Preventing Spam: Today and Tomorrow Zane Bonny Vilaphong Phasiname The Spamsters!

Slides:



Advertisements
Similar presentations
Microsoft ® Office Outlook ® 2003 Training Outlook can help protect you from junk Upstate Technology Services presents:
Advertisements

Gold Country Computer Learning Center March 2007 Spam Roger Thornburn.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Microsoft ® Office Outlook ® 2003 Virtually Working for You presents:
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
Basics. 2 Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services –Acquiring an account.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
6/1/2015 Spam Filtering - Muthiyalu Jothir 1 Spam Filtering Computer Security Seminar N.Muthiyalu Jothir – Media Informatics.
Issue Project - SPAM - EDCI 564 Vaithinathan Vanitha & Sookeun Byun.
1 Enhancing Address Privacy on Anti-SPAM by Dou Wang and Ying Chen School of Computer Science University of Windsor October 2007.
Spam May CS239. Taxonomy (UBE)  Advertisement  Phishing Webpage  Content  Links From: Thrifty Health-Insurance Mailed-By: noticeoption.comReply-To:
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Sender policy framework. Note: is a good reference source for SPFhttp://
August 15 click! 1 Basics Kitsap Regional Library.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
Spam Reduction Techniques Using greylisting and SpamAssassin.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
Practical PC, 7 th Edition Chapter 9: Sending and Attachments.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
GOT SPAM? Spam is the unsolicited or undesired bulk electronic messages. Spam usually contains pornography, viruses, phishing attacks, scams, trojans,
1 The Business Case for DomainKeys Identified Mail.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
The Shastalink Barracuda Spam Filter How to properly use the Barracuda Spam Filter to control your Inbox.
Norman Protection Powerful and flexible Protection Gateway.
Basics. 2 Professional Development Centre Class Outline Part 1 - Introduction –Explaining –Parts of an address –Types of services.
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
Spam Filtering. From: "" Subject: real estate is the only way... gem oalvgkay Anyone can buy real estate with no money down Stop paying rent TODAY ! There.
Unit 2—Using the Computer Lesson 14 and Electronic Communication.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
A Technical Approach to Minimizing Spam Mallory J. Paine.
Tired of Spam? The solution is MailWasher
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
CAN SPAM and Your Marketing Best Practices for Senders By Lars Helgeson Cooler .
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
C August 24, 2004 Page 1 SMS Spam Control Nobuyuki Uchida QUALCOMM Incorporated Notice ©2004 QUALCOMM Incorporated. All rights reserved.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Source pictures for document ”Thoughts about increasing spam annoyance” by License: This material may be distributed only subject.
Managing Your Inbox. Flagging Messages Message requires a specific response or action from the recipient Flagging draws attention to your request Quick.
 Left Side  Mail/Contacts/Tasks  Labeled Folders  Contacts – “IM” Feature  Right Side  s.
Sender policy framework. Note: is a good reference source for SPFhttp://
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
554 Access Denied Fermilab’s Experiences with Spamcop.net Kevin Hill Ray Pasetes Jack Schmidt.
is short for electronic mail!. What is ? An electronic message sent from one computer to another. saves money and time compared to regular.
Windows Vista Configuration MCTS : Productivity Applications.
Sender Reputation in a Large Webmail Service by Bradley Taylor (2006) Presented by : Manoj Kumar & Harsha Vardhana.
Unit 3 Section 6.4: Internet Security
3.2 Introduction to .
Exchange Online Advanced Threat Protection
Lesson 3 Safe Computing.
is short for electronic mail!
Huntington Beach Public Library
Demo Advanced Threat Protection
Information Security Session October 24, 2005
What is it? Why do I keep getting from Barracuda? SPAM.
Birdville ISD SPAM Filter – Self management portal
3.2 Introduction to .
Basics HURY DEPARTMENT OF COMPUTER SCIENCE M.TEJASWINI.
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Spam control Old emphasis: detect spam
Presentation transcript:

Preventing Spam: Today and Tomorrow Zane Bonny Vilaphong Phasiname The Spamsters!

Summary Why Prevent Spam How is Spam Prevented What is Wrong With This Picture? What can we do? List Based Approach Algorithm Based Approach Government Legislation Who Did What and Sources Conclusions

Why Prevent Spam Phishing Scams  Red Cross Donation Privacy  Many want your personal information Out of control  70 to 100 a day at the average office Costly  More than 10 Billion a year.

Why Prevent Spam ANNOYING!  Who likes spam in their inbox?  Can you totally eliminate spam?

How is Spam Prevented Junk Filter – will decide to delete a message or not based on the content of the message. Safe Senders List – this list defines an as safe or not. Imagine an message that is sent through but is deleted by the spam filter. This filter tells the program that it is safe. Safe Recipients Lists – this list is similar to the senders list but is instead used for large groups of people. Blocked Senders List – this is a list of the people that will be treated as junk whether they pass the filter or not.

How is Spam Prevented Never reply to a spam Don’t click any links in a spam Don’t use your home or business address Preview your messages before you open them Disguise your address

What is Wrong With This Picture? Rely heavily on the user  Many of these methods do not provide automatic protection. Lists and filters are rarely used by users Even if they are utilized it takes time to be effective What can we do to help eliminate?

What can we do? More user friendly methods More automatic Handled more on the IT side

List: DNS Black Listing Implementation of an old idea  Black list can be formed for an individual This is known as DNS Blacklisting Been in use since 1997 Three requirements for Blacklist  Domain  Name Server  List of addresses

List: DNS Black Listing DNSBL queries  First reverses ip  Second appends DNSBL with reverse IP  Last checks names in list Example  IP= DNSBL=bl.black.com  Sent to blacklist as bl.black.com Policies vary from blacklist to blacklist  What does the list wish to prevent?  How do you find the addresses?  How long?

List: DNS Black Listing

List: Challenge Response This is an filter in reverse  Assumes that all is spam First mail is sent Second challenge is issued to the sender Lastly, if the sender responds then they are white listed

List: Challenge Response A number of problems exist Not all can be responded to  Listserv  Mailing lists Also what if a spammer used a legitimate address?

List: Bounce Messages What is this? Send one each time a spam is sent A few problems….  Spammers don’t care  Forged return address  Pretty easy to tell by header if it is real or not

Algorithm: Bayesian Probability Bayesian achieves 98%+ spam detection rate using mathematical approach. How does it work? Uses ham files  Ham files contain legitimate . For example:  The word “free” can be recognize within the data base files of ham.  If the word “free” spell differently the Bayesian filter will detected as spam.

Algorithm: Chung-Kwei Named after Feng-Shui figure  This figure was a symbol of protection  Chung-Kwei is designed to protect business Part of SpamGuru package made by IBM Uses Teiresias algorithm to discover patterns for spam-vocabulary

Algorithm: Chung-Kwei Spam-vocabulary is what is used to filter s before reaching end user. White can remove spam from the spam-vocabulary. Query method then classifies

Government Legislation Why come up with a fancy technique at all why not just ask Uncle Sam for help? Consider the Do Not Call Registry  Fairly effective at deterring telemarketers  Legal action is available if the telemarketers do not comply On the flip side….  Legal questions arise  And constitutional questions

Who Did What? Vilaphong…  Algorithm based approaches  Government legislation  Conclusion Zane…  List based approaches  PowerPoint  Intro

Sources Boyce, Jim. “What to do with all that spam”. Microsoft. 1 May Nov “DNSBL”. Wikipedia. 13 Oct Nov Gowan, Frith. “Don't Get Lured by Phishing Scams”. Techsoup.org. 12 Dec Nov Orlov, Gregory. “Spam: prevention is better than cure!”. BCS. 1 Jan Nov Rigoutsos, Isidore and Huynh, Tien. “Chung-Kwei: a Pattern-discovery-based System for the Automatic Identification of Unsolicited Messages (SPAM)”. IBM Thomas J Watson Research Center. 1 Jan Nov “Section 7 - Spam Prevention”. SORBS. 1 Jan Nov Stuart, Anne. “Canning Spam”. Inc.com. 1 May Nov Tenby, Susan. “Things You Can Do to Prevent Spam”. Techsoup.org. 12 Nov Nov “Why Bayesian Filtering is the Most Effective Anti-Spam Technology”. GFI.com. 1 Jan Nov

Conclusion Have many prevention methods already implemented Most important improvement that can be made is automation Have listing methods and algorithms. algorithms tend to yield the best results Simple lists were sufficient in past  Today Spam has evolved to a point that it requires “smarter” methods to prevent it The prevention of spam will undoubtedly become more of issue in the future and cost business a consumers more money  A fool proof prevention is unlikely Only 100% way is Government Regulation  That also has drawbacks

Questions?