28th March 2003 SPAM Presenter: Matthew Sullivan.

Slides:



Advertisements
Similar presentations
Justin Mason, SpamAssassin Project & Deersoft
Advertisements

Basic Communication on the Internet:
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Dealing With Spam The kind, not the Food product.
Methods for Stopping Spam James Lick
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Chapter 8: Web Server Hardware and Software. Electronic Commerce, Seventh Annual Edition2 Web Server Basics The main job of a Web server computer is to.
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
UC Irvine’s New Anti-Spam Measures Keith Chong Network & Support Programming Network & Academic Computing Services UC Irvine August 9, 2005 Keith Chong.
Understanding the Network-Level Behavior of Spammers Anirudh Ramachandran Nick Feamster.
SPAM Ka Yat, Kei Comp 450 Spring 2008, CSUN. Thesis Statement Thesis Statement---Spam is becoming a bigger issue in the computer world. How do we.
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
Fighting Spam Randy Appleton Northern Michigan University
SPAM WeeSan Lee
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
September 16, 2009 SpamAssassin Way more than the Mac OS X Server GUI shows Presented by: Kevin A. McGrail Project Management Committee Member of the Apache.
Filtering with Open Source Software OLUG – June 7, 2005.
1 RedIRIS Reputation Block List September RedIRIS Reputation Block ListPágina 2 RedIRIS and mail services At the beginning, RedIRIS was directly.
Spam and Anti-Spam By Aditi Desai Yousuf Haider. Agenda Introduction Purpose of Spam Types of Spam Spam Techniques Anti spam Why Spam is so Easy Anti.
WE Can Stop the Spam! June 16, 2003 Author: Mr. Jack P. McHugh Presented by: Nidhi Dalwadi.
Antispam GARR Michele Michelotto Hepix Karlsruhe, 11 May 2005.
How Companies Fight Spamming by Sonya Tormaschy & Marc Eggert E-Commerce: Tuesday & Thursdays; 1:30 – 2:45.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Security and Messaging Matthew Smith Systems Consultant Raven Computers Ltd Security and Messaging Matthew Smith Systems Consultant Raven Computers Ltd.
© Toronto Area Security Klatch 2007 A drop-in anti-spam solution A 15 minute speed talk by Paul Wouters.
(or ?) Short for Electronic Mail The transmission of messages over networks.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Kill Spam Volume IV The integrated scenario Evangelos Moustakas (BA, MSc, MPhil)
Fighting spam by finding and listing Exploitable Servers.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Viruses : Notorious Pests James Barnes II Worms and Viruses Worms and Viruses | Solutions | Worms and Viruses | Myth | Prevention | Final WordSolutions.
v=anwy2MPT5RE By Levi Nichols.
SpamAssassin An Introduction PacNOG I Workshop June 20, 2005 Nadi, Fiji Hervey Allen.
Spam from an ISP perspective Simon Lyall, Ihug Uniforum NZ NetForum Conference July 2003.
Chapter 4 Communicating on the Internet. How Works? Most used Feature TCP breaks & reassembles messages into packets IP delivers packets to the.
Web Content Filtering Mayur Lodha (mdl2130). Agenda  Need of Filtering  Content Filtering  Basic Model  Filtering Techniques  Filtering  Circumvent.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Understanding the network level behavior of spammers Published by :Anirudh Ramachandran, Nick Feamster Published in :ACMSIGCOMM 2006 Presented by: Bharat.
Source pictures for document ”Thoughts about increasing spam annoyance” by License: This material may be distributed only subject.
ISPA’s Antispam Activities Bretton Vine, Future Foundation /
Security fundamentals Topic 9 Securing internet messaging.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
11 Shades of Grey: On the effectiveness of reputation- based “blacklists” Reporter: 林佳宜 /8/16.
The problem of spam from IPv6. Modern filters.
1 AQA ICT AS Level © Nelson Thornes Firewalls and Virus Checkers.
Adding and Modifying Accounts in Microsoft ® Outlook Express ™, and modifying connection settings in Microsoft ® Internet Explorer ™.
A Plan For No Spam WELCOME TO THE SEMINAR ON A Plan For No Spam by.
[1] Control Spam by the Use of Greylisting Torgny Hallenmark LDC - Computing Center Lund University, Sweden TERENA Networking.
Information explosion 1.4X 44X Protect communications.
By: Derek Ton & Alex Pappas.  Most frequently used internet service that you will manage as network administrator.  You need to understand how they.
How dynamic are IP addresses? Yinglian Xie, Fang Yu, Kannan Achan, Eliot Gillum, Moises Goldszmidt, Ted Wobber SIGCOMM ‘07 Chulhyun Park
Spamfilter Relay Mailserver Mark McSweeney CentraLUG, February 1, 2010.
S ECURITY APPLIANCES Module 2 Unit 2. S ECURE NETWORK TOPOLOGIES A topology is a description of how a computer network is physically or logically organized.
Fighting spam by finding and listing Exploitable Servers.
Computer Skills (1) .
Unit 3 Section 6.4: Internet Security
TMG Client Protection 6NPS – Session 7.
CONNECTING TO THE INTERNET
Information Security Session October 24, 2005
Spam Detection Algorithm Analysis
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Spam control Old emphasis: detect spam
Presentation transcript:

28th March 2003 SPAM Presenter: Matthew Sullivan

28th March 2003 What is SPAM...? Spiced Ham UCE (Unsolicited Commercial )..? UBE (Unsolicited Bulk )..?

28th March Austin, Minnesota, in 1937 Hormel Foods. A spicy ham packaged in a ‘handy dandy’ 12-ounce can. Sixty years later, it's still going strong. More than 5 billion cans have been sold. ‘Spam’ or ‘spam’ is the term that should be used to describe unwanted Internet . SPAM is a Registered Trademark of Hormel Foods

28th March 2003 So why did bad get named after a canned meat product? and the notorious Monty Python Gang The Green Midget Café in Bromley … A bunch of loud Vikings...

28th March 2003 Remember SPAM is pronounced: Thank you “A Trademark of Hormel Foods”

28th March 2003 Spam Presenter: Matthew Sullivan

28th March 2003 UBE, UCE or Spam? UBE (Unsolicited Bulk ) UCE (Unsolicited Commercial ) Any Unsolicited or Any Unwanted …?

28th March 2003 What Can be done...? What Should be done...? What can we do as endusers…? What can we do as admins…? What can the law do…?

28th March 2003 Filters Content filters Content filters Baysian Filters Baysian Filters Server side Filters Server side Filters Client side Filters Client side Filters The DELETE key The DELETE key

28th March 2003 Content Filters False Positives Keyword filtering Detecting False Headers Spamassassin - Spamassassin - SpamCop -

28th March 2003 DCC - Distributed Checksum Clearinghouses Vipul's Razor - SpamNet Content Filters

28th March 2003 Bayesian Filters How do they work? Do they really work? Filter projects…

28th March 2003 Blocklists Used to Block or Filter...? Access files or DNSbls..? Which DNSbl...? Do you create your own…?

28th March 2003 DNSbls SPEWS - Spam Prevention Early Warning System SORBS - Spam and Open Relay Blocking System DSBL - Distributed Server Boycott List ORDB - Open Relay DataBase NJABL - Not Just Another Bogus List MAPS - Mail Abuse Prevention System ROKSO - Register Of Known Spam Operations SBL - Spamhaus Block List

28th March 2003 SPEWS Spam Prevention Early Warning System Lists Spammers as they are spotted. Lists Spammers as they are spotted. Lists ISPs who refuse to disconnect Spammers. Lists ISPs who refuse to disconnect Spammers. Good for finding spam history of a Spammer. Good for finding spam history of a Spammer. 3 Levels of blocking.. 3 Levels of blocking.. Level 0 - Spammer gone. Watching… (Not in DNS) Level 0 - Spammer gone. Watching… (Not in DNS) Level 1 - Spammer or blatant spam supporter Level 1 - Spammer or blatant spam supporter Level 2 - All Level 1 plus ‘suspicious’ hosts. Level 2 - All Level 1 plus ‘suspicious’ hosts.

28th March 2003 SORBS Spam and Open Relay Blocking System Is Software that automatically blocks incoming connections. Is Software that automatically blocks incoming connections. Lists Open Proxies and Open Relays Lists Open Proxies and Open Relays Lists Hacked Servers Lists Hacked Servers Lists vulnerable scripts (eg. formmail.pl) Lists vulnerable scripts (eg. formmail.pl) Lists Spammers when spam is received. Lists Spammers when spam is received. Lists ISPs after 3 separate spams are received from Lists ISPs after 3 separate spams are received from the spam spammer or ISP. the spam spammer or ISP. More Later on SORBS

28th March 2003 DSBL Distributed Server Boycott List Lists Open Proxies and Open Relays Lists Open Proxies and Open Relays Lists Hacked Servers Lists Hacked Servers Lists vulnerable scripts (eg. formmail.pl) Lists vulnerable scripts (eg. formmail.pl) Lists Servers sending to Lists Servers sending to Does not perform any testing Itself. Does not perform any testing Itself.

28th March 2003 ORDB Open Relay DataBase Lists verified Open Relays Lists verified Open Relays

28th March 2003 NJABL Not Just Another Bogus List Lists Open Proxies and Open Relays Lists Open Proxies and Open Relays Lists Hacked Servers Lists Hacked Servers Lists vulnerable scripts (eg. formmail.pl) Lists vulnerable scripts (eg. formmail.pl) List Dial-Up/Dynamic Netblocks. List Dial-Up/Dynamic Netblocks. Lists spammers as they send spam to NJABL spamtraps Lists spammers as they send spam to NJABL spamtraps

28th March 2003 MAPS Mail Abuse Prevention System RBL List - Real-Time Blackhole RBL List - Real-Time Blackhole DUL List - Dialup User List (Modem pool Address blocks) DUL List - Dialup User List (Modem pool Address blocks) RSS List - Relay Spam Stopper (Spam relaying Servers) RSS List - Relay Spam Stopper (Spam relaying Servers) Subscription required (Educational Rates Available). Subscription required (Educational Rates Available). Attempts to ‘educate’ spammers & ISPs into stopping spam. Attempts to ‘educate’ spammers & ISPs into stopping spam. Have judgements against them NOT to list some networks. Have judgements against them NOT to list some networks.

28th March 2003 ROKSO Register Of Known Spam Operations Lists Spammers. Lists Spammers. Lists Spam Support Services Lists Spam Support Services Lists Spam gangs Lists Spam gangs Criteria for listing is that the spammer has been Criteria for listing is that the spammer has been identified as being ejected from at least 3 ISPs for spamming.

28th March 2003 SBL Spamhaus Block List Lists Spammers. Lists Spammers. Lists Spam Support Services Lists Spam Support Services Lists Spam gangs Lists Spam gangs Lists other spam sources (like proxies) though this is Lists other spam sources (like proxies) though this is activly published.

28th March 2003 Enduser Filters Spam Killer - Mail Washer - Spam Eater - Microsoft Outlook Express - SpamPal - Mozilla -

28th March 2003 Questions?

Thank You Presenter: Matthew Sullivan