Dissecting ghost clicks

作者: Sumayah A. Alrwais , Alexandre Gerber , Christopher W. Dunn , Oliver Spatscheck , Minaxi Gupta

DOI: 10.1145/2420950.2420954

关键词: Internet privacyComputer scienceWeb contentComputer securityRevenueMalware

摘要: FBI's Operation Ghost Click, the largest cybercriminal takedown in history, recently took down an ad fraud infrastructure that affected 4 million users and made its owners 14 USD over a period of four years. The attackers hijacked clicks impressions on victim machines infected by DNS changer malware to earn revenue fraudulently. We experimented with attack when it was operation present detailed account attackers' modus operandi. also study impact this real-world find 37 subscriber lines were impacted our data set. Also, 20 networks 257 legitimate Web content publishers lost while earned convincing dozen other their ads served websites real visitors. Our work expands understanding modalities could help guide appropriate defense strategies.

参考文章(15)
Eric Osterweil, Danny McPherson, Steve DiBenedetto, Christos Papadopoulos, Dan Massey, Behavior of DNS' top talkers, a .com/.net view passive and active network measurement. pp. 211- 220 ,(2012) , 10.1007/978-3-642-28537-0_21
David A. Maltz, Cheng Huang, Keith W. Ross, Jin Li, Chao Zhang, Inflight modifications of content: who are the culprits? usenix conference on large scale exploits and emergent threats. pp. 8- 8 ,(2011)
Brad Miller, Paul Pearce, Chris Grier, Christian Kreibich, Vern Paxson, What's clicking what? techniques and innovations of today's clickbots international conference on detection of intrusions and malware and vulnerability assessment. pp. 164- 183 ,(2011) , 10.1007/978-3-642-22424-9_10
Neil Daswani, Michael Stoppelman, The anatomy of Clickbot.A conference on workshop on hot topics in understanding botnets. pp. 11- 11 ,(2007)
Markus Jakobsson, Zulfikar Ramzan, Crimeware: Understanding New Attacks and Defenses ,(2008)
Bojan Zdrnja, Nevil Brownlee, Duane Wessels, Passive Monitoring of DNS Anomalies Detection of Intrusions and Malware, and Vulnerability Assessment. ,vol. 4579, pp. 129- 139 ,(2007) , 10.1007/978-3-540-73614-1_8
Vern Paxson, Chris Grier, Juan Caballero, Dawn Song, Chia Yuan Cho, Insights from the inside: a view of botnet management from infiltration usenix conference on large scale exploits and emergent threats. pp. 2- 2 ,(2010)
David Dagon, Chris Lee, Wenke Lee, Niels Provos, Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority network and distributed system security symposium. ,(2008)
Nir Kshetri, The Economics of Click Fraud ieee symposium on security and privacy. ,vol. 8, pp. 45- 53 ,(2010) , 10.1109/MSP.2010.88
Hamed Haddadi, Fighting online click-fraud using bluff ads ACM SIGCOMM Computer Communication Review. ,vol. 40, pp. 21- 25 ,(2010) , 10.1145/1764873.1764877