What's clicking what? techniques and innovations of today's clickbots

  • Authors:
  • Brad Miller;Paul Pearce;Chris Grier;Christian Kreibich;Vern Paxson

  • Affiliations:
  • Computer Science Division, University of California Berkeley;Computer Science Division, University of California Berkeley;Computer Science Division, University of California Berkeley and International Computer Science Institute;International Computer Science Institute;Computer Science Division, University of California Berkeley and International Computer Science Institute

  • Venue:
  • DIMVA'11 Proceedings of the 8th international conference on Detection of intrusions and malware, and vulnerability assessment
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

With the widespread adoption of Internet advertising, fraud has become a systemic problem.While the existence of clickbots--malware specialized for conducting click-fraud--has been known for a number of years, the actual functioning of these programs has seen little study. We examine the operation and underlying economic models of two families of modern clickbots, "Fiesta" and "7cy." By operating the malware specimens in a controlled environment we reverse-engineered the protocols used to direct the clickbots in their activities.We then devised a milker program that mimics clickbots requesting instructions, enabling us to extract over 360,000 click-fraud directives from the clickbots' control servers. We report on the functioning of the clickbots, the steps they employ to evade detection, variations in how their masters operate them depending on their geographic locality, and the differing economic models underlying their activity.