Smtp.ufl.edu Augmentation Project Stephen L. Ulmer CIS4914 April 13, 2004.

Slides:



Advertisements
Similar presentations
Distributed Data Processing
Advertisements

1 Effective, secure and reliable hosted security and continuity solution.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
SAM SPENCER Server Virtualization. Agenda Introduction History Server Virtualization Software Server Virtualization Hardware Determining Server Hardware.
WSUS Presented by: Nada Abdullah Ahmed.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
SmartSoft Network Solutions, Inc.  Project Presentation  21/12/2005.
AVG Internet Security 7.5 Product presentation.
Rendezvous – a DIY VPN (profiting from mobile access to the enterprise) Rendezvous Server ET bjecvalu O.
Secure Messaging Nick Hall & James Clifford Microsoft.
FROM RICHARD RODRIGUES JOHN ANIMALU FELIX SHULMAN THE HONORARY MEMBERS OF THE INTERCONTINENTAL GROUP Information security in real business firewall security.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
High Speed Internet Access At Home Broadband Technologies Security Concerns Hardware/Software Solutions William Kramp 4/12/2001.
Assessing Vulnerabilities ISA 4220 Server Systems Security James A. Edge Jr., CISSP, CISM, CISA, CPTE, MCSE Sr. Security Analyst Cincinnati Bell Technology.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
| University of Missouri Copyright ©2007 MOREnet and The Curators of the University of Missouri Statenet Security on the cheap and easy Beth.
Empirical Analysis of Denial of Service Attack Against SMTP Servers Boldizsár BENCSÁTH, Laboratory of Cryptography and System Security (CrySyS) Budapest.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
SIM334. Internet Comprehensive Protection Multi-Engine Antivirus and Multi layered continuously evolving Anti-spam In the Leader’s quadrant in the.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Winter Consolidated Server Deployment Guide for Hosted Messaging and Collaboration version 3.5 Philippe Maurent Principal Consultant Microsoft.
Viruses, Worms and Spam Definitions Virus - unauthorized software, embedded in other programs and with the ability to propagate when the host program is.
Forefront Security Exchange. Problem Meddelande system och sammarbetsprodukter är underbarar mål för elak kod och “distrubition” av äkta dynga… Viruses.
Deniss Gaplevsky System engineer at inbox.lv. The portal inbox.lv is a leading national e-service in Latvia More than 80% Latvian inhabitants use inbox.lv.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
CERN’s Computer Security Challenge
Nynox.com Nynox Help Desk Affordable Help Desk Solution.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
MIS Week 6 Site:
Internet Information Server © N. Ganesan, Ph.D. All Rights Reserved.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Event Management & ITIL V3
Security at NCAR David Mitchell February 20th, 2007.
Loosely Coupled Parallelism: Clusters. Context We have studied older archictures for loosely coupled parallelism, such as mesh’s, hypercubes etc, which.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
1 Adding Secure and Collaboration to Your Business with SCOoffice Server 4.1.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
MIS Week 6 Site:
Security Unix Mail Services David Funk Systems Administrators Computer Systems Support COE, University of Iowa.
“SaaS secure web and gateways frequently provide efficiency and cost advantages, and a growing number of offerings are delivering an improved.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
Lightspeed is a web-blocking and filtering software program providing safe online security for educational users.
1 Hosted security and continuity. 2 GFI MAX MailProtection overview GFI MAX MailProtection is a cloud-based security solution » Inbound .
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
NetTech Solutions Protecting the Computer Lesson 10.
Module 8 Implementing Security Using Group Policy.
Page ADP Technology Training. 2 Page2 Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All.
Siân Shordon Schools Broadband Manager Schools’ Broadband Service.
1 Presented by: Val Pennell, Test Tool Manager Date: March 9, 2004 Software Testing Tools – Load Testing.
© 2007 IBM Corporation IBM Software Strategy Group IBM Google Announcement on Internet-Scale Computing (“Cloud Computing Model”) Oct 8, 2007 IBM Confidential.
HOW TO CHOOSE THE BEST CLOUD ACCOUNTING SOFTWARE? You can use cloud-based software from any device with an internet connection. Online accounting means.
Spamfilter Relay Mailserver Mark McSweeney CentraLUG, February 1, 2010.
free number
Internet Business Associate v2.0
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
Joseph JaJa, Mike Smorul, and Sangchul Song
Repair Outlook Error 0x800ccc78
Intro to Ethical Hacking
Filtering, Security and Business Continuity
Security Insights: Secure Messaging
Presentation transcript:

smtp.ufl.edu Augmentation Project Stephen L. Ulmer CIS4914 April 13, 2004

Project Summary ● is critical to University workflow ● smtp.ufl.edu is not currently adequate – No UBE (aka SPAM) protection – Service performance is poor – Allows "dangerous" content ● System re-architecture would improve situation

Sources and References Allman, E., G. Shapiro, C. Assman. Sendmail Installation and Operation Guide,Sendmail Inc. and its Suppliers v , (2003) Skoll, David. The MIMEDefang Community Web Site, Roaring Pengin Software (as-of 01 Oct 2003) Misc. The SpamAssassin Wiki, The Internet Community (as-of 12 Jan 2004) Ulmer, S., “SMTP Relay Augmentation Project Charter”, UF CNS (2004)

Work Performed ● Produced detailed Project Plan, approved by CNS Director ● Secured funding – About $70,000 (including staff time) – From multiple sources ● Acquired support from ITAC-ISM

Work Performed ● Built Gentoo Linux cluster to run filtering software – First production Linux cluster at CNS – Significant investment in start-up time ● Existing cluster/installation tools were AIX-centric ● Extension to system management paradigm required – Built with free software, except: ● McAfee Virus Scanner (UF site license) ● IBM's Network Dispatcher (CNS already licensed)

Work Performed ● Separated the filtering engines from the SMTP servers – Allows independent horizontal scaling of major components – Separates low-latency workload from high- throughput workload

New System Architecture ● 3 separate server groups ● All server groups load-balanced

Filtering Engine Components ● MIMEDefang acts as a “framework” ● Other components are used like DLLs ● SpamAssassin uses many different tests

Capacity-Related Errors ● Reduced rate of “ Try again later” ● Reduced average error rate from over 200/minute to less than 1/minute ● Remaining errors caused by remote servers

Message Transfer Rate ● Previous maximum: 300/minute ● Current minimum: 300/minute ● Recent peak: 1400/minute ● Reserve capacity still plentiful

Future Directions ● Actually block SPAM – Block incoming SPAM at a very high confidence – Block all locally generated SPAM ● Use a multi-vendor virus scanning solution ● Commercial SPAM dectection software?