LENS LEveraging anti-social Networking against Spam (Introduction) MSc. Sufian Hameed Dr. Pan Hui Prof. Xiaoming Fu.

Slides:



Advertisements
Similar presentations
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Advertisements

Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Managing Users. Overview for School Admin Users Define Users Users Module Add Users Importing Users and Groups Manually adding users Search for Users.
Building Cloud-ready Video Transcoding System for Content Delivery Networks(CDNs) Zhenyun Zhuang and Chun Guo Speaker: 饒展榕.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
R E : Reliable Michael Kaminsky (Intel Research Pittsburgh) Scott Garriss (CMU) Michael Freedman (NYU/Stanford) Brad Karp (University College London)
Early Detection of Outgoing Spammers in Large-Scale Service Provider Networks Yehonatan Cohen Daniel Gordon Danny Hendler Ben-Gurion University Yehonatan.
Efficient Private Techniques for Verifying Social Proximity Michael J. Freedman and Antonio Nicolosi Discussion by: A. Ziad Hatahet.
ELKAT Security Engineering Ltd. Poland Activity Plan Avi Arbili Regional Sales Director – Europe Cell:+972-(0) 52 – Tel: +972-(0) Fax:
Voice Instant Messenger Andrew Miller CS 491B Fall 2006 Professor Sun.
Multicasting in Mobile Ad-Hoc Networks (MANET)
FROM RICHARD RODRIGUES JOHN ANIMALU FELIX SHULMAN THE HONORARY MEMBERS OF THE INTERCONTINENTAL GROUP Information security in real business firewall security.
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
Understanding the Network-Level Behavior of Spammers Anirudh Ramachandran Nick Feamster.
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering An Effective Defense Against Spam Laundering Mengjun Xie, Heng Yin, Haining.
CMSC 414 Computer and Network Security Lecture 16 Jonathan Katz.
Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Stephen S. Yau CSE465 & CSE591, Fall Information Assurance (IA) & Security Overview Concepts Security principles & strategies Techniques Guidelines,
© Pawaa Inc Confidential & Not for redistributionwww.securelyshare.com For Box SecurelyShare for Box allows to upload, Encrypt, share.
““Improving Community Reach through Mobile Technologies: The PCI experience” ” Kwaku Yeboah, MB,CHB,MPH Vice President, HIV/AIDS Programs. PCI July 25,
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Towards Online Spam Filtering in Social Networks Hongyu Gao, Yan Chen, Kathy Lee, Diana Palsetia and Alok Choudhary Lab for Internet and Security Technology.
An Effective Defense Against Spam Laundering Paper by: Mengjun Xie, Heng Yin, Haining Wang Presented at:CCS'06 Presentation by: Devendra Salvi.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
Understanding Forgery Properties of Spam Delivery Paths Fernando Sanchez, Zhenhai Duan Florida State University Yingfei Dong University of Hawaii.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Spam Filtering Techniques Arnold Perez Joseph Tilley.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Identity Based Sender Authentication for Spam Mitigation Sufian Hameed (FAST-NUCES) Tobias Kloht (University of Goetingen) Xiaoming Fu (University.
Software Engineer, #MongoDBDays.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream.
Chapter 4 Computer Networks – Part 1
A Framework for Hybrid Structure P2P Botnet Speakers:MA2G0207 bo rong,sue Source:IEEE.
National Chi Nan University Performance Evaluation of Transport Protocols in Smart Meter Networks Speaker: Chia-Wen Lu Advisor: Dr. Quincy Wu Date: 2012/07/23.
Key Terms. Online Communication Online community A virtual community which exists only online. It may be open to anyone (eg. a bulletin board) or restricted.
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
Virtual techdays INDIA │ august 2010 virtual techdays INDIA │ august 2010 Moving/Co-existing your messaging platform to the cloud with Exchange.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
Jeopardy: Digital Citizenship Please use presentation mode!
Bayesian Spam Filter By Joshua Spaulding. Statement of Problem “Spam now accounts for more than half of all messages sent and imposes huge productivity.
EEPOS – Complete Enterprise Archive Solution Trillian Infosüsteemid Ltd Kahro Raie June
Improving Spam Detection Based on Structural Similarity By Luiz H. Gomes, Fernando D. O. Castro, Rodrigo B. Almeida, Luis M. A. Bettencourt, Virgílio A.
LENS: Leveraging Social Networking and Trust to Prevent Spam Transmission Sufian Hameed Advisors Prof. Xiaoming Fu (UoG) Dr. Pan Hui (Deutsche Telekom.
1 Biometric Databases. 2 Overview Problems associated with Biometric databases Some practical solutions Some existing DBMS.
SpamIQ Free spam analysis and data mining tool. Objective: Provide ISPs and network operators good analysis tools to analyze and understand spam traffic.
Understanding the network level behavior of spammers Published by :Anirudh Ramachandran, Nick Feamster Published in :ACMSIGCOMM 2006 Presented by: Bharat.
Detecting Phishing in s Srikanth Palla Ram Dantu University of North Texas, Denton.
Exploiting Network Structure for Proactive Spam Mitigation Shobha Venkataraman * Joint work with Subhabrata Sen §, Oliver Spatscheck §, Patrick Haffner.
Electronic Communication Ken Nguyen Department of Information Technology Clayton State University.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
Authors: Yazan Boshmaf, Lldar Muslukhov, Konstantin Beznosov, Matei Ripeanu University of British Columbia Annual Computer Security Applications Conference.
Senior Solutions Architect, MongoDB Inc. Massimo Brignoli #MongoDB Introduction to Sharding.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
Large-Scale Monitoring of DHT Traffic Ghulam Memon – University of Oregon Reza Rejaie – University of Oregon Yang Guo – Corporate Research, Thomson Daniel.
1 Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Speaker: Jun-Yi Zheng 2010/01/18.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
MiniSec: A Secure Sensor Network Communication Architecture Carnegie Mellon UniversityUniversity of Maryland at College Park Mark Luk, Ghita Mezzour, Adrian.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
Sender Reputation in a Large Webmail Service by Bradley Taylor (2006) Presented by : Manoj Kumar & Harsha Vardhana.
Network System Security - Task 2. Russell Johnston.
Managing Data Transfer in Computer Clusters with Orchestra
Dieudo Mulamba November 2017
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Presentation transcript:

LENS LEveraging anti-social Networking against Spam (Introduction) MSc. Sufian Hameed Dr. Pan Hui Prof. Xiaoming Fu

2 Agenda Introduction and Motivation State of the Art LENS Experiments and Results

3 1. Introduction and Motivation Spam –Unsolicited bulk messages sent indiscriminately –Increased from 65% in 2005 to 81% in 2009 –200 billion spams with avg size of 8Kbytes Per day space consumption and bandwidth usage is 1,525,879 GB Common Protection Techniques –Content-Based Filtering –Sender Authentication –Header-Based approach –Social Network Approach Problems –False positives and negative –Spam already traversing the network

4 2. State of the Art Personal –a social network of friends in the cyberspace based on the s exchanged between them –local clustering properties of social network classify s –able to classify 53% of all the s as spam or non-spam with 100% accuracy. –limited to offline analysis –47% s are left for other filtering techniques. Reliable –Uses whitelist of friends and FoF to accept –Accepts 85% of the s and prevents 88% of false positives –Infrastructural overhead (public/private keys Attestation Server)

5 3. LENS: LEveraging anti-social Networking against Spam Anti-social networking paradigm, based on an underlying social infrasrtucture –Extend spam protection beyond social network –Prevent transmission of spam across the network Receive all legitimate s Prevents all spam transmission LENS consists of two parts –Formation of social network.i.e. community formation –Anti-social networking i.e. GK selection

6 3.1 Community Formation

7 GK Selection SKList (SK, GK ID, RN ID ) SignList (Signature[(CN ID ) Sign-SK, GK ID, RN ID ]) Add to SKList Add to SignList Add to SKList

8 GK Selection – stage 1 CommLists 1 3 – F 33 – F 36 – F 32 – F 31 – F 2 – FoF – 3 4 – FoF – – FoF – – FoF – – FoF – – FoF – – FoF – – F 6 – F 19 – F 17 – F 14 – F 11 – FoF – – FoF – 6 20 – FoF – – FoF – – FoF – – FoF – – FoF – 14 1 SK,5, Sign[(6)SK, 5, 1] 19 Sign[(19)SK, 5, 1] SignList SKList

9 GK Selection – stage 2

10 GK Selection – stage 3 Authentication Annonce

11 Processing

12 processing with LENS

13 4. Experiments and Results Concerned in evaluating two things Scalability –OSN Date (FaceBook and Flickr) Effectiveness at accepting all the legitimate inbound s. –Two real traces (Enron and Uni-Kiel)

14 OSN Data Interested in –# of GKs for receiving messages –Reachablity of recipient via GK

15 FaceBook 4000 nodes Community size Number of GKs –GKs between –SKList entry in 76 bytes –70 Kbytes in worse case Reachablity of recipient via GK Between 710K million (23-54%)

16 Flickr 4000 nodes Community size Number of GKs –GKs between –SKList entry in 76 bytes –28 Kbytes in worse case Reachablity of recipient via GK Between 682K-920K (39-54%)

17 Data Set Enron –Contains data from mostly senior management of Enron. Uni-Kiel –Data taken from log files of the server at Kiel University over a period of 112 days.

18 Evaluations of Dataset Acceptance Number of GKs Space Requirement Message Overhead

19 Thank You