Spam control Old emphasis: detect spam

Slides:



Advertisements
Similar presentations
Anti-SPAM experience at LAL Michel Jouvin LAL / IN2P3
Advertisements

What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Dealing With Spam The kind, not the Food product.
PHAD- A Phishing Avoidance and Detection Tool Using Invisible Digital Watermarking By Sonali Batra Web 2.0 Security and Privacy 2014.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Lisa Farmer, Cedo Vicente, Eric Ahlm
Chapter 8: Web Server Hardware and Software. Electronic Commerce, Seventh Annual Edition2 Web Server Basics The main job of a Web server computer is to.
Preventing Spam: Today and Tomorrow Zane Bonny Vilaphong Phasiname The Spamsters!
© Franz Kurfess Project Topics 1 Topics for Master’s Projects and Theses -- Winter Franz J. Kurfess Computer Science Department Cal Poly.
Preventing Spam For SIP-based Sessions and Instant Messages Kumar Srivastava Henning Schulzrinne June 10, 2004.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
Spam Reduction Techniques Using greylisting and SpamAssassin.
No. 1 anti-spam solution for Exchange/SMTP/Lotus.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Visit for Marketing and Deliverability Tips, Tools, & Trainingwww. Delivered.com.
Antispam GARR Michele Michelotto Hepix Karlsruhe, 11 May 2005.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
GOT SPAM? Spam is the unsolicited or undesired bulk electronic messages. Spam usually contains pornography, viruses, phishing attacks, scams, trojans,
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
Combating Abuse Brian Nisbet NOC Manager HEAnet.
Security and Messaging Matthew Smith Systems Consultant Raven Computers Ltd Security and Messaging Matthew Smith Systems Consultant Raven Computers Ltd.
Anti Phishing & Spam -- by lynn. Spam Anti Spam and How White-lists Black-lists Heuristics –Bayes –Neural Networks Static technique –keyword checking.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
1 1 Best Practices for End Users Anti-Spam Research Group IETF 56 - San Francisco March 20, 2003 John Morris ftp://67.cdt.org/pub/ietf56-asrg-spamreport.ppt.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
Wei Dong and Jan Newmarch June 2005 Session Management for Web Services by using SIP.
1 Tracking an Offender. 2 Communication Between Layers in Different Hosts sender receiver data AH data PH data SH data TH data NH data DH DT data BITS.
By Hina Patel TCM 471 Introduction SPAM? Solicited Unsolicited How spammer gets the address Prevention from spam Conclusion.
The Challenges of Technology Internet Safety. Basic philosophy Messenger services Web sites Social networking sites Monitoring.
ENUM Presentation to Large Business User Panel 26 September 2001 Justin Moore.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Evaluation of Spam Detection and Prevention Frameworks for and Image Spam - A State of Art Pedram Hayati, Vidyasagar Potdar Digital Ecosystems and.
Spam Solutions Group 7 Leo Leung Peter Gorzkowski Seema Yadav Tobby Mathew You’ve Got Mail!
Countermeasures of Spam over Internet Telephony in SIP.edu Campuses with MySQL and LDAP Support Speaker: Chang-Yu Wu Adviser: Dr. Quincy Wu School: National.
C August 24, 2004 Page 1 SMS Spam Control Nobuyuki Uchida QUALCOMM Incorporated Notice ©2004 QUALCOMM Incorporated. All rights reserved.
VENKAT DEEP RAJAN SUMALATHA REDDY KARTHIK INJARAPU CPSC 620 CLEMSON UNIVERSITY.
Source pictures for document ”Thoughts about increasing spam annoyance” by License: This material may be distributed only subject.
1 Spam – a living thing Predicting future evolution based on the past Daniel Raduta.
RUCUS - IETF 71 1 Lessons Learned From IETF Antispam Work Jim Fenton.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
Mobile Multimedia and VoIP Prof. Henning Schulzrinne Andrea Forte · Matthew Mintz-Habib · Takehiro Kawata · Jonathan Lennox · Anshuman Rawat · Ron Shacham.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
 Left Side  Mail/Contacts/Tasks  Labeled Folders  Contacts – “IM” Feature  Right Side  s.
Detection and Mitigation of Spam in IP Telephony Networks using Signaling Protocol Analysis MacIntosh, R Vinokurov, D Advances in Wired and Wireless Communication,
Address Spoofing, DoS, and VoIP Groups 5 and 6. Spoofing, DoS, and VoIP MAC Address Spoofing MAC Address Spoofing IP Spoofing IP Spoofing DNS Spoofing.
Network Services. Domain Controllers: – Used for Account management (e.g. user accounts, group accounts Register Hardware like Printers and PC Authentication.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Server Implementation. NETGATE 2 Netgate2 Spam Firewall and Server deliver the most robust, effective and easy to manage security available.
28th March 2003 SPAM Presenter: Matthew Sullivan.
Spam: An Analysis of Spam Filters Joe Chiarella Jason O’Brien Advisors: Professor Wills and Professor Claypool.
Network Security Solution. 2 Security Gateway Switch Network Security Products  Multi-Homing  VPN/Firewall  SPI Firewall  Anti-Virus  Anti-Spam 
Agenda Spoofing Types of Spoofing o IP Spoofing o URL spoofing o Referrer spoofing o Caller ID spoofing o Address Spoofing.
FUSE MAIL. ABOUT FUSE MAIL Fuse mail provides the business around the world to communicate with confidence. Use cloud based services to provide secure.
Anti-Spam Managing Spam with Kerio Connect
Fortinet VoIP Security June 2007 Carl Windsor.
I S P S loss Prevention.
FUS . For more information regarding fus click on the link mentioned below- support-phone-number.
Welcome to DCISD Technology
A Study On Solutions To Spam
BRIA Android Configuration
BRIA Android Configuration
Spam Detection Algorithm Analysis
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Cpanel for the CS Officer
Filtering, Security and Business Continuity
Wireless Spoofing Attacks on Mobile Devices
Presentation transcript:

Spam control Old emphasis: detect spam black lists, Bayesian content analysis danger: discard non-spam (“false positives”) often easily subverted by spammers CUIT measurements: most SpamAssassin filters are never triggered Also now needed for VoIP (“SPIT”) content-based techniques are not applicable

Spam & phishing prevention Our emphasis: detect ham (non-spam) not content-based Approaches: HTTP extensions for transactional email (Amazon, airlines, ...) and phone calls add response header with related mailto and SIP URLs social and professional networks e.g., outbound email and calls IETF mailing list archives EDAS (most networking researchers) IEEE/ACM member lists vast majority of ham is from users or domains known to receiver domain age (whois) URL lifetime for phishing detection