Introduction to the Anti-Spam Research Group (ASRG) Presented by Yakov Shafranovich, ASRG Co-chair NIST Spam Technology Workshop Gaithersburg, Maryland,

Slides:



Advertisements
Similar presentations
11/2/2013 2:02:38 AM 5864_ER_FED 1 Importing Certificates into Lotus Notes R6.
Advertisements

1 Eloqua Providing Industry-Leading Management Tools May 2009.
Eloqua Providing Industry-Leading Management Tools.
Who cares about abuse? Rodney Tillotson, JANET-CERT APNIC, August 2001 United Kingdom Education & Research Networking Association.
IETF Bridge WG Transition to IEEE WG Dave Harrington Dan Romascanu This presentation will probably involve audience discussion, which will create.
An Anti Spam Action Strategy John Haydon, Australian Communications Authority.
Anti-SPAM activities in Malaysia - Current Situation, Regulatory Environment and Future Developments ITU virtual conference on anti-spam regulation and.
IP Warming Overview and Implementation Using Eloqua.
© 2012 Eloqua, Inc. Confidential 1 Deliverability and IP Warming Overview and Implementation Using Eloqua.
2/16/2004Sergei Sadilov PH/SFT 1 Bonsai in Integration Testing of Geant4 This presentation will probably involve audience discussion, which will create.
This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these action items during.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
Project Status Chemical Engineering Lab Scheduler Team 5 This presentation will probably involve audience discussion, which will create action items. Use.
Project Status Group B-4 This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these.
Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and.
Hospital Management System A complete solution for Hospital Services and Activity This presentation will probably involve audience discussion, which will.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Management of the Internet
Hands-On Microsoft Windows Server 2008 Chapter 8 Managing Windows Server 2008 Network Services.
Visit for Marketing and Deliverability Tips, Tools, & Trainingwww. Delivered.com.
Review of Last Session Search Engine Optimisation (SEO) Search Engine Optimisation (SEO) You can fine-tune your site so that the search engines notice.
Identity Based Sender Authentication for Spam Mitigation Sufian Hameed (FAST-NUCES) Tobias Kloht (University of Goetingen) Xiaoming Fu (University.
CRESR - Sheffield Hallam University 1 Same Train, Different Compartments: the EES and Structural Fund Programmes in the Regions Dr Tony Gore CRESR Sheffield.
Integrating Technology into Business classes Michael Wong April 24, 2002 This presentation will probably involve audience discussion, which will create.
Patented Medicines Regulations Review of Reporting Changes Ginette Tognet, Béatrice Mullington & Marc Legault Compliance and Enforcement Branch Montréal,
© 2007 Convio, Inc. HOW TO: Best Practices for Sending to Organizations Confidential for use by American Cancer Society and Convio – Copyright ©
IETF Bridge WG Transition to IEEE WG Dave Harrington Dan Romascanu This presentation will probably involve audience discussion, which will create.
Ecuador National Executive Committee INTERNATIONAL YEAR OF VOLUNTEERS 2001 IN ECUADOR "NATIONAL EXECUTIVE COMMITTEE" This presentation will probably involve.
Anti-Spam Research Group (ASRG) 56 th IETF Meeting March 20, 2003 Paul Q. Judge.
Computer Science Program Center for Entrepreneurship and Information Technology, Louisiana Tech University This presentation will probably involve audience.
Certified Server Validation (CSV) “ An MTA is talking to me directly. Are they OK?” D. Crocker Brandenburg InternetWorking mipassoc.org/csv 10/8/2015 6:36.
A Trust Overlay for Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg.
Message Authentication Signature Standards (MASS) BOF Jim Fenton Nathaniel Borenstein.
Protecting Students on the School Computer Network Enfield High School.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
CS 858 – Hot Topics in Computer and Communications Security Winter 2009 Introduction.
Mid Term Report Integrated Framework, Visualization and Analysis of Platforms This presentation will probably involve audience discussion, which will create.
National obligations and Commitments Compiled with UNFCCC [Metodija Dimovski] [UNFCCC National Focal Point] [Head of Department of European Integration]
A Retrospective on Future Anti-Spam Standards Internet Society of China Beijing – September, 2004 Dave Crocker Brandenburg InternetWorking
C August 24, 2004 Page 1 SMS Spam Control Nobuyuki Uchida QUALCOMM Incorporated Notice ©2004 QUALCOMM Incorporated. All rights reserved.
US Department of Health and Human Services Health Resources And Services Administration Maternal And Child Health Bureau Diana Denboba This presentation.
ATS Message Handling System (AMHS)/ System Wide Information Management (SWIM) Workshop and the Seventh Meeting of Aeronautical Telecommunication Network.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
CSC 532 Term Paper Topic decision: 10/10/02 This presentation will probably involve audience discussion, which will create action items. Use PowerPoint.
Source pictures for document ”Thoughts about increasing spam annoyance” by License: This material may be distributed only subject.
Conficker Update John Crain. What is Conficker? An Internet worm  Malicious code that is self-replicating and distributed over a network A blended threat.
Lesson 15 : Networks And The Internet
THE BOOK BANK MAKERERE UNIVERSITY LIBRARY This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to.
Spam. Is spam a problem? Bandwidth hogging -> slower, costlier Discourages use of net ( , e-commerce) Productivity -> loss of time and money Receiver.
Bridge WG Status Report David Harrington Dan Romascanu This presentation will probably involve audience discussion, which will create action items. Use.
1 M&V Cx Working Group Report New York City - M&V Summit Steve Dunnivant - Chair This presentation will probably involve audience discussion, which will.
Rob Blokzijl. RIPE 61 Rome, November RIPE Réseaux IP Européens Rob Blokzijl RIPE Chairman
I SPCon 2003 – Evaluating Spam Control SolutionsBrandendenburg.com / 1 Points of Control UA = User Agent MTA = Message Transfer Agent o =originator.
Electronic Engineering Dept.1 Final Year Project - Progress Presentation Wifi Controlled Robotics Mark Heneghan This presentation will probably involve.
X-ASVP Technical Overview eXtensible Anti-spam Verification Protocol X-ASVP Committee Technical Working Group July 22, 2007.
Project Status [Project Name] [Presenter Name] This presentation will probably involve audience discussion, which will create action items. Use PowerPoint.
Florida Athlete Leadership Technology 1 Presenters:
THE LARGEST NAME SERVICE ACTING AS A PHONE BOOK FOR THE INTERNET The Domain Name System click here to next page 1.
THE ROLE AND PLACEMENT OF FOREIGN LANGUAGE TEACHING IN TRAINING ENTERPRISING This presentation will probably involve audience discussion, which will create.
Continuous Random Variables
Final Project Presentation
Martha Grabowski LeMoyne College
واشوقاه إلى رمضان مرحباً رمضان
Evaluation of Data Fusion Methods Using Kalman Filtering and TBM
Continuous Random Variables
Dartmouth College Status Report
This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these action items during.
Minnesota Counties Computer Consortium(MCCC) Community Registry
G4 Workshop 2002 Detector Description Parallel Session
Presentation transcript:

Introduction to the Anti-Spam Research Group (ASRG) Presented by Yakov Shafranovich, ASRG Co-chair NIST Spam Technology Workshop Gaithersburg, Maryland, February 17 th, 2004 This presentation will probably involve audience discussion, which will create action items. Use PowerPoint to keep track of these action items during your presentation In Slide Show, click on the right mouse button Select “Meeting Minder” Select the “Action Items” tab Type in action items as they come up Click OK to dismiss this box This will automatically create an Action Item slide at the end of your presentation with your points entered.

02/17/2004Copyright © 2004 ISOC2 Table of Contents 1. IETF and IRTF 2. Goals of the ASRG. 3. Some Causes of Spam. 4. ASRG Research Agenda. 5. Current Status. 6. Selected Proposals.

02/17/2004Copyright © 2004 ISOC3 1. IETF and IRTF  Internet Engineering Task Force (IETF) focuses on the short-term issues of engineering and standards making Operates more formally Consists of 100+ working groups working on Internet standards  Internet Research Task Force (IRTF) focuses on long-term research issues related to the Internet Operates more informally Consists of 12 research groups doing research on Internet related issues

02/17/2004Copyright © 2004 ISOC4 2. Goals of the ASRG.  Research into Internet-wide solutions to mitigate the sending and effects of spam  Pre-Standards work for the IETF  Focus on technical but may consider tools and techniques to aid the implementation of legal and other non-technical anti-spam measures

02/17/2004Copyright © 2004 ISOC5 3. Some Causes of Spam.  Social Causes: Same criminal and malicious behavior as regular society Lack of sufficient funding for legal enforcement  Lack of Expertise Among End Users: Makes hijacking of computers easier Users do not care about securing computers  Economic Nature of the Internet: Cheap communications medium Low cost can be used for good and bad  Lack of Cooperation Among Network Operators: Inability to communicate blocking Unwillingness to deal with abuse reports

02/17/2004Copyright © 2004 ISOC6 4. ASRG Research Agenda.  Problem Analysis  Improving Existing Solutions  Proposing New Solutions

02/17/2004Copyright © 2004 ISOC ASRG Research Agenda.  Problem Analysis includes: Inventory of Problems - analysis of spam- related problems Analysis of Current Solutions - inventory and analysis of current anti-spam solutions, their weaknesses and effectiveness Analysis of Spam - analysis of persistent patterns in spam and spammer behavior that can be used to improve existing and propose new solutions

02/17/2004Copyright © 2004 ISOC ASRG Research Agenda.  Improving Existing Solutions includes: Best Current Practices for Spam Control - including admins, end users, MTA developers, blacklist operators, etc.. Filtering Standards - dynamic updates, standard headers for MTAs, etc. Abuse Reporting Standards - research into common standards for exchanging information about network and abuse.

02/17/2004Copyright © 2004 ISOC ASRG Research Agenda.  Proposing New Solutions includes: Requirements and Evaluation Model - to be used for evaluation of proposed solutions SMTP Session Verification - verification of the SMTP transaction (e.g. LMAP, etc.) Message Verification - verification of both the message headers and content (e.g. DomainKeys, Project Lumos, TEOS, etc.)

02/17/2004Copyright © 2004 ISOC10 5. Current Status of the ASRG.  Seeking Volunteers: Abuse Reporting Standards Best Current Practices Filtering Problem Analysis SMTP and message verification  Coordinating with industry  BOF at the next IETF meeting on DNS authentication

02/17/2004Copyright © 2004 ISOC11 6. Selected Proposals.  Does Authentication Matter?  Replacing SMTP?  DNS-based Authentication Proposals “Hostile armies may face each other for years, striving for the victory which is decided in a single day” “Art of War”, Sun Tzu

02/17/2004Copyright © 2004 ISOC Proposals - Does Authentication Matter?  Does Authentication Make a Difference? Do end users and ISPs care? Spammers can hijack user’s identity!  Better Authentication With Better Identity? Users and ISPs will care more about domains and addresses being stolen? Spammers will be more traceable Narrows the playing field “Quis custodiet ipsos custodes” – “Who will watch the watchers”?

02/17/2004Copyright © 2004 ISOC Proposals - Replacing SMTP?  Several proposals have been submitted to both the IETF and the ASRG  Seek to create an traceable system  Need for replacement has NOT been proven  Most discussions are taking placing outside the ASRG (

02/17/2004Copyright © 2004 ISOC Proposals - DNS-based Authentication Methods.  MTA Authorization Records in DNS: Seeks to eliminate forgery in SMTP transactions Uses DNS for publication of domain authorization data Significant issues remain to be addressed Several competing proposals (RMX, DMP, SPF, etc.) IETF BOF scheduled for March 4 th, 2004 (Seoul)  MTA MARK Seeks to address the problem of hijacked computers Uses rDNS records to mark specific IPs as MTA or non- MTAs

02/17/2004Copyright © 2004 ISOC15 Introduction to the Anti-Spam Research Group (ASRG) Questions? Comments? ASRG Website: asrg.sp.am