23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.

Slides:



Advertisements
Similar presentations
Anti-SPAM experience at LAL Michel Jouvin LAL / IN2P3
Advertisements

Working with Outlook 2007 at CERN Outlook Main window Customize views Send s Organize s: Category, Follow-up flag, To-Do Bar Create signatures.
Basic Communication on the Internet:
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
6 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Electronic Mail Electronic mail has revolutionized the way people communicate.
Dealing With Spam The kind, not the Food product.
Course 201 – Administration, Content Inspection and SSL VPN Filtering
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
IMF Mihály Andó IT-IS 6 November Mihály Andó 2 / 11 6 November 2006 What is IMF? ­ Intelligent Message Filter ­ provides server-side message filtering,
Exchange 2003 and SPAM Fighting Emmanuel Ormancey, Rafal Otto Internet Services Group Department of Information Technology CERN 3 June 2015.
Basic Communication on the Internet: Integrated Browser Programs and Web-Based Services Tutorial 3.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Staff Computer Training Exchange 2003: More User Friendly Vicki Hecht Cherry Delaney ITaP Luncheon October 14, 2003.
Chapter 30 Electronic Mail Representation & Transfer
Marketing The Basics What is Marketing? marketing is the advertisement of a product, service, or brand through.
Word Templates- Documents Directly from GP.
Guide to Operating System Security Chapter 10 Security.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Spam Reduction Techniques Using greylisting and SpamAssassin.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
Exchange deployment at CERN and new ideas for SPAM fighting Michel Christaller, Emmanuel Ormancey, Alberto Pace.
Presenter notes This Microsoft Outlook 2010 presentation is a prepackaged solution designed to help attendees maximize the application. You may.
This is the first page of the log in, this is were you enter your unique details.
CT NIKHEF Nov Mail NIKHEF CT system support.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Company LOGO Exploring Using TWIG (Webmail) at ACC.
What’s New in WatchGuard XCS v9.1 Update 2. WatchGuard XCS v9.1 Update 2  Introduce New Features WatchGuard XCS Outlook Add-in Secur Encryption.
1 SMTP Transport Configuration SMTP Configurations and Virtual Servers Customizing the SMTP Service.
Login Screen This is the Sign In page for the Dashboard Enter Id and Password to sign In New User Registration.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
Unit 9 Communication Services
ProtectionProfiles. 2 Fortinet Technologies Protection Profiles Protection profiles control t the type of traffic protected t HTTP t FTP t IMAP t POP3.
Login Screen This is the Sign In page for the Dashboard New User Registration Enter Id and Password to sign In.
Module 8: Managing Client Configuration and Connectivity.
Electronic Mail Originally –Memo sent from one user to another Now –Memo sent to one or more mailboxes Mailbox –Destination point for messages.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
Unit 10 Communication Services.  Identify types of electronic communication  Describe users of electronic communication  Identify major components.
The Internet in Education Objectives Introduction Overview –The World Wide Web –Web Page v. Web Site v. Portal Unique and Compelling Characteristics Navigation.
Microsoft Outlook 2007 Basics Distance Learning (860) 343 – 5756 Chapman 633/632 Middlesex Community College Visit
Chapter 3 Social Media Revolution Video. 1. Guidelines a. Determine the information you need. b. Consider who is likely to have the info. c. Communicate.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Module 6 Planning and Deploying Messaging Security.
V 1.0 May 16,2011 Audience: Staff Outlook Agent For the latest version of this document please go to:
Unit 10 Communication Services
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
Dylan Bayliff. Contents: 1- Sending s & Using etiquette 2- Staying safe and Accessing 3- Open s 4- Replying to s 5- Setting up contacts.
Microsoft Office Outlook 2013 Microsoft Office Outlook 2013 Courseware # 3252 Lesson 6: Organizing Information.
Anti-Spam Tagging Al Lilianstrom. Spam Tagging The Computing Division is testing a Spam Tagging solution Based on SpamAssassin All incoming mail to the.
Outlook 2007 basics. Create an account An account must be created before sending/receiving . Follow these steps to create an account:
Update on  Mail Gateways  Servers  Spam Tagging  Anti-Virus  IMAP  Web Mail  LISTSERV  POP.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
1 Information Systems 2/26/03 Tom Coppeto Mark Silis MIT Mail System Update 26 February 2003.
«Fly Carrier» agent software Optimization of data transmission over IP satellite networks.
Managing Your Inbox. Flagging Messages Message requires a specific response or action from the recipient Flagging draws attention to your request Quick.
NetTech Solutions Microsoft Outlook and Outlook Express Lesson Four.
NetTech Solutions Troubleshooting Office Applications Lesson Seven.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
XP Exploring Outlook  Outlook is a powerful information manager  You can use Outlook to perform a wide range of communication and organizational tasks,
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Outlook / Exchange Training. Outlook / Exchange: Agenda What Can Microsoft Exchange Do / How works at UST? and Inbox Mailbox Quota Archiving.
Anti-Spam Updates Activity Coordination Meeting March 2006 Kevin Hill.
Internet Business Associate v2.0
Using Apps to Get and Share Information
راهنمای سیستم الکترونیکی دانشگاه تبریز
Configuring Internet-related services
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
This is the Sign In page for the Dashboard
Management Suite v2.0 DoubleCheck Manager Management Suite v2.0.
Presentation transcript:

23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002

23 October 2002Emmanuel Ormancey2 Topics  Statistics  Current Spam filtering at CERN  Products overview  Selected solution  How it works  Exchange 2000 integration

23 October 2002Emmanuel Ormancey3 Some statistics…  At CERN:  Low level existing filters: 25% of mails detected as spam and rejected.  New filtering solution identifies 10% more.  Measurements in Europe for 2001 (NetValue users panel) :  Spam increased of 80% in  36.8% of received mails are Spam.  According to US AntiSpam company Brightmail:  Spam increased of 450% during last year  74% of received mails are Spam.

23 October 2002Emmanuel Ormancey4 Current Spam Filtering  Basic checks:  Sendmail level tests.  Local lists of banned IP addresses, domains, subject keywords, s.  Header “consistency” tests (i.e. message id format).  Mail rejected if identified as Spam.  Manual work:  Update local banned lists from abuse reports.  Remove entries when users report false positive rejections.

23 October 2002Emmanuel Ormancey5 Commercial products  Commercial products too basic  Basic tests:  keywords in subject/body  IP address ban  Sender / recipient ban  Action:  Delete: helpdesk will receive user complaints if false positive.  Quarantine (i.e. Norton antivirus): require manual lookup to validate real spam and good mails.

23 October 2002Emmanuel Ormancey6 SpamAssassin testing  How it works:  All in one: Different tests based on different techniques  Client / server version, with a ‘simple client’ allowing portability.  Good for spam detection.  Stability problem (on our Solaris).  Need to correct regular expressions bugs.  Not enough, need a mix of:  Mail content tests (SpamAssassin)  Low level “sendmail” tests (actual spam tests)  Need some custom rules and tests.  Need logs and statistics.

23 October 2002Emmanuel Ormancey7 Solution  Start from SpamAssassin base  Add existing rules and custom tests  Easy to modify and to create add-ins.  Windows based: Future Exchange 2000 C#.NET SpamKiller  Easy to develop in any language.  Compiled regular expressions, compatible with unix.  After 3 months running and stress testing: no crash, no leak: seems stable.

23 October 2002Emmanuel Ormancey8 Detecting spam - Tests  Different tests:  Text only (regular expressions):  Header  Body full text  Body raw for base64 encoded spam  “Smart tests” more complex than regular expressions.  Header consistency.  Open relays blacklist check on several servers.  Catalog check: compares mail with spam catalog (calculated signatures and subjects keywords).

23 October 2002Emmanuel Ormancey9 Detecting spam – Scoring  Score calculation:  Each test returning true returns a score.  If sum of all scores is greater than ‘required hits’, mail is spam.  Lowest ‘required hits’ value is 5. Sample : Spam: True ; / 5 Content analysis details: (5.559 hits, 5 required) 2 points: HTML-only mail, with no text version 0.21 points: 'Received:' has 'may be forged' warning points: Subject has an exclamation mark 0.5 points: Spam phrases score is 00 to 01 (low) points: 'remove' URL contains an address

23 October 2002Emmanuel Ormancey10 Detecting spam - Action  When spam is detected:  Do not delete mail, it may be an error or a commercial mailing list subscribed by user.  Do not reply to sender “we don’t accept spam” → it helps to improve spammer techniques.  Do not quarantine mail at server level: too much traffic and too much work.  A good mail service don’t loose mails. Solution: Let the user decide  Quarantine spam mail at the user level.  Allow user to check in quarantined mails for missing mails.  Allow user to choose a spam detection level (lowest level = 5)  Allow user to choose quarantine behavior.

23 October 2002Emmanuel Ormancey11 User choice Configure Spam Level. Set expiration time. Cern Spam folder automatically created.

23 October 2002Emmanuel Ormancey12 SpamKiller – Overview  Server:  Windows service.  Multithread "http like" server (clients on any platform can use it).  High exception catch to prevent server crash on error or bug.  Configuration:  Configuration in XML files (import from original SpamAssassin configuration possible).  Precompiled regular expressions to gain performance.  Statistics and logging:  Logs to perfmon (performance monitor) real-time statistics.  Logs statistics into XML files.

23 October 2002Emmanuel Ormancey13 Exchange integration Exchange SMTP (1 to n servers) Incoming mail Spam Killer service (1 to n servers) SMTP Event sink Add header if score >= 5 Check mail Return score Internet Exchange store Asynchronous OnSave Event sink 1.Check user requested spam level. 2.Check header for score. 3.Move mail to CERN Spam if score > requested level.

23 October 2002Emmanuel Ormancey14 Reporting Spam  Outlook XP: Com Add-in adds button to report spam (moves selected mails to specific public folder).  Others: Forward mail to

23 October 2002Emmanuel Ormancey15 Use of reported Spam  Spam reported with add-in button:  Mail in original format.  Create signatures.  Add signatures to catalog.  Can be automated.

23 October 2002Emmanuel Ormancey16 Use of reported Spam  Spam forwarded to  Mail modified due to forward.  Extract header information.  Create catalog:  Subjects  IP  Senders

23 October 2002Emmanuel Ormancey17 Statistics Online statistics available on SpamKiller website:

23 October 2002Emmanuel Ormancey18 Conclusion  Now available to CERN Exchange users.  Up since July.  Low manual work: populate Spam catalog with tools, tune rules.  Problem with mailing lists filtering: add white list at user level in next release.  Clients can be created on any system. (possible reuse of SpamAssassin client).

23 October 2002Emmanuel Ormancey19 Questions ? Contact: