Spam Resources How can I help you? William Stearns

Slides:



Advertisements
Similar presentations
Filtragem Filtragem de com Red Hat Linux Implementações Práticas e Apresentação de Laboratórios Ruben Oliveira RHCE RHCX MCSE MCITP.
Advertisements

Internet Applications INTERNET APPLICATIONS. Internet Applications Domain Name Service Proxy Service Mail Service Web Service.
Basic Communication on the Internet:
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Methods for Stopping Spam James Lick
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Web Server Administration
1 Enhancing Address Privacy on Anti-SPAM by Dou Wang and Ying Chen School of Computer Science University of Windsor October 2007.
Spam May CS239. Taxonomy (UBE)  Advertisement  Phishing Webpage  Content  Links From: Thrifty Health-Insurance Mailed-By: noticeoption.comReply-To:
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Using the Engaging Networks tools Ghazal Vaghedi Toronto February 21, 2012 #12ENCONF.
Guide to Operating System Security Chapter 10 Security.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Spam Sonia Jahid University of Illinois Fall 2007.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Filtering with Open Source Software OLUG – June 7, 2005.
1 New : Create your own message starting from scratch 2 New From Template: add professionally designed templates provided exclusively by Gorilla Contact.
Antispam GARR Michele Michelotto Hepix Karlsruhe, 11 May 2005.
1 SMTP Transport Configuration SMTP Configurations and Virtual Servers Customizing the SMTP Service.
Login Screen This is the Sign In page for the Dashboard Enter Id and Password to sign In New User Registration.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
Copyright © 2000, ZipLink Inc. Patent Pending 1 Mail Message Metering or, how to block outbound spam Robert D. Haskins.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Sending Mark Kruger Coldfusionmuse.com Cfwebtools.com.
MKTG 476 SECURITY Lars Perner, Instructor 1 Internet Security  Servers  Hacking  Publicly available information  Information storage  Intrusion methods.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
Combating Abuse Brian Nisbet NOC Manager HEAnet.
Login Screen This is the Sign In page for the Dashboard New User Registration Enter Id and Password to sign In.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
How Web Servers and the Internet Work by by: Marshall Brainby: Marshall Brain
© Toronto Area Security Klatch 2007 A drop-in anti-spam solution A 15 minute speed talk by Paul Wouters.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Module 6 Planning and Deploying Messaging Security.
An Overview of the Internet: The Internet: Then and Now How the Internet Works Major Features of the Internet.
Tired of Spam? The solution is MailWasher
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
Google Apps (Education Edition) A step guide to a successful deployment January 10 th, 2008 California Technology Assistance Project
SpamAssassin Filter Rodney Weakly April 26, 2006.
銳擎智識股份有限公司 銳擎智識股份有限公司 Executive Vice President Richard Chuang
Spamscatter: Characterizing Internet Scam Hosting Infrastructure By D. Anderson, C. Fleizach, S. Savage, and G. Voelker Presented by Mishari Almishari.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
SpamAssassin An Introduction PacNOG I Workshop June 20, 2005 Nadi, Fiji Hervey Allen.
Spam from an ISP perspective Simon Lyall, Ihug Uniforum NZ NetForum Conference July 2003.
EVALUATE YOUR SITE’S PERFORMANCE. Web site statistics Affiliate Sales Figures.
Detecting Phishing in s Srikanth Palla Ram Dantu University of North Texas, Denton.
Source pictures for document ”Thoughts about increasing spam annoyance” by License: This material may be distributed only subject.
Return to the PC Security web page Lesson 6: Improving Security.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
SMTP Tapu Ahmed Jeremy Nunn. Basics Responsible for electronic mail delivery. Responsible for electronic mail delivery. Simple ASCII protocol that runs.
Creativematch eCRM Creativematch has launched a new eCRM platform providing access to an marketing suite from your own desktop. Our eCRM platform.
Electronic Mail. Gmail Accounts USERNAME Skyward PASSWORD Same password as you use to log in to your computer.
 Internet –INTERnational NETwork is the network of computer networks.  It is a Wide Area Network(WLAN).You can have unlimited access to internet. 
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
[1] Control Spam by the Use of Greylisting Torgny Hallenmark LDC - Computing Center Lund University, Sweden TERENA Networking.
PHP Scripts Mall provided Advanced SMTP Server, it is very fast and deliver s multiple recipients. Using Our SMTP Server you can send 1,00,000.
Anti-Spam Managing Spam with Kerio Connect
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
This is the Sign In page for the Dashboard
Net Report Statistics Dashboard Summary
Presentation transcript:

Spam Resources How can I help you? William Stearns

Sa-blacklist Overview Blacklist of spam hyperlink domains, not sender IP's  Follow the money Multiple volunteer contributors  Likely more than 20K person-hours from core Published in multiple formats Used in spam filters and MTA's Significantly helps identification

Statistics (7/17/2006) 197,523 blacklisted domains  Some are raw IP addresses when used in link 84,973 whitelisted domains ~40 contributors Updated hourly More than 1TB/month text file downloads  Hosted in Greece and the Netherlands, upcoming Germany  No easy way to identify amount of DNS lookup traffic (43 DNS servers)

Definition Unsolicited Bulk  “Commercial” misses some  CAN-SPAM's definition too narrow Includes phish Excludes bounces, Joe Jobs Not generally focused on viruses

Criteria Be conservative Generally avoid Joe Jobs, stock domains, 419's, foreign language No ISP domains, redirectors, Free hosting sites, “~user” accounts, dynamic DNS Whois data  Recent domains more likely spam Whitelist large corporations

14 Text File Formats Spamassassin multiple formats Sendmail, Postfix, Qmail Privoxy, Squid Bind, rbldnsd Raw domains Others on request

One of 6 DNS RBLs Published as DNS-based RBL ws.surbl.org Others: Spamcop, Outblaze, Abusebutler, Phishing, jwSpamSpy Usable by  sendmail, qmail, qmail-ldap, Exim, Exchange, Policy Patrol, MailScanner, Declude Junkmail, Merak Mail Server, MDaemon, NetIQ MailMarshal, ALOAHA, ASTPS, NEMX Power Tools, XWall, ORFilter, GEE Whiz, SpamBouncer, STAT AntiSpam, MTS Professional, Trash Finder, SpamPal, Secure Mail Suite

Raw spam data , multiple accounts 9.7GB anonymized spams  ford.stearns.org/ spamevidence/{spamvertised_domain}.bin  Password provided on request >1,000,000 (>7.7GB) unanonymized hand and machine checked spam  5.48G is categorized

Categories adult, cable, casino, childporn, contactinfo, diploma, list, faraway, miscspam, mixed, mortgage, nigeria, oem, phishing, pill, rolex, spyware, tobacco, toner, virus Stock spams, broken out in ~400 specific ticker symbols

Available Formats Anonymized (unanonymized with special request) Broken out into individual files or grouped into files according to:  hyperlinked domains in the body  month sent  last smtp relay Custom searches for specific text

Additional data ~290K whois records NS and A records for most  Worst offending class C and B stats ~240K Home pages ~99K raw home page downloads

Attachments 143K (1.83GB) unique categorized attachments  Largely images, some viruses, some others md5 and sha1 checksums at  Also directly queriable at attachsum.com:  ping 00006e57b2bfdb4141e8402aa7b267b3.md5sum.attachsum.com If it returns as an IP address, that checksum is a spam attachment

Automatic Spam Reporting Spamfeed - feed spam into bayesian learning system  My spam trains your spam filter  Currently Spamassassin, easily do others Checksum services  Razor, pyzor, DCC Categories fed to Agencies  FTC, Cable Assoc, FBI, Interpol, Treasury, Software Industry Assoc, APWG, FDA, USPIS, Rolex, SEC, ATF, Antivirus companies Custom feeds for ongoing investigations

Custom processing of your messages Extracting last smtp relay, spamvertised domains, images Breaking up messages by date, month, hyperlinked domains Anonymizing messages

Resources /sa-blacklist/