A Plan For No Spam WELCOME TO THE SEMINAR ON A Plan For No Spam by.

Slides:



Advertisements
Similar presentations
1 Eloqua Providing Industry-Leading Management Tools May 2009.
Advertisements

Eloqua Providing Industry-Leading Management Tools.
Basic Communication on the Internet:
ARP Cache Poisoning How the outdated Address Resolution Protocol can be easily abused to carry out a Man In The Middle attack across an entire network.
Authentication Approaches Phillip Hallam-Baker VeriSign Inc.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Module 6 Implementing Messaging Security. Module Overview Deploying Edge Transport Servers Deploying an Antivirus Solution Configuring an Anti-Spam Solution.
Lecture 23 Internet Authentication Applications
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Security Jonathan Calazan December 12, 2005.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
MIT Info Group, January 19, 2005 Page 1 The CAN-SPAM Act and what it means for MIT communicators MIT Info Group, January 19, 2005 Marsha Sanders Senior.
DDoS Attack and Its Defense1 CSE 5473: Network Security Prof. Dong Xuan.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Mobile IP: Introduction Reference: “Mobile networking through Mobile IP”; Perkins, C.E.; IEEE Internet Computing, Volume: 2 Issue: 1, Jan.- Feb. 1998;
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Spam / Phishing Björn Bittins Sebastian Kühnau FHTW-Berlin.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Wireless and Security CSCI 5857: Encoding and Encryption.
Network Protocols. Why Protocols?  Rules and procedures to govern communication Some for transferring data Some for transferring data Some for route.
Securing Data at the Application Layer Planning Authenticity and Integrity of Transmitted Data Planning Encryption of Transmitted Data.
Masud Hasan Secue VS Hushmail Project 2.
Chapter 6: Packet Filtering
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Module 6 Planning and Deploying Messaging Security.
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Chapter 21 Distributed System Security Copyright © 2008.
Module 9: Fundamentals of Securing Network Communication.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
銳擎智識股份有限公司 銳擎智識股份有限公司 Executive Vice President Richard Chuang
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
C August 24, 2004 Page 1 SMS Spam Control Nobuyuki Uchida QUALCOMM Incorporated Notice ©2004 QUALCOMM Incorporated. All rights reserved.
Detecting Phishing in s Srikanth Palla Ram Dantu University of North Texas, Denton.
SMTP / MIME Florin Zidaru.
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
Bayesian Filtering Team Glyph Debbie Bridygham Pravesvuth Uparanukraw Ronald Ko Rihui Luo Thuong Luu Team Glyph Debbie Bridygham Pravesvuth Uparanukraw.
Security fundamentals Topic 9 Securing internet messaging.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
ACCOUNT ADMINISTRATION. Objectives In this session you will learn how to: –Create Business Units. –Create new users and manage security settings. –Configure.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Introduction Wireless devices offering IP connectivity
TMG Client Protection 6NPS – Session 7.
Presentation transcript:

A Plan For No Spam WELCOME TO THE SEMINAR ON A Plan For No Spam by

Introduction  Unwanted and irrelevant mass mailings, commonly known as spam are becoming a serious nuisance that if left unchecked may soon be regarded as a Denial of Service Attack against the infrastructure of the Internet itself.  The term spam is derived from a Monty python sketch set in a cafeteria in which the principal protagonists have difficulty making them heard about a group of Vikings singing. "SPAM" in honor of the meat product manufactured by Hormel

 An ideal spam control would have the following properties  Eliminate all unwanted mails  Require no user input on the part of either the sender or the receiver.  Be compatible with all uses of mail.  Be compatible with all infrastructure configurations.  Be scalable, that is remain effective if 90% of internet users adopt it.  Resist attempts to evade it.  Create no new problems Ideal Spam Control System Properties

 Perhaps the most important anti-spam measure to date has been the adoption of acceptable use policies that prohibit sending of spam by Internet service providers of all types.  Such use policies do not just protect the other users of the Internet; they protect the Internet service provider against abuse by their own users.  In a recent case a university discovered that some of its students had been renting out the use of their machines to spam senders, seriously degrading the network service for all the users Acceptable Use policies

 One of the major problems caused by spam is positive identification as spam of legitimate s  This is a particular problem with commercial mailing lists and newsletter messages requested by the recipient which frequently carry advertising and make use of content that is likely to be flagged by content inspection filters as spam  One possible solution to this problem would be to add some form of authentication mechanism that communicated the recipient's consent to the mail infrastructure  Another option would be to distribute this form of content using the pull model of the Web [HTTP] and NNTP [NNTP] rather than the push model of the Pull Vs Push

 Many spam messages carry a 'click here to Opt-Out' option.  The research by the FTC has demonstrated that large proportion of these Opt-Out options are bogus and it is not possible for the user to connect to the Opt-Out site  Opt-Out schemes of this type are unacceptable however, even if spam senders observe them since the spam victim is required to Opt-Out with each spam sender individually  Opt-Out lists are proven to be of value in controlling the volume of unsolicited mail and unsolicited telephone calls from legitimate businesses  The most powerful argument against Opt-Out lists is that it is likely that spam senders would routinely abuse lists of Opted-Out addresses as the source of addresses Opt-Out and Do-Not-Spam lists

 One of the major difficulties faced with distinguishing legitimate bulk senders from illegitimate ones is the difficulty of determining whether the claims made that the bulk sender observes a particular set of best practices is true or not.  This problem also faces the bulk senders themselves.  At present there is no way that a outsourced provider of bulk mail services can tell if the addresses on a list a customer wants used for a mailing have intact Opted-In as is claimed.  Technical mechanisms are required that enable this form of accountability to be achieved Accountability

 Naive Keyword Inspection  Naive Language Inspection  Keyword Inspection with Statistical Techniques  Keyword Inspection with User Feedback  Keyword Inspection with Dynamic Update  Dynamic Template Response / Fuzzy Matching / Checksums Content Inspection

 Authentication techniques are broadly divided into two types, Network based and Crypto graphically based  Network based If a mail server knows the set of all possible IP addresses from which an with a particular sender address is known the IP addresses may be used to provide a light weight means of authenticating the sender. This mechanism is not completely reliable since an IP address is a valid source for a particular sender address This approach only works if the is sent via a mail relay that is configured with reverse DNS entries for the domain of the sender address. Authentication

 An extension to the SMTP protocol allows the use of the Secure Socket Layer via the START TLS operations allows authentication of both the sending and receiving servers using X.509 digital certificates.  Although SSL allows the relay to use any IP address without the need for configuration of a reverse DNS address the sender must send their outgoing mail.  Cryptographic S/MIME S/MIME provides end to end authentication of the sender address and message body. The sender need not send their message through any specific relay Cryptographic SSL

 Prosecutions and Litigation under Existing Legislation  Spam Litigation  Anti-spam Legislation  Pro-Spam Legislation Legislation And Litigation

 A substantial proportion of spam is illegal under the existing laws.  Spam senders also violate law in their methods.  Use of false sender address is an attempt to gain access to a computer system by fraud.  A false sender address that impersonates another party is a form of identity theft and may also be actionable as defamation Prosecutions and Litigation under Existing Legislation

 Unsolicited call back request to be identified and suppressed.  Mail servers to communicate the results of server based authentication and filtering procedures to mail clients.  Mail clients to cause mail servers to apply filtering at the server  Mail clients to disable server based filtering  Support for lightweight authentication mechanisms to be applied at the server level Protocol changes to facilitate spam measures

 A means of advertising authentication policy through the DNS  A lightweight authentication mechanism that can be deployed with minimal overhead  Definition of a standard call back mechanism that allows a mail client to automatically detect call back loop requests that were initiated by the client and those that result from a message sent with a forged header Authentication Mechanisms

 Mechanisms identifying messages sent through a mailing list and the means by which the subscription can be cancelled.  Mechanism that allows a mail server to determine that an user solicited a message from a particular mailing list or other bulk sender  Authenticated subscription management mechanism  Mechanism for communicating the authenticated mailing list subscription mechanisms to clients.  Mechanisms for identifying automatically generated messages that should not be replied to under any circumstances.  Means of determining that an client confirms to a consistent means of implementing the above Mailing List Management

Comprehensive Management

 Denial Of Service attack typically targets a single site or a small group of sites.  It is likely therefore that in most cases the source of information for the denial of service blacklist would be information collected at the site itself. Denial Of Service Black List

 It is recommended that spam blacklists be used as one input to the content filtering decision making process than to provide an accept/deny decisions.  In particular end users should not be deprived of wanted messages because they are send from a source address that has been listed to create ‘collateral damage’ as a means of establishing leverage to cause an ISP to change policy.  In most cases neither the sender nor the receiver has direct influence over these policies and the annoyance caused to the use of these tactic is almost certain to be greater than that caused by the spam itself Spam Sender Blacklist

 The authorized sender white lists will typically be based on information configured locally from lists of known customers, suppliers and partners.  In cases where robust authentication techniques such as digital certificates are used, it may prove adequate to list exceptions to the white lists.  The use of feedback from end users is highly recommended to assist in the maintenance of the black lists and white lists and in the configuration of the content inspection processor.  This feedback may employ Bayesian inference, least squares minimization etc Authorized Sender Whitelist

Conclusion  Do not send lists, protected using one-way encryption provide an objective definition of a spam message.  Legislative initiatives provide a means of increasing the costs of the spam senders and reducing the profitability of their enterprise.  Content inspection provides a means of identifying undesirable messages that can be deployed with immediate advantage to the user  Authentication provides a means of identifying desirable messages that allows the problem of false positives associated with content inspection to be reduced and with widespread deployment offers the possibility of a comprehensive solution  Authentication policy provides a means of knowing that a message that does not meet the Authentication policy specified by the domain name owner has been forged and should be discarded as spam

 Callback loop authentication is acceptable as a last resort when a message has been identified as likely spam. it use as a first line of defense is not acceptable.  Protocol improvements provide support for the content inspection and authentication mechanisms and should be pursued aggressively.  Spam is a security problem.  It is the lack of authentication and authorization in the system that allows sit to be abused for any purpose spam is a community problem and it is the internet community as a whole that must find, implement and deploy solutions

References  Paul Graham, A Plan for Spam  Paul Graham, Better Bayesian Filtering  Microsoft corp. Microsoft Junk Filter Read me  R. Fielding, J. Getty’s, Mogul.H, Frystyk, L. Manister, P.Leach and T.Berners-Lee, Hypertext Transfer Protocol-HTTP 1.1.RFC  Kantor, B. and P.Lapsley,"Network News Transfer Protocol",RFC  Dave Winer, RSS  Postel. J,"Simple Mail Transfer Protocol",STD 10,RFC 821,ISI

Thank You