垃圾邮件和僵尸网络声誉随机对照试验和政策

J. Quarterman, Leigh L. Linden, Q. Tang, G. Lee, Andrew Whinston
{"title":"垃圾邮件和僵尸网络声誉随机对照试验和政策","authors":"J. Quarterman, Leigh L. Linden, Q. Tang, G. Lee, Andrew Whinston","doi":"10.2139/ssrn.2242581","DOIUrl":null,"url":null,"abstract":"Designing randomized control trials (RCT) of reputational effects of spam and botnet rankings as proxies for Internet security has interesting challenges. These challenges are related to the policy issues such reputation is intended to address. Building on preliminary results and the public SpamRankings.net top 10 rankings per country by spam volume from two anti-spam blocklists (see TPRC 2012 [1] and 2011 [2] papers), formal RCT experiments provide another level of evidence. However, using RCT with thousands of organizations in treatment and control groups raises numerous difficulties in non-homogeneous legal and organizational regimes and methods of active disclosure of comparable rankins across peer groups. Fortunately most of these difficulties can be turned to advantages, and all have policy implications. These complications compared to RCTs of more traditional econometric one-shot surveys with single publication arise because the subject of these field experiments is the live Internet in real time with ongoing updated treatments. The experimental treatments themselves act as information security (infosec), since their purpose is to use reputation to cause internal improvements in infosec in treated companies. treatments thus must adapt to changes in conditions in the Internet as they happen. Like other infosec, to be effective the treatments must also be portable across departments within treated organizations plus customers and investors, and the experimental team itself crosses Economics, Information Systems, and Computer Science. If the experiments demonstrate statistical evidence that this reputational approach works, such results will provide a new policy approach of reputational rankings, plus the beginnings of tools to apply that approach, ranging from the public treatments themselves to drilldowns into underlying details of the symptoms causing good or bad reputation. Difficulties encountered include: 1) Differing sensitivities of different blocklists to spam from certain sources; sensitivities that change over time as the blocklists adapt to new miscreant behavior. Approach: A weighted composite ranking based on both spam volume and spamming address count from at least two different blocklists. 2) Heterogeneity of legal regimes and other characteristics across countries. Approach: Initial experiments within a single country (the U.S.), perhaps followed by clustered RCT using countries as clusters. 3) Availability of organizational characterization information for stratification by industry (finance, medical, etc.) and within industry (ISPs or hosting, telephone company or cable company, etc.). Approach: Start with the U.S., for which this information is relatively readily available in homogeneous form. 4) Public visibility is necessary for reputation so that customers and investors of treated organizations can see the treatments, yet limits flexibility of experimental treatments, since an ongoing, regularly updated treatment once deployed is hard to retract. Approach: Start with a subset of the universe of spamming organizations and deploy more treatments for other organizations later, plus potential additional treatments for already-treated organizations, while tuning existing treatments like product releases. 5) Spammers or bot herders could choose to migrate away from treated organizations to untreated (control) organizations, interfering with independence of treated and control groups. Approach: Use botnet volume and address data to observe whether this actually happens (potential future work). 6) Miscreants may actively retaliate with DDoS or other attacks. Approach: Harden the treatment websites by hosting them in a cloud provided by a very large organization. 7) Many of the most relevant and we think potentially effective features of this work are nonobvious to many persons skilled in various arts indigenous to at least seven major markets the work must reach, in academia, inside the treated organizations, and in governance. Designing marketing materials and interaction methods to make the nonobvious obvious is a major part of this work. Specifically, drawing connections from spam as a proxy for underlying security issues to organizational benefits of reputational rankings to societal benefits of active disclosure is quite a challenge for a tiny research organization simulating the sales and marketing (and engineering) departments of a large corporation. Approach: Model on rankings comprehensible to everyone (sports scores), use analogies, emphasize benefits, tailor to specific markets where necessary, provide writeups on the most nonobvious features, such as active vs. passive/disclosure. This series of experiments is supported by NSF grants 1228990 and 0831338, and the usual disclaimers apply.","PeriodicalId":412977,"journal":{"name":"ERN: Other Primary Taxonomy (Sub-Topic)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Spam and Botnet Reputation Randomized Control Trials and Policy\",\"authors\":\"J. Quarterman, Leigh L. Linden, Q. Tang, G. Lee, Andrew Whinston\",\"doi\":\"10.2139/ssrn.2242581\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Designing randomized control trials (RCT) of reputational effects of spam and botnet rankings as proxies for Internet security has interesting challenges. These challenges are related to the policy issues such reputation is intended to address. Building on preliminary results and the public SpamRankings.net top 10 rankings per country by spam volume from two anti-spam blocklists (see TPRC 2012 [1] and 2011 [2] papers), formal RCT experiments provide another level of evidence. However, using RCT with thousands of organizations in treatment and control groups raises numerous difficulties in non-homogeneous legal and organizational regimes and methods of active disclosure of comparable rankins across peer groups. Fortunately most of these difficulties can be turned to advantages, and all have policy implications. These complications compared to RCTs of more traditional econometric one-shot surveys with single publication arise because the subject of these field experiments is the live Internet in real time with ongoing updated treatments. The experimental treatments themselves act as information security (infosec), since their purpose is to use reputation to cause internal improvements in infosec in treated companies. treatments thus must adapt to changes in conditions in the Internet as they happen. Like other infosec, to be effective the treatments must also be portable across departments within treated organizations plus customers and investors, and the experimental team itself crosses Economics, Information Systems, and Computer Science. If the experiments demonstrate statistical evidence that this reputational approach works, such results will provide a new policy approach of reputational rankings, plus the beginnings of tools to apply that approach, ranging from the public treatments themselves to drilldowns into underlying details of the symptoms causing good or bad reputation. Difficulties encountered include: 1) Differing sensitivities of different blocklists to spam from certain sources; sensitivities that change over time as the blocklists adapt to new miscreant behavior. Approach: A weighted composite ranking based on both spam volume and spamming address count from at least two different blocklists. 2) Heterogeneity of legal regimes and other characteristics across countries. Approach: Initial experiments within a single country (the U.S.), perhaps followed by clustered RCT using countries as clusters. 3) Availability of organizational characterization information for stratification by industry (finance, medical, etc.) and within industry (ISPs or hosting, telephone company or cable company, etc.). Approach: Start with the U.S., for which this information is relatively readily available in homogeneous form. 4) Public visibility is necessary for reputation so that customers and investors of treated organizations can see the treatments, yet limits flexibility of experimental treatments, since an ongoing, regularly updated treatment once deployed is hard to retract. Approach: Start with a subset of the universe of spamming organizations and deploy more treatments for other organizations later, plus potential additional treatments for already-treated organizations, while tuning existing treatments like product releases. 5) Spammers or bot herders could choose to migrate away from treated organizations to untreated (control) organizations, interfering with independence of treated and control groups. Approach: Use botnet volume and address data to observe whether this actually happens (potential future work). 6) Miscreants may actively retaliate with DDoS or other attacks. Approach: Harden the treatment websites by hosting them in a cloud provided by a very large organization. 7) Many of the most relevant and we think potentially effective features of this work are nonobvious to many persons skilled in various arts indigenous to at least seven major markets the work must reach, in academia, inside the treated organizations, and in governance. Designing marketing materials and interaction methods to make the nonobvious obvious is a major part of this work. Specifically, drawing connections from spam as a proxy for underlying security issues to organizational benefits of reputational rankings to societal benefits of active disclosure is quite a challenge for a tiny research organization simulating the sales and marketing (and engineering) departments of a large corporation. Approach: Model on rankings comprehensible to everyone (sports scores), use analogies, emphasize benefits, tailor to specific markets where necessary, provide writeups on the most nonobvious features, such as active vs. passive/disclosure. This series of experiments is supported by NSF grants 1228990 and 0831338, and the usual disclaimers apply.\",\"PeriodicalId\":412977,\"journal\":{\"name\":\"ERN: Other Primary Taxonomy (Sub-Topic)\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-03-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ERN: Other Primary Taxonomy (Sub-Topic)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2139/ssrn.2242581\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ERN: Other Primary Taxonomy (Sub-Topic)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.2242581","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

设计随机对照试验(RCT)的声誉影响的垃圾邮件和僵尸网络排名作为互联网安全的代理具有有趣的挑战。这些挑战与这种声誉旨在解决的政策问题有关。基于初步结果和公开的SpamRankings.net根据两个反垃圾邮件屏蔽列表(见TPRC 2012[1]和2011[2]论文)按垃圾邮件数量排名的每个国家前10名,正式的随机对照试验提供了另一个层面的证据。然而,在治疗组和对照组的数千个组织中使用随机对照试验,在非同质化的法律和组织制度以及在同伴组中主动披露可比排名的方法方面提出了许多困难。幸运的是,这些困难中的大多数都可以转化为优势,并且都具有政策意义。与更传统的计量经济学单次调查的随机对照试验相比,这些并发症的出现是因为这些现场实验的主题是实时的互联网,正在进行更新的治疗。实验处理本身作为信息安全(信息安全),因为他们的目的是利用声誉,导致内部信息安全在处理公司的改进。因此,治疗方法必须适应互联网环境的变化。与其他信息安全一样,为了使处理方法有效,还必须在被处理组织内部的部门以及客户和投资者之间进行移植,并且实验团队本身跨越了经济学、信息系统和计算机科学。如果实验证明了统计证据表明这种声誉方法是有效的,那么这些结果将提供一种新的声誉排名政策方法,以及应用该方法的工具的开始,从公共治疗本身到对导致好名声或坏名声的症状的潜在细节的深入研究。遇到的困难包括:1)不同的屏蔽列表对来自某些来源的垃圾邮件的敏感度不同;随着黑名单适应新的不法行为,敏感性会随着时间的推移而变化。方法:基于垃圾邮件数量和垃圾邮件地址计数从至少两个不同的黑名单加权复合排名。2)各国法律制度和其他特征的异质性。方法:在单个国家(美国)内进行初步实验,可能随后使用国家作为集群的聚类随机对照试验。3)按行业(金融、医疗等)和行业内(isp或托管、电话公司或有线电视公司等)分层的组织特征信息的可用性。方法:从美国开始,对于美国来说,这些信息相对容易以同质形式获得。4)公众能见度对于声誉是必要的,这样接受治疗的组织的客户和投资者就可以看到治疗方法,但也限制了实验性治疗方法的灵活性,因为一种正在进行的、定期更新的治疗方法一旦部署就很难收回。方法:从垃圾邮件组织的一个子集开始,然后为其他组织部署更多的处理方法,加上对已经处理过的组织的潜在额外处理方法,同时调整现有的处理方法,如产品发布。5)垃圾邮件发送者或bot牧人可以选择从处理组迁移到未处理组(控制组),干扰处理组和控制组的独立性。方法:使用僵尸网络容量和地址数据来观察是否真的发生了这种情况(潜在的未来工作)。6)不法分子可能通过DDoS或其他攻击进行积极报复。方法:通过将治疗网站托管在由大型组织提供的云中来加固它们。7)在学术界、被处理的组织内部和治理中,对于许多精通各种艺术的人来说,这项工作的许多最相关的、我们认为可能有效的特征是不明显的,这些艺术至少要涉及到七个主要市场。设计营销材料和互动方法,使不明显的东西变得明显是这项工作的主要部分。具体来说,对于一个模拟大公司的销售和市场(和工程)部门的小型研究机构来说,将垃圾邮件作为潜在安全问题的代理,与声誉排名的组织利益、主动披露的社会利益联系起来,是一个相当大的挑战。方法:建立每个人都能理解的排名模型(体育比分),使用类比,强调好处,在必要时针对特定市场进行调整,提供最不明显的特征的文章,例如主动vs被动/披露。本系列实验由美国国家科学基金会拨款1228990和0831338支持,并适用通常的免责声明。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Spam and Botnet Reputation Randomized Control Trials and Policy
Designing randomized control trials (RCT) of reputational effects of spam and botnet rankings as proxies for Internet security has interesting challenges. These challenges are related to the policy issues such reputation is intended to address. Building on preliminary results and the public SpamRankings.net top 10 rankings per country by spam volume from two anti-spam blocklists (see TPRC 2012 [1] and 2011 [2] papers), formal RCT experiments provide another level of evidence. However, using RCT with thousands of organizations in treatment and control groups raises numerous difficulties in non-homogeneous legal and organizational regimes and methods of active disclosure of comparable rankins across peer groups. Fortunately most of these difficulties can be turned to advantages, and all have policy implications. These complications compared to RCTs of more traditional econometric one-shot surveys with single publication arise because the subject of these field experiments is the live Internet in real time with ongoing updated treatments. The experimental treatments themselves act as information security (infosec), since their purpose is to use reputation to cause internal improvements in infosec in treated companies. treatments thus must adapt to changes in conditions in the Internet as they happen. Like other infosec, to be effective the treatments must also be portable across departments within treated organizations plus customers and investors, and the experimental team itself crosses Economics, Information Systems, and Computer Science. If the experiments demonstrate statistical evidence that this reputational approach works, such results will provide a new policy approach of reputational rankings, plus the beginnings of tools to apply that approach, ranging from the public treatments themselves to drilldowns into underlying details of the symptoms causing good or bad reputation. Difficulties encountered include: 1) Differing sensitivities of different blocklists to spam from certain sources; sensitivities that change over time as the blocklists adapt to new miscreant behavior. Approach: A weighted composite ranking based on both spam volume and spamming address count from at least two different blocklists. 2) Heterogeneity of legal regimes and other characteristics across countries. Approach: Initial experiments within a single country (the U.S.), perhaps followed by clustered RCT using countries as clusters. 3) Availability of organizational characterization information for stratification by industry (finance, medical, etc.) and within industry (ISPs or hosting, telephone company or cable company, etc.). Approach: Start with the U.S., for which this information is relatively readily available in homogeneous form. 4) Public visibility is necessary for reputation so that customers and investors of treated organizations can see the treatments, yet limits flexibility of experimental treatments, since an ongoing, regularly updated treatment once deployed is hard to retract. Approach: Start with a subset of the universe of spamming organizations and deploy more treatments for other organizations later, plus potential additional treatments for already-treated organizations, while tuning existing treatments like product releases. 5) Spammers or bot herders could choose to migrate away from treated organizations to untreated (control) organizations, interfering with independence of treated and control groups. Approach: Use botnet volume and address data to observe whether this actually happens (potential future work). 6) Miscreants may actively retaliate with DDoS or other attacks. Approach: Harden the treatment websites by hosting them in a cloud provided by a very large organization. 7) Many of the most relevant and we think potentially effective features of this work are nonobvious to many persons skilled in various arts indigenous to at least seven major markets the work must reach, in academia, inside the treated organizations, and in governance. Designing marketing materials and interaction methods to make the nonobvious obvious is a major part of this work. Specifically, drawing connections from spam as a proxy for underlying security issues to organizational benefits of reputational rankings to societal benefits of active disclosure is quite a challenge for a tiny research organization simulating the sales and marketing (and engineering) departments of a large corporation. Approach: Model on rankings comprehensible to everyone (sports scores), use analogies, emphasize benefits, tailor to specific markets where necessary, provide writeups on the most nonobvious features, such as active vs. passive/disclosure. This series of experiments is supported by NSF grants 1228990 and 0831338, and the usual disclaimers apply.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信