March 2008IETF 71 (Philadelphia) - RUCUS1 SPIT architectural issues Henning Schulzrinne Columbia University (based partially on draft-tschofenig-sipping-framework-spit-reduction-03)

Slides:



Advertisements
Similar presentations
Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 A Perspective on VoIP: Where we are Today and the Challenges for Tomorrow.
University of Baltimore Telecommunications Technology
Feature Interaction Handling in LESS Xiaotao Wu and Henning Schulzrinne Internet Real Time Laboratory.
Advertising with Face Book Guadalupe Perez III October 12, 2010 EDTC 3332 Instructional Technology Practicum.
1 IPv6 and IPv4 Interoperation and Transition Tony Hain co-chair IETF ngtrans WG
IPv4 Depletion IPv6 Adoption 3 February /8s Remaining.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
E-Business Risks Chapter Seven. E-Business Models EDI Web pages The online environment Distributed e-business and intranets Supply chain linkage Collaborative.
DomainKeys Identified Mail (DKIM): Introduction and Overview Eric Allman Chief Science Officer Sendmail, Inc.
Database – Part 3 Dr. V.T. Raja Oregon State University External References/Sources: Data Warehousing – Mr. Sakthi Angappamudali.
The State of Security Management By Jim Reavis January 2003.
Michael Hirschbichler © 2008 Institute of Broadband CommunicationsVienna University of Technology Unsolicited Calls in IMS Spam, Spit - will we be facing.
Victor Ivanov. Introduction  Definition  Unsolicited bulk messages  Concerns  Server load  Garbage content.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
A Generic Event Notification System Using XML and SIP Knarig Arabshian and Henning Schulzrinne Department of Computer Science Columbia University
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
From data delivery to control: rich presence and multimedia Henning Schulzrinne, Ron Shacham, Xiaotao Wu Columbia University, New York Wolfgang Kellerer,
CS 268: Future Internet Architectures Ion Stoica May 1, 2006.
March 2009 (IETF 74)IETF - P2PRG1 Security Issues and Solutions in Peer-to- peer Systems for Real-time Communications draft-schulzrinne-p2prg-rtc-security-00.
Database – Part 2b Dr. V.T. Raja Oregon State University External References/Sources: Data Warehousing – Sakthi Angappamudali at Standard Insurance; BI.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Requirements for Resource Priority Mechanisms for the Session Initiation Protocol draft-ietf-ieprep-sip-reqs-01 Henning Schulzrinne Columbia University.
Annual Safety & Security Briefing - 9/22/04 Teresa Downey – SLAC Computer Security Group & SCS Applications Group.
Internet Telephony Helen J. Wang Network Reading Group, Jan 27, 99 Acknowledgement: Jimmy, Bhaskar.
Electronic Payment Billing for Internet Telephony and Services Edoardo Berera University of Nice Sophia Antipolis Telelinea 26 September 2001 Seminar on.
Preventing Spam For SIP-based Sessions and Instant Messages Kumar Srivastava Henning Schulzrinne June 10, 2004.
Identity, Spheres and Privacy Rules Henning Schulzrinne (with Hannes Tschofenig and Richard Barnes) Workshop on Identity, Information and Context October.
SIMPLEStone – A presence server performance benchmarking standard SIMPLEStone – A presence server performance benchmarking standard Presented by Vishal.
ORBIT NSF site visit - July 14, Location-based Services & data propagation in ORBIT Henning Schulzrinne Dept. of Computer Science.
ECRIT - IETF 74 (March 2009) - San Francisco Policy for defining new service-identifying labels draft-forte-ecrit-service-urn-policy-00 Henning Schulzrinne.
Spam Sonia Jahid University of Illinois Fall 2007.
Automatic Gender Identification using Cell Phone Calling Behavior Presented by David.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
© 2008 AT&T Knowledge Ventures. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Knowledge Ventures. 1 Video Relay Service and Assignment.
Augmented Social Network Ken Jordan, Jan Hauser, and Steven Foster Prepared by: Kiran Gollu.
The Internet in Education Objectives Introduction Overview –The World Wide Web –Web Page v. Web Site v. Portal Unique and Compelling Characteristics Navigation.
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
Application Layer CHAPTER 2. Announcements and Outline  Administrative Items  Questions? Recap 1.Introduction to Networks 1.Network Type 2.N etwork.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
TNC2004 Rhodes 1 Authentication and access control in Sympa mailing list manager Serge Aumont & Olivier Salaün May 2004.
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
Computer Science 101 Database Concepts. Database Collection of related data Models real world “universe” Reflects changes Specific purposes and audience.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
 What is intranet What is intranet  FeaturesFeatures  ArchitectureArchitecture  MeritsMerits  applicationsapplications  What is ExtranetWhat is.
© 1998 R. Gemmell IETF WG Presentation1 Robert Gemmell ROAMOPS Working Group.
Directions for VoIP IRT Research Henning Schulzrinne Department of Computer Science Columbia University September 16, 2004.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
SIPPING - IETF 62 - Minneapolis (March 2005) LESS effort, more services Xiaotao Wu Henning Schulzrinne Dept. of Computer Science Columbia University.
August 2005IETF63 - SIPPING1 Recommended Relationships between Different Types of Identifiers draft-schulzrinne-sipping-id-relationships-00 Henning Schulzrinne.
November 2005IETF64 - ECRIT1 Emergency Service Identifiers draft-ietf-sipping-sos-01 draft-schulzrinne-sipping-service-01 Henning Schulzrinne Columbia.
SECURITY Professor Mona Mursi. ENVIRONMENT IT infrastructures are made up of many components, abstractly: IT infrastructures are made up of many components,
Exploiting Temporal Persistence to Detect Covert Botnet Channels Authors: Frederic Giroire, Jaideep Chandrashekar, Nina Taft… RAID 2009 Reporter: Jing.
RUCUS - IETF 71 1 Lessons Learned From IETF Antispam Work Jim Fenton.
Core VoIP and 911 issues and alternatives Henning Schulzrinne Columbia University August 2003.
Detection and Mitigation of Spam in IP Telephony Networks using Signaling Protocol Analysis MacIntosh, R Vinokurov, D Advances in Wired and Wireless Communication,
Reducing Unwanted Communications in SIP (RUCUS) BOF Hannes Tschofenig Francois Audet.
E-commerce Architecture Ayşe Başar Bener. Client Server Architecture E-commerce is based on client/ server architecture –Client processes requesting service.
ECRIT - IETF 62 (March 2005) - Minneapolis 1 Requirements for Emergency Calling draft-schulzrinne-sipping-emergency-req-01 draft-ietf-sipping-sos-01 Henning.
Introduction Scientific goal – Investigate changing norms on personal data; identifying heavily targeted subgroups. Societal relevance – Information market.
KNOWLEDGE MANAGEMENT (KM) Session # 32
THIS IS THE WAY ENUM Variants Jim McEachern
Host of Troubles : Multiple Host Ambiguities in HTTP Implementations
Roadrunner Error 530 Call 1 (888) Toll-free
CHAPTER 2 Application Layer.
Thoughts on VoIP and Emergency Calling
Recommended Relationships between Different Types of Identifiers draft-schulzrinne-sipping-id-relationships-00 Henning Schulzrinne (Columbia U.) Eunsoo.
Policy enforcement and filtering for geospatial information
Presentation transcript:

March 2008IETF 71 (Philadelphia) - RUCUS1 SPIT architectural issues Henning Schulzrinne Columbia University (based partially on draft-tschofenig-sipping-framework-spit-reduction-03)

March 2008IETF 71 (Philadelphia) - RUCUS2 Unsolicited communications IMs SUBSCRIBEs Calls – -spam like: robots, canned –revival of telemarketing just from Bangalore or Lagos bypass Do-Not-Call list regulations Residence and enterprise –most spam products sold to enterprises today…

March 2008IETF 71 (Philadelphia) - RUCUS3 Bot nets May dominate SPIT problem Three kinds: –fake identity –real identity (of unwitting host) random destinations destinations from host address book or Facebook friends list

March 2008IETF 71 (Philadelphia) - RUCUS4 User behavior Closed groups –only communicate within group –example: children Semi-open groups –mostly within group –plus introductions, possibly by other means (e.g., ) –example: research staff in company Open groups –communicate with public –examples: PSAP, call center, front desk

March 2008IETF 71 (Philadelphia) - RUCUS5 The cast caller.comisp.comsmith.org *all proxies are optional columbia.edu oracle honey pot peering

March 2008IETF 71 (Philadelphia) - RUCUS6 Mechanism Mechanisms likely to evolve No single best mechanism –type of destination residence vs. business vs. PSAP –cost of false positive vs. false negative varies –SPIT evolves Volume and duration by itself insufficient –“reverse 911” –school closing calls at 5 am

March 2008IETF 71 (Philadelphia) - RUCUS7 Classes of mechanisms Identity-based –at callee –relationship to other identities (web pages, ) Statistics –at origin or destination Price-based –make incoming or outgoing calls expensive –monetary, computational or human resources (CAPTCHA)

March 2008IETF 71 (Philadelphia) - RUCUS8 Detection vs. action Detection of call characteristics –caller statistics not visible to one destination Action based on characteristics + policy –same characteristics + different policy --> different actions e.g., reject - Turing test - voice mail

March 2008IETF 71 (Philadelphia) - RUCUS9 Mechanisms WL BL Is a SPIT bot? Does caller.com host SPITers? Is Bob making more than 100 calls/day? Trust?

March 2008IETF 71 (Philadelphia) - RUCUS10 Identity crisis Assumption: –RFC 4474 provides strong identity assurance –needed for white lists Reality: –E.164: draft-rosenberg-sip-rfc4474- concerns-00 –Baiting: draft-kaplan-sip-baiting-attack-02

March 2008IETF 71 (Philadelphia) - RUCUS11 Communicating WL BL policy language call properties oracle queries update and share

March 2008IETF 71 (Philadelphia) - RUCUS12 What’s to do? Many & evolving mechanisms Components from different vendors Need for glue to allow distributed mechanism, e.g., –mechanisms to convey metrics downstream –mechanisms to query oracles –policy language to allow automated decisions Sieve RAI: common policy

March 2008IETF 71 (Philadelphia) - RUCUS13 Summary Separate mechanisms from communication protocols Separate call evaluation and measurement from policy Allow for multiple parties –service providers, trust brokers, … Both mechanisms and tools likely to evolve –keep communication tools one step ahead in generality