Temporal correlations between spam and phishing websites

  • Authors:
  • Tyler Moore;Richard Clayton;Henry Stern

  • Affiliations:
  • Center for Research on Computation and Society, Harvard University;Computer Laboratory, University of Cambridge;Cisco IronPort Systems LLC

  • Venue:
  • LEET'09 Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

To implement a phishing scam, attackers must create a fake website and send spam to attract visitors. To date, empirical research into phishing's impact has studied either the spam being sent or the website lifetimes. In this paper, we examine both phishing websites and the associated spam to gauge the overall effectiveness of phishing attack and defense. We find that while the bulk of spam is sent around the time of the website's first appearance, spam continues to be sent for many longer lived websites until they are finally removed. We also find that attackers using 'fast-flux' techniques are savvier than ordinary attackers, sending out more spam prior to detection and stopping faster once the websites are taken down. Finally, we conclude that fast-flux attacks pose the greatest phishing threat since they account for 68% of spam despite comprising just 3% of hosts.