Addressing SMTP-based Mass-Mailing Activity Within Enterprise Networks

David Whyte
Carleton University
Canada

Paul van Oorschot
Carleton University
Canada

Evangelos Kranakis
Carleton University
Canada

Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such malicious mass mail is an SMTP-engine, which turns an infected system into a malicious mail server. We present a technique that enables, within a single mailing attempt in many popular network environments, detection and containment of (even zero-day) SMTP-engine based mass-mailing activity. Contrary to other mass-mailing detection techniques our approach is content independent and requires no attachment processing, network traffic correlation, statistical measures, or system behavioral analysis. It relies instead on the observation of DNS MX queries within the enterprise network. This stateless detection technique requires minimal computational resources making it ideally suited for real-time wire-speed deployment.

Keywords: Mass-mailing worms, malware, intrusion detection

Read Paper Read Paper (in PDF)