页
点击查看更多>>
资源描述

《异常SMTP讯务与EmailSpam的自动通告课件.ppt》由会员分享,可在线阅读,更多相关《异常SMTP讯务与EmailSpam的自动通告课件.ppt(52页珍藏版)》请在三一文库上搜索。

1、1,異常SMTP訊務與Email Spam的自動通告,中央大學 電算中心 楊素秋 Email: center7cc.ncu.edu.tw,2,大 綱,1.研究動機 2.異常SMTP訊務的監測 3.Spam與異常SMTP訊務的相關 4.Spam 事件的自動通告 5.結論,3,1.研究動機,加速 Email Spam 通告 IP 管理資訊查詢 區網 Routing Table RWhois查詢服務 Spam event 的自動通告 異常SMTP訊務的監測 Flow count 超量 Packet Density 分析超量SMTP傳訊主機與通告spam relay/sender 的相關,4,2.SM

2、TP與 Spam傳訊,SMTP 傳輸 Client詢問DNS MX list,建立信件delivery route 紀錄sender與receiver間的多個mail relay/server 將 reverse-path加入mail header 與SMTP relay建立雙向連接,沿SMTP route傳送信件 relay收進信件後 與下一relay 建立連接/轉送信件. 最後的deliver relay 將信件分送到用戶mailbox.,5,Spam UCE (Unsolicited Commercial Mail) spammer利用自動搜尋程式 持續尋找 newsgroup (BBS

3、 boards) Join mailing list 網頁的mail addresses 所侵入系統的mail account Regular sequence mail account 重複/密集寄送廣告信件,6,Spammer 以最低的成本,透過全球網路傳送超大量廣告信 Internet用戶 花費可觀的連線費用,時間與精力下載/收取/刪除大量spam. ISP 耗費更龐大的網路與系統資源重複傳送junk mails 影響mail的正常收送,7,為避免回覆大量的spam complain Spammer藉由自動搜尋程式 尋找未設防的SMTP server 作為spam relay/sende

4、r 傳送廣告信件往蒐集的newsgroup/mailing list及mail accounts Guess Receipts 甚至透過mail夾檔散播病蟲或攻擊程式 侵入網路主機.集結更大量的感染主機 寄發/轉送更大量的spam.,8,減緩Spam倍數成長的主要途徑 (1)回報/檢舉Spam event 減少一個 spam relay/sender 減少millions of spam (2)監測可能的spammer主機及訊務 SMTP訊務量測 篩選異常訊務量,9,回報/檢舉Spam event 連網中心建立abuse Email帳號 abusedomain, spamdomain, sec

5、uritydomain 接受所轄IP主機的Spam/ Junk通告信. 網路用戶 依據spam route,萃取發送主機與relay servers “Received:”, “From:” 紀錄項 回應給發信主機與relay server擁有者 Report給spam report site EX: ,10,偵測可能的spammer主機及訊務 依據Spam 傳訊特徵,實作異常SMTP訊務的統計 High frequently Obviously high SMTP connection count Repeatedly last for several hours 協助管理者監測異常的mai

6、l訊務 據以Check /var/log/maillog 據以Check user mailbox 預先發現感染主機, 通告用戶修補漏洞,11,通告的Email Spam (2003年 7月至 11月) 桃園區網每月處理的Spam mail通告主機總數. 主要的abuse通告信件 S 通報 廣告郵件的 relay server/sender myNetWatch 通報 CodeRed/Nimda感染主機(80/TCP) SYN Flooding (445/TCP, 17300/TCP, ) 環球或派拉蒙製片 通告侵犯智財權的eDonkey主機及其影片檔存放 Others,12,Table 1

7、通告的區網Abuse主機數分布,13,3異常SMTP訊務的監測,異常SMTP訊務的監測 Spam傳訊特徵 Frequently Obviously high frequency of SMTP connections Repeatedly Last for Many hours (Mean Packet Size) Little than 100 Bytes per Packt More than 100 Bytes per packet,14,Transportation Traffic Logs all network operators depend on the quantifiabl

8、e traffic log data to evaluate the network performance TCPDUMP NetFlow, sFlow Others,15,Tcpdump a raw packet capture program. Gather the layer 4 transportation traffic logs through The dump transport traffic logs involved the detail fields of each IP packet header source/destination IP addresses, so

9、urce/destination application ports, protocol identity, number of packets, number of bytes, TCP operators,16,Netflow router 轉送訊務紀錄 Flow-based layer 4 transport traffic log Source & destination IP address Source & destination application port Source & destination interface# protocol identifier packet

10、count byte count,17,利用Netflow log統計區網的異常SMTP訊務 Accumulate SMTP serv_flow connection counts statistics Netflowlog gathered from router of aggregate network Threshold_100_flow Less than 100 connections: 99.72 % More than 100 connections: 0.28 % Threshold_30_flow Less than 30 connections: 98.61 %,18,Ta

11、ble 2. 區網的SMTP Flows 特徵項分布,19,SMTP訊務的統計/監測 Monitor Abnormal SMTP Traffic of smtp_flowi Combine Several NetFlow features SMTP service port & Src_IP & Dst_IP src_IPdst_IP.(25) src_IP.(25)dst_IP,20,統計/ 監測異常的 SMTP 訊務 累計SMTP 訊務變量 透過 IP protocol_id & application port的比對,累計 flowsmtp_flowi pktsmtp_flowi byt

12、esmtp_flowi 排序/篩選超量的syn_flows訊務 Monitoring SMTP Traffic PHP + Apache,21,22,23,24,Nov 3 20:25:58 smtp3 sendmail7645: ID 801593 mail.info hA3CPot1007645: from=, size=64607, class=0, nrcpts=1, msgid=, proto=SMTP, daemon=MTA, relay=163.25.154.253 Nov 3 20:25:58 smtp3 sendmail7645: ID 801593 mail.info hA

13、3CPot1007645: to=, delay=00:00:06, mailer=relay, pri=30258, stat=queued Nov 3 20:26:45 smtp3 mailscanner3948: Virus W32/Yaha-P found in file ./hA3CPot1007645/disney.zip/DOCUME1DennisLOCALS1Tempsetup.exe Nov 3 20:26:51 smtp3 sendmail7958: ID 801593 mail.info hA3CPot1007645: to=, delay=00:00:59, xdela

14、y=00:00:00, mailer=relay, pri=120258, relay=140.115.17.89 140.115.17.89, dsn=2.0.0, stat=Sent (hA3CP8k1016181 Message accepted for delivery) Nov 3 20:27:00 smtp3 mailscanner3948: Virus W32/Yaha-P found in file ./hA3CPot1007645/disney.zip/DOCUME1DennisLOCALS1Tempsetup.exe,25,26,27,syslog:Oct 26 08:24

15、:25 smtp3 sendmail13433: ID 801593 mail.info h9Q0ON2a013433: from=, size=6998, class=0, nrcpts=1, sgid=, proto=SMTP, daemon=MTA, relay= 216.22.24.81 (may be forged) syslog:Oct 26 08:24:25 smtp3 sendmail13425: ID 801593 mail.info h9Q0ON2a013425: from=, size=6994, class=0, nrcpts=1, sgid=, proto=SMTP,

16、 daemon=MTA, relay= 216.22.24.85 (may be forged) syslog:Oct 26 08:24:25 smtp3 sendmail13435: ID 801593 mail.info h9Q0ON2a013435: from=, size=6971, class=0, nrcpts=1, sgid=, proto=SMTP, daemon=MTA, relay= 216.22.24.81 (may be forged) syslog:Oct 26 08:24:25 smtp3 sendmail13432: ID 801593 mail.info h9Q

17、0ON2a013432: from=, size=6995, class=0, nrcpts=1, sgid=, proto=SMTP, daemon=MTA, relay= 216.22.24.84 (may be forged) syslog:Oct 26 08:24:25 smtp3 sendmail13434: ID 801593 mail.info h9Q0ON2a013434: from=, size=6965, class=0, nrcpts=1, ,28,Mail Relay Testing,mrt ftp:/ mrt test.patterns Test.message ./

18、mrt v test.patterns test.message host_ip_add,29,30,ann# ./mrt -v ./test.patterns ./test.message 163.25.121.245 mrt: 163.25.121.245: Error connecting: Connection refused mrt: 163.25.121.245: Error connecting: Connection refused mrt: 163.25.121.245: Error connecting: Connection refused mrt: 163.25.121

19、.245: Error connecting: Connection refused mrt: 163.25.121.245: Error connecting: Connection refused mrt: 163.25.121.245: Error connecting: Connection refused mrt: 163.25.121.245: Error connecting: Connection refused mrt: 163.25.121.245: Error connecting: Connection refused mrt: 163.25.121.245: Erro

20、r connecting: Connection refused mrt: 163.25.121.245: Error connecting: Connection refused mrt: 163.25.121.245: Error connecting: Connection refused mrt: 163.25.121.245: Error connecting: Connection refused mrt: 163.25.121.245: Error connecting: Connection refused mrt: 163.25.121.245: Error connecti

21、ng: Connection refused mrt: 163.25.121.245: Error connecting: Connection refused mrt: 163.25.121.245: Error connecting: Connection refused mrt: 163.25.121.245: Error connecting: Connection refused,31,ann# ./mrt -v ./test.patterns ./test.message 163.25.70.1 mrt: 163.25.70.1: Message accepted mrt: 163

22、.25.70.1: Message accepted mrt: 163.25.70.1: Message accepted mrt: 163.25.70.1: SMTP error (553) reading MAIL response mrt: 163.25.70.1: Message accepted mrt: 163.25.70.1: Message accepted mrt: 163.25.70.1: Message accepted mrt: 163.25.70.1: Message accepted mrt: 163.25.70.1: Message accepted mrt: 1

23、63.25.70.1: Message accepted mrt: 163.25.70.1: Message accepted mrt: 163.25.70.1: Message accepted mrt: 163.25.70.1: Message accepted mrt: 163.25.70.1: Message accepted mrt: 163.25.70.1: Message accepted mrt: 163.25.70.1: Message accepted mrt: 163.25.70.1: Message accepted mrt: 163.25.70.1: SMTP err

24、or (553) reading MAIL response,32,ann# ./mrt -v ./test.patterns ./test.message 140.115.17.128 mrt: 140.115.17.128: SMTP error (550) reading RCPT response mrt: 140.115.17.128: SMTP error (550) reading RCPT response mrt: 140.115.17.128: SMTP error (550) reading RCPT response mrt: 140.115.17.128: SMTP

25、error (550) reading RCPT response mrt: 140.115.17.128: SMTP error (550) reading RCPT response mrt: 140.115.17.128: SMTP error (550) reading RCPT response mrt: 140.115.17.128: SMTP error (550) reading RCPT response mrt: 140.115.17.128: SMTP error (553) reading RCPT response mrt: 140.115.17.128: SMTP

26、error (553) reading RCPT response mrt: 140.115.17.128: SMTP error (553) reading RCPT response mrt: 140.115.17.128: SMTP error (550) reading RCPT response mrt: 140.115.17.128: SMTP error (550) reading RCPT response mrt: 140.115.17.128: SMTP error (550) reading RCPT response mrt: 140.115.17.128: SMTP

27、error (550) reading RCPT response mrt: 140.115.17.128: SMTP error (550) reading RCPT response mrt: 140.115.17.128: SMTP error (550) reading RCPT response mrt: 140.115.17.128: SMTP error (550) reading RCPT response,33,數據分析,More than 70 % 通告spam relay/sender可由統計的異常SMTP主機佇列中篩選得 異常SMTP/SYN Flooding訊務監測

28、發現Spam & 網路侵擾訊務,34,Table 2 區網Abuse host分布(2003年),35,4 Spam 事件的自動通告,Spam/攻擊訊務通告事件 倍數成長的spam 通告 超量的異常 SMTP Traffic 網路管理者 非常依賴IP管理資訊查詢系統 通告感染主機用戶與管理者,修補系統 自動阻斷攻擊訊務,防堵攻擊訊務的持續擴散,36,spam mail的自動通告系統 自動Query IP管理資訊,Email通告 藉由SNMP pulling router ipRoute MIB, 快速萃取連網的龐大 routing資訊 建立IP管理資訊查詢服務 依據 NextHop integ

29、rate The extracted Routing Table 連線單位通訊資訊檔 RWhois IP管理資料庫,37,ipRoute SNMP MIB 儲存連網單位的routing 資訊 Network address NetMask辨識號 .1.3.6.1.4.21.2.1.11 NextHop 辨識號 .1.3.6.1.4.21.2.1.7 Mansfield G. 曾藉由ipRoute MIB 重複搜尋各層routers ipRoute MIB 自動構建區域網路拓樸,38,重複萃取網段IP位址與對應的 NetMask/ NextHop位址 分別以IP網段位址index,儲存 NetM

30、ask List NextHop List. 結合NetMask ,NextHop 與Segment佇列 快速重建龐大的區網ip_routing 紀錄存檔,39,ipRouteMask OID ip.ipRouteTable.ipRouteEntry.ipRouteMask.192.192.40.0 = IpAddress: 255.255.252.0 ip.ipRouteTable.ipRouteEntry.ipRouteMask.192.192.44.0 = IpAddress: 255.255.255.0 ip.ipRouteTable.ipRouteEntry.ipRouteMask.

31、192.192.45.0 = IpAddress: 255.255.255.0 ip.ipRouteTable.ipRouteEntry.ipRouteMask.192.192.46.0 = IpAddress: 255.255.255.0 ipRouteNextHop OID ip.ipRouteTable.ipRouteEntry.ipRouteNextHop.192.192.40.0 = IpAddress: 203.71.2.72 ip.ipRouteTable.ipRouteEntry.ipRouteNextHop.192.192.44.0 = IpAddress: 192.83.1

32、75.111 ip.ipRouteTable.ipRouteEntry.ipRouteNextHop.192.192.45.0 = IpAddress: 192.83.175.116 ip.ipRouteTable.ipRouteEntry.ipRouteNextHop.192.192.46.0 = IpAddress: 192.83.175.111,40,NextHop Dest. Netmask Seg = 203.72.244.226, 140.115.0.0, 255.255.0.0, 256 203.71.2.5, 140.132.0.0, 255.255.0.0, 256 203.

33、71.2.61, 140.135.0.0, 255.255.0.0, 256 203.71.2.237, 140.138.0.0, 255.255.0.0, 256 203.71.2.209, 192.192.40.0, 255.255.252.0, 4 203.71.2.209, 203.68.52.0, 255.255.252.0, 4,41,IP邏輯位址不包含任何管理資訊 Router藉由routing table的查詢 依據 NextHop 紀錄 switch packet Switch 往正確的 routing interface,42,RWhois分享軟體 利用Mark Koste

34、rsDataBase (MKDB) 支援資料的管理與查詢. 資料庫查詢伺服程式rwhoisd 資料庫建置程式rwhoisd_indexer,43,RWhois Server 藉由IP管理資料庫伺服系統的建置,作為自動通告Spam 的基礎. 讀取routing紀錄,依據Nexthop 紀錄比對/萃取對應的管理聯絡資訊檔 構建RWhois network schema關聯紀錄檔 建立資料庫indexing, 提供管理資訊 query網頁.,44,選取的Network schema特徵 IP-Network(網段位址) Admin-Contact (管理人員) Address(街道地址) Tel(聯

35、絡電話) Updated-By(資料建立者) Updated (資料建立日期,45,46,47,Sendmail 最普遍使用的電子郵件傳送程式 Mail server 藉由sendmail daemon 接受 mail client連接要求 輾轉發送mail到 destination mail server 接收送達的user mail,並轉存到user mail-box 存成 /var/mail/user_name檔.,48,自動化的Spam通告程序 讀取 /var/mail/abuse buffer 檔 依據“From “ 萃取各單封的mail存檔. parsing信件內容,萃取攻擊IP位

36、址. 自動連線RWhois server,查詢IP管理資訊. 依據IP管理資訊, 將萃取的信件內容檔轉送給管理員/用戶mail,49,50,攻擊訊務的自動阻絕與通告,周期地篩選超量攻擊訊務, 萃取攻擊主機IP 依據主機IP,自動連線RWhois server,查詢管理資訊. 依據管理資訊,遠端設定區網 router 限制攻擊主機傳訊,防止超量攻擊訊務的擴散 連接RWhois 查詢伺服主機,查詢管理資訊 自動發信通知管理人員/用戶 協助修補感染的系統,排除攻擊訊務起源.,51,5.結語,異常 SMTP/www DoS訊務的統計 檢測感染主機及Spam senders 主動遏止SMTP干擾訊務. Spam/攻擊事件自動通告機制 提升spam的通告效率 減輕網路管理者處理大量抱怨信的負荷,52,教育網路用戶 提升 mail server被冒用的警覺性 加強異常網路訊務的監測 PING Storm, SYN Flooding, Spam relay 分享網路攻擊模式與防堵經驗,

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 其他


经营许可证编号:宁ICP备18001539号-1