Taking Common Action Against Spam Internet Society of China Beijing – 2004 Dave Crocker Brandenburg InternetWorking <http://brandenburg.com/current.html>

Slides:



Advertisements
Similar presentations
Anti-SPAM activities in Malaysia - Current Situation, Regulatory Environment and Future Developments ITU virtual conference on anti-spam regulation and.
Advertisements

Principle 2 Promoting the public good. Because the public sector is the mechanism through which governments deliver programs and services for the benefit.
Anti-Spam Management for Service Provider in Malaysia Alan Lee NTT MSC.
1 Effective, secure and reliable hosted security and continuity solution.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
EInfrastructures (Internet and Grids) US Resource Centers Perspective: implementation and execution challenges Alan Blatecky Executive Director SDSC.
Methods for Stopping Spam James Lick
How Will Authentication Reduce Global Spam? OECD Anti-Spam Task Force Pusan – September, 2004 Dave Crocker Brandenburg InternetWorking OECD Anti-Spam Task.
Security Controls – What Works
System Aspects of Spam Control Architecture and Operations Issues IBM Academy 6 Apr 2005 Dave Crocker Brandenburg InternetWorking IBM.
Developing Network Security Strategies Network Security D ESIGN Network Security M ECHANISMS.
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Spam May CS239. Taxonomy (UBE)  Advertisement  Phishing Webpage  Content  Links From: Thrifty Health-Insurance Mailed-By: noticeoption.comReply-To:
Computer Security: Principles and Practice
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Network security policy: best practices
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Understanding Active Directory
1 Internet Society of China (ISC) ANTI-SPAM Activities of Internet Society of China Anting HU Anti-Spam Committee of ISC Geneva, 13 Dec 2006.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Teamwork & Conflict resolution
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
ISO Richard Welford CSR Asia © CSR Asia 2011.
DNS-based Message-Transit Authentication Techniques D. Crocker Brandenburg InternetWorking D. Crocker Brandenburg InternetWorking.
Chapter 9: Cooperation in Intrusion Detection Networks Authors: Carol Fung and Raouf Boutaba Editors: M. S. Obaidat and S. Misra Jon Wiley & Sons publishing.
A’Lexus Williams CSC 104 Final Exam Part 1. Societal Topics Weeks 7 & 8 Internet Regulation-is basically restricting or controlling access to certain.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Department of Computer Sciences The University of Texas at Austin Zmail : Zero-Sum Free Market Control of Spam Benjamin J. Kuipers, Alex X. Liu, Aashin.
What is WHOIS?. 2  Internet Protocol you can use to search registry and registrar databases and discover who registered a domain name or IP address 
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Content Control Stewart Duncan Technical Manager.
Anti-Spam update Unsolicited Electronic Messages Bill and ISP Spam Code of Practice 2 February 2006 Keith Davidson Executive Director.
Botnet behavior and detection October RONOG Silviu Sofronie – a Head of Forensics.
Lanxin Ma Institute of High Energy physics (IHEP) Chinese Academy of Sciences September 30, 2004 CHEP 2004, Interlaken The Security Protection System at.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
Spam: Ready, Fire, Aim! APCAUCE / APRICOT Kuala Lumpur – 2004 Dave Crocker Brandenburg InternetWorking APCAUCE / APRICOT Kuala Lumpur – 2004 Dave Crocker.
IT Incident Response The goals How to achieve this Policies Standards Architecture People Process & Technology What can we really.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Mapping Internet Sensors with Probe Response Attacks Authors: John Bethencourt, Jason Franklin, Mary Vernon Published At: Usenix Security Symposium, 2005.
A Retrospective on Future Anti-Spam Standards Internet Society of China Beijing – September, 2004 Dave Crocker Brandenburg InternetWorking
ISC Anti-Spam Activities and Progress Li Hong Internet Society of China.
What is WHOIS?. 2  Internet Protocol you can use to search registry and registrar databases and discover who registered a domain name or IP address 
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
How a major ISP built a new anti-abuse platform Mike O’Reirdan Comcast Distinguished Engineer Internet Systems Engineering Comcast National Engineering.
Preserve and Enhance: Balancing Goals for the Internet APRICOT Kuala Lumpur – 2004 Dave Crocker Brandenburg InternetWorking APRICOT Kuala Lumpur – 2004.
The Success Failure INBOX Accountability Panel San Jose, CA – 2004 Dave Crocker Brandenburg InternetWorking INBOX Accountability Panel San Jose,
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Federal Aviation Administration 1 Collaborative Decision Making Improving Air Traffic Management Together…
Overview of ONC Report to Congress on Health Information Blocking Presented to the Health IT Policy Committee, Task Force on Clinical, Technical, Organizational,
Anti-spam activities in Korea Billy MH Cheon / Korea Network Information Center.
I SPCon 2003 – Evaluating Spam Control SolutionsBrandendenburg.com / 1 Points of Control UA = User Agent MTA = Message Transfer Agent o =originator.
Role Of Network IDS in Network Perimeter Defense.
Hosting Wide-Area Network Testbeds: Policy Considerations Larry Peterson Princeton University.
1 Outcome of the 4 th Global Animal Health Conference (GAHC) June 2015 Bettye K. Walters, DVM US Food and Drug Administration
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
[1] Control Spam by the Use of Greylisting Torgny Hallenmark LDC - Computing Center Lund University, Sweden TERENA Networking.
Fast Flux Hosting and DNS ICANN SSAC What is Fast Flux Hosting? An evasion technique Goal of all fast flux variants –Avoid detection and take down of.
Anti-Spam Updates Activity Coordination Meeting March 2006 Kevin Hill.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Instructor Materials Chapter 7 Network Security
U.S. Department of Justice
DDoS Attack Detection under SDN Context
IS4680 Security Auditing for Compliance
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Presentation transcript:

Taking Common Action Against Spam Internet Society of China Beijing – 2004 Dave Crocker Brandenburg InternetWorking < Internet Society of China Beijing – 2004 Dave Crocker Brandenburg InternetWorking <

2 2 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,2004 Setting the Context © 1975(!) Datamation © 1975(!) Datamation This? Oh, this is the display for my electronic junk mail.

3 3 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,2004 A Personal Perspective social  Spam is a complex social problem follow  Technical solutions must follow the social decisions  The situation is getting much worse, very quickly  It is like moving from a safe, small town to a big (U.S.) city  Spam is created in one country, and sent out from another  And no technique has yet reduced global spam!  Spam is a global problem  On the Internet, every place is a close neighbor common  We can only control it by taking common action social  Spam is a complex social problem follow  Technical solutions must follow the social decisions  The situation is getting much worse, very quickly  It is like moving from a safe, small town to a big (U.S.) city  Spam is created in one country, and sent out from another  And no technique has yet reduced global spam!  Spam is a global problem  On the Internet, every place is a close neighbor common  We can only control it by taking common action

4 4 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,2004 Wheel of Spam (Mis)Fortune  Control of spam  Techniques are not precise  We must balance the facets  Need many partial solutions  Heuristics to consider  Long lists  Complicated  Complicated  Be careful! Political Legal Social Human Administration Technical Management Deployment Many Facets of

5 5 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,2004 Formulating Proposals Spammers  “Accountable”  Legitimate businesses with aggressive marketing  Need rules to constrain  “Rogue”  Avoid accountability  Same as criminal virus and worm attackers Spammers  “Accountable”  Legitimate businesses with aggressive marketing  Need rules to constrain  “Rogue”  Avoid accountability  Same as criminal virus and worm attackers Pragmatic Approach  Specify:  Type of targeted spam  How it is occurring  How the mechanism will fix the problem  Explore how mechanism can fail

6 6 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,2004 A List of Common Suggestions  Initial suggestions from the anti-spam community  Most are useful for providers and countries everywhere  We need a venue for forming on-going agreements  Categories Legal: Legal: Formal boundaries and consequences Accountability: Accountability: For whitelisting(!) Administrative: Administrative: Organization commitment and efficiency Collaboration: Collaboration: Adapt and respond to changes Operations: Operations: Tools for responding  Initial suggestions from the anti-spam community  Most are useful for providers and countries everywhere  We need a venue for forming on-going agreements  Categories Legal: Legal: Formal boundaries and consequences Accountability: Accountability: For whitelisting(!) Administrative: Administrative: Organization commitment and efficiency Collaboration: Collaboration: Adapt and respond to changes Operations: Operations: Tools for responding

7 7 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,2004 Legal and Political  Provide government assistance and oversight  Treat spam as a common international and national emergency  This requires a commitment by both government and operators  Formulate Acceptable Use Policies (AUP)  Create legal procedures to disconnect spammers  Specify serious consequences for violating AUP  Provide government assistance and oversight  Treat spam as a common international and national emergency  This requires a commitment by both government and operators  Formulate Acceptable Use Policies (AUP)  Create legal procedures to disconnect spammers  Specify serious consequences for violating AUP

8 8 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,2004 AccountabilityAccountability  rDNS (in-addr.arpa)  Maintain IP address-to-name mappings for all visible addresses  Map to “useful” domain names  WHOIS information  Maintain accurate entries  Indirect spam referencing via ‘landing hosts’  Lines of accountability to owner of the host  rDNS (in-addr.arpa)  Maintain IP address-to-name mappings for all visible addresses  Map to “useful” domain names  WHOIS information  Maintain accurate entries  Indirect spam referencing via ‘landing hosts’  Lines of accountability to owner of the host

9 9 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,2004 Organizational and Administrative  Organization Structure  Use a unique ASN for each provincial "branch"  Create central authority to assist province administrators who provide direct policy enforcement  Network Structure  Separate dynamic and static IP's  Staff Support  Province/Network administrators must have authority to terminate quickly  Give them tools and training for disconnecting spammers  Organization Structure  Use a unique ASN for each provincial "branch"  Create central authority to assist province administrators who provide direct policy enforcement  Network Structure  Separate dynamic and static IP's  Staff Support  Province/Network administrators must have authority to terminate quickly  Give them tools and training for disconnecting spammers

10 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,2004 Collaboration Among Providers  Global  Create RFC-2142 addresses; register with abuse.net  Act on complaints made to abuse addresses  Forum for international sharing of methods and information  Government and operator participation in APCauce, SPAM-L, NANAE, etc.  National  Forum for Province administrators  Create a Chinese anti-spam site to help non-Chinese users report spam involving China  Global  Create RFC-2142 addresses; register with abuse.net  Act on complaints made to abuse addresses  Forum for international sharing of methods and information  Government and operator participation in APCauce, SPAM-L, NANAE, etc.  National  Forum for Province administrators  Create a Chinese anti-spam site to help non-Chinese users report spam involving China

11 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,2004 OperationsOperations  Prevention  Create a list of IP Address blocks that are run by anti-spam ISPs, to permit whitelisting(!)  Certify, block or rate-limit outbound SMTP for all hosts  Detection  Monitor traffic flows for “spikes”  Check outbound mail for viruses  Response  Create response-time targets (< 24 hours)  Responses in English would be nice  Prevention  Create a list of IP Address blocks that are run by anti-spam ISPs, to permit whitelisting(!)  Certify, block or rate-limit outbound SMTP for all hosts  Detection  Monitor traffic flows for “spikes”  Check outbound mail for viruses  Response  Create response-time targets (< 24 hours)  Responses in English would be nice

12 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,2004  Safe Internet service is achieved through collaboration among providers. A Direction for Collaboration? Safe Internet service requires collaboration among providers. We need a venue for collaborative development, assistance, monitoring and reporting of safe operational practices. Safe Internet service requires collaboration among providers. We need a venue for collaborative development, assistance, monitoring and reporting of safe operational practices. ASP Enterprise ISP Technology Standard Guideline Mutual Internet Practices Association

13 D. Crocker, Brandenburg InternetWorkingISOC China – Beijing,2004 SummarySummary  Spam is a complicated probem  It needs to be treated with all due respect  Spam is a universal problem  Fighting it requires global common action  Spam is an urgent problem  We must attack it together… now! Xie Xie  Spam is a complicated probem  It needs to be treated with all due respect  Spam is a universal problem  Fighting it requires global common action  Spam is an urgent problem  We must attack it together… now! Xie Xie