A Study On Solutions To Spam

Slides:



Advertisements
Similar presentations
Anti-SPAM experience at LAL Michel Jouvin LAL / IN2P3
Advertisements

1 Effective, secure and reliable hosted security and continuity solution.
Kalpesh Vyas & Seward Khem
Basic Communication on the Internet:
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Controlling Spam through Lightweight Currency Proceedings of the Hawaii International Conference on Computer Systems Honolulu HI Jan 2004 David A. Turner.
Dealing With Spam The kind, not the Food product.
IMF Mihály Andó IT-IS 6 November Mihály Andó 2 / 11 6 November 2006 What is IMF? ­ Intelligent Message Filter ­ provides server-side message filtering,
Introduction to Your Name Goes Here
FROM RICHARD RODRIGUES JOHN ANIMALU FELIX SHULMAN THE HONORARY MEMBERS OF THE INTERCONTINENTAL GROUP Information security in real business firewall security.
Server Upgrade From UW to Cyrus. What is an IMAP Server? Provides access to your mail messages stored on the mail server Requires authentication.
Distributed Systems and the WWW Extending the Capability of Massively Multiplayer Online Games by Introducing Distributed Systems as World Servers Jason.
Defense System (EDS). The problem today 15,000,000 virus-infected messages and millions of junk messages go across the NU Network.
3.06 Understand the use of direct marketing to attract attention and to build brand.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
Exchange deployment at CERN and new ideas for SPAM fighting Michel Christaller, Emmanuel Ormancey, Alberto Pace.
CT NIKHEF Nov Mail NIKHEF CT system support.
IP Blacklisting Causes & Solution Marcus Low, R&D Director InternetNow International Sdn Bhd.
3.06 Understand the use of direct marketing to attract attention and to build brand.
Marketing -Tehnical aspects-. marketing – technical aspects Every marketing and newsletter platform that you consider(contracted or.
management solutions Crossware Mail Signature Branding and Compliance Made Easy for Lotus Notes Server Install Options.
Information Technology Services 1 Copyright Copyright Marc Wallman and Theresa Semmens, This work is the intellectual property of the authors. Permission.
Securing Exchange Server Session Goals: Introduce you to the concepts and mechanisms for securing Exchange Examine the techniques and tools.
Combating Abuse Brian Nisbet NOC Manager HEAnet.
Microsoft Office 2003 – Outlook 2003 features Bradley Witham Technical Services Supervisor ITS.
Module 8: Managing Client Configuration and Connectivity.
Department of Computer Sciences The University of Texas at Austin Zmail : Zero-Sum Free Market Control of Spam Benjamin J. Kuipers, Alex X. Liu, Aashin.
and VOIP. Definitions Storage- the action or method of storing something for future use. Forward system- Address book- A book for recording the.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Jocelyn Cloutier Michael Kocheisen Jean Tessier Francois McNeil 6/8/99.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
A Technical Approach to Minimizing Spam Mallory J. Paine.
Outlook 2007 basics. Create an account An account must be created before sending/receiving . Follow these steps to create an account:
Setting Up a PMX Filter with Bates Webmail Makes Easier to Read!!! Information & Library Services.
EEPOS – Complete Enterprise Archive Solution Trillian Infosüsteemid Ltd Kahro Raie June
Spam Solutions Group 7 Leo Leung Peter Gorzkowski Seema Yadav Tobby Mathew You’ve Got Mail!
COEN 445 Communication Networks and Protocols Lab 5
Outlook 2003 Rules Creating/Modifing Rules Junk By sender By receipient By Subject By John Marcus – Presentation.
Introduction to Student Name Student Class.
SpamIQ Free spam analysis and data mining tool. Objective: Provide ISPs and network operators good analysis tools to analyze and understand spam traffic.
Bayesian Filtering Team Glyph Debbie Bridygham Pravesvuth Uparanukraw Ronald Ko Rihui Luo Thuong Luu Team Glyph Debbie Bridygham Pravesvuth Uparanukraw.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
11 MICROSOFT OFFICE OUTLOOK 2003 AND MICROSOFT OUTLOOK EXPRESS Chapter 4.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
10.1 Communicate with other ICT users using
Spam Wrangling on UC Berkeley's CalMail. Spam detection CalMail uses Sophos PureMessage, running on CommuniGate Pro's front-end servers PureMessage.
how to configure Gmail account in MS Outlook 2010 account?
ORGANIZING . 1.Sort messages quickly. 2.Group similar messages in folders or labels. 3.Route mail efficiently to specific folders or labels. 4.Reduce.
FUSE MAIL. ABOUT FUSE MAIL Fuse mail provides the business around the world to communicate with confidence. Use cloud based services to provide secure.
3.06 Understand the use of direct marketing to attract attention and to build brand.
TMG Client Protection 6NPS – Session 7.
Introduction to Your Name Goes Here
Yahoo Mail Support Helpline USA
Hotmail Customer Support Number Toll Free Number.
3.06 Understand the use of direct marketing to attract attention and to build brand.
3.06 Understand the use of direct marketing to attract attention and to build brand.
Call Now Yahoo Problem Support Number
MIGRATION.
3.06 Understand the use of direct marketing to attract attention and to build brand.
Introduction to Your Name Goes Here
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Management Suite v2.0 DoubleCheck Manager Management Suite v2.0.
iOS Alert Ivo Georgiev George Emilov Stephane Petrov
Filtering, Security and Business Continuity
3.06 Understand the use of direct marketing to attract attention and to build brand.
Presentation transcript:

A Study On Solutions To Spam Erik Neff December 3, 2003

Problem: Too many junk mails A hassle for email recipients Fills up inboxes Costs ISPs to deliver Creates reason to hack into mail servers Projected number of spam messages, per person per year. - Jupiter Media Matrix

Thesis “I hypothesize that the best solution will be a rule-based solution that is individually configurable by the e-mail subscriber. The reason being that the user will maintain complete responsibility at a minimal effort and can modify the solution’s functionality to tailor its capabilities to individual needs. “

Methodology Examine spam solutions: Subjectively Compare US Federal/State Anti-spam laws Client Mail Filters (SpamAssassin) Server/Gateway Filters (Sophos) Bayesian Filters Charging for emails Protocol Change (TRIPOLI) Subjectively Compare

Analysis Criteria Dollar costs Ease of Deployment & Scalability Effectiveness Ability to Enforce False positives Network traffic Manual intervention required User friendliness

References http://spam.abuse.net/userhelp/ http://www.mindworkshop.com/alchemy/nospam.html http://www.arachnoid.com/lutusp/antispam.html http://www.sophos.com/products/pm/ http://au2.spamassassin.org/index.html http://www.pfir.org/tripoli-announce http://www.inboxlock.com/spam.html http://www.spamlaws.com/