Blue Security: Challenges With CAN-SPAM Automation Eran Reshef Blue Security, Inc. Sep 2005 Note: This Presentation Describes Blue Security’s Phase II.

Slides:



Advertisements
Similar presentations
How Lawsuits Against Spammers Can Aid Spam-Filtering Technology: A Spam Litigators View From the Front Lines Jon Praed Internet Law Group
Advertisements

3.02H Publishing a Website 3.02 Develop webpages..
Virtual Conference on Anti-spam Regulation and Policy Development Sharing The Singapore Experience By Low Boon Kiat Policy & Competition Development Group.
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
New Canadian Anti-Spam Legislation Robert Lipson – April 8, 2014.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
 Malicious or unsolicited mail sent to a mailbox without the option to unsubscribe  Often used as a catch-all of any undesired or questionable mail.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
1 Unsolicited Electronic Messages Ordinance An Overview of Implementation and Enforcement 28 May 2007.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Should there be a law that forbids people from sending to thousands of people (spam)? By: Bennett Moss Daniel Hoyt Hizkias Neway Junyu Wang.
Responsible Targeting Chapter One. Content from The Essential Guide to Web Strategy for Entrepreneurs unless otherwise noted Chapter One Opt-in.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
CIS 451: Servers, CGI and Log Files Dr. Ralph D. Westfall January, 2009.
1 Spyware Ryan Myers Andrew Sullivan ECE 4112 – Spring 2005.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
C OMPUTER C ONCEPTS Unit 1 Concept 3 – Solving Technological Problems.
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
Prohibiting Redirection & Synthesized DNS Responses in Top Level Domains Mar 2010 Kuala Lumpur APTLD Meeting.
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
Content Control Stewart Duncan Technical Manager.
The Effects of Anti-Spam Methods on Spam Mail Eilon Solan, Tel Aviv University Eran Reshef, Blue Security Inc.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Chapter 7: E-Commerce Security and Payment system
Chapter 8 Browsing and Searching the Web. 2Practical PC 5 th Edition Chapter 8 Getting Started In this Chapter, you will learn: − What is a Web page −
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
Leveraging Asset Reputation Systems to Detect and Prevent Fraud and Abuse at LinkedIn Jenelle Bray Staff Data Scientist Strata + Hadoop World New York,
How Phishing Works Prof. Vipul Chudasama.
Introduction Spam in Society Spam IM Spam Text Spam Blog Spamming Spam Blogs.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Ch. 7 -Attacking Session Management Latasha A. Gibbs CSCE 813 – Internet Security, Fall 2012 College of Engineering and Computing University of South Carolina.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
Global Field Operations From Vision to Value Cisco Confidential1© 2011 Cisco and/or its affiliates. All rights reserved. Access to PMC Partner Training.
Any criminal action perpetrated primarily through the use of a computer.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
[ Direct marketing – an introduction to data protection and privacy] For [insert name of organisation] presented by [insert name of presenter] on [date]
Heat-seeking Honeypots: Design and Experience John P. John, Fang Yu, Yinglian Xie, Arvind Krishnamurthy and Martin Abadi WWW 2011 Presented by Elias P.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
BUILD SECURE PRODUCTS AND SERVICES
3.02H Publishing a Website 3.02 Develop webpages..
Chapter 8 Browsing and Searching the Web
ISYM 540 Current Topics in Information System Management
Computers and the Internet
ethical issues in business
Computer Security.
4.02 Develop web pages using various layouts and technologies.
Citi Commercial Cards – Fraud Early Warning
Week 7 - Wednesday CS363.
Presentation transcript:

Blue Security: Challenges With CAN-SPAM Automation Eran Reshef Blue Security, Inc. Sep 2005 Note: This Presentation Describes Blue Security’s Phase II Beta

Why Did We Found Blue? Internet users do not want to receive spam The CAN-SPAM law allows users to opt-out In reality, it is extremely difficult to opt-out: –Faked “reply-to:” addresses –Broken “unsubscribe” forms –Unsubscribe usually brings more spam –Spyware harboring in spam sites Even if opt-out was possible, there is too much spam to opt-out from manually Our approach: an automated opt-out mechanism

Key Principles One opt-out request per each spam message sent to a member’s personal mailbox Opt-outs are sent via HTTP to advertisers’ web sites Manual analysis to overcome “Joe jobs” and zombie web sites No interference with Internet infrastructure Opt-outs refer spammers to a hashed registry

Naïve Approach Spammer User’s mailbox opt out via User’s opt- out software spam

Problems with Naïve Approach From address is almost always faked –Cannot use “From” to back to spammer Sender machine is almost always a zombie – ing the IP owner will reach either a careless admin or an ISP

Opt-out at Merchant’s Site Spammer User’s mailbox User’s opt- out software spam opt out via http Merchant’s web site

Mechanics of Opt-Out Requests Open an HTTP session to the merchant’s site Politely crawl site to locate all HTML forms –Spammers randomize links to prevent automated opt- out requests, so crawling is necessary –Max 3 connections (Internet Explorer’s default) –Several seconds pause between each request Post opt-out text in HTML forms –Ignore client-side validation (JavaScript) –No use of random information (e.g., credit cards)

Problems What it spam? –Legitimate is sometimes perceived by users as spam Joe Jobs –For only $250, one could get millions of s appearing to advertise a competitor Zombie web sites –Few spam sites (and all phishing sites) are hosted on compromised home computers

Analysis Service Spammer User's mailbox opt out via http User's opt- out software Blue’s Analysis opt-out instructions Spammer’s web site spam suspected spam

Analysis Service Overview Tracking and researching very few top spammers at each point in time –Currently less than 15 online pharmacies Extensive manual verification of web sites –White lists, black lists, Internet searches, etc. Relying on honeypots for deciding which web sites are spammers, not user reports

Spam Currently Not Handled s not sent by the few tracked spammers s advertising legitimate companies s advertising sites hosted in legitimate ISPs (e.g., US based) s advertising sites hosted anywhere but spam-friendly ISPs s without URLs s sent only to users, not to honeypots

Problems Opt-out text reveals address of user

Hashed Registry Blue’s Registry Spammer User's mailbox opt out via http (registry) User's opt- out software Blue’s Analysis opt-out instructions Spammer’s web site addrs spam hashed addrs

Registry Overview Registry entry does not validate a “live address”: –Hashed addresses of users –High number of hashed addresses of honeypots Registry has a controlled level of false-positives to protect against brute-force attacks The registry itself and cleaning tools (including source code) are offered free of charge to anyone

Problems Bypassing ISP’s abuse teams Not leveraging existing anti-spam policies of other Internet entities (e.g., domain registrars) Not allowing spammers’ to clean their lists before receiving opt-out requests

suspected spam Spam Reports Blue’s Registry Spammer User's mailbox opt out via http (registry) User's opt- out software Blue’s Analysis opt-out instructions Spammer’s web site addrs spam Registrars, ISPs, … Spam Reports hashed addrs

Spam Reports Overview Reports are sent mainly to hosting ISPs and to advertisers’ sites One report is sent on behalf of all the members Reports are usually sent via s to abuse desks of relevant parties

Do Not Intrude Registry Stats 25,000 members ~250,000 spam/day received Typical case –15,000 opt-out requests sent by members over a period of 10 hours to a leading spamvertised online pharmacy –Spammer shut down all his domains a few hours after the sending of opt-out requests ended

Opting-out is Not DDoS Legitimate traffic –Each member submits one opt-out request per each spam message sent to his or her personal mailbox Invited traffic –Each spam is an invitation to visit the advertiser’s site Low-volume traffic –Each opt-out request mimics a user submitting one opt- out request at the spammer’s site No synchronization –Blue security does not initiate or control timing of opt- out requests Intention –Exercise opt-out right granted under CAN-SPAM law

Spammer’s Perspective Spammer sends 10M messages Spammer should expect ~800,000 visitors –Industry average is 8% response rate (source: DoubleClick) Spammer is required by law to support 10M opt- out requests If the spammer is a legitimate business, he should have no problem handling even the entire blue community (25,000 users).

Members Are Not Zombies Members select which spam to complain about (1 st control point) Members can stop all opt-outs (2 nd control point) Full logging (3 rd control point) Members can uninstall the Blue Frog (4 th control point) Compare to challenge/response systems (e.g., Qurb, acquired by Computer Associated)

This Will Not Make Things Worse “Successful” steady state –Spammers do not send spam to registered members –Members do not send opt-out requests –Much less spam in the Internet “Failure” steady state –Spammers ignore registry –Community disbands –Same traffic as before Transient state is short and involves a small community, so there is no real impact on Internet traffic

Summary Do Not Intrude Registry is an implementation of an automated opt-out mechanism in a secure and responsible manner Initial signs spammers may respect opt-out requests Blue Security is interested in cooperation with ISPs and anti-spam vendors Q & A

Backup Slides

Spammer’s Countermeasures Spam URLs contain validation tokens –Analysis service substitutes member-reported URL with honeypot-reported URL Spammer redirects traffic to legitimate domains or IP addresses –Each opt-out request is limited to specific domains and IP ranges More countermeasures are expected

Spam Is Not a Solved Problem Even a low false positive ratio is unacceptable to some users –Sales person do not wish to miss even one customer Even a low false negative ratio is unacceptable to some users –Religious people are offended by porno spam Many users cannot afford top-notch filters –In many countries, ISPs charge extra for filters

More Information - The Federal Trade Commission's summary page of Rules, Regulations and Acts regarding unsolicited commercial , pornographic and offensive , and fraud The Federal Trade Commission's Requirements for Commercial ers. – Blue Security’s web sitewww.bluesecurity.com