Mail-Filters Technical Presentation How it works, Why it’s Better.

Slides:



Advertisements
Similar presentations
Fred P. Baker CCIE, CCIP(security), CCSA, MCSE+I, MCSE(2000)
Advertisements

1 Effective, secure and reliable hosted security and continuity solution.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 4: Web Browsing.
Netscape Application Server Application Server for Business-Critical Applications Presented By : Khalid Ahmed DS Fall 98.
Lesson 4: Web Browsing.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
System Security Scanning and Discovery Chapter 14.
Computer Monitoring System for EE Faculty By Yaroslav Ross And Denis Zakrevsky Supervisor: Viktor Kulikov.
V1.00 © 2009 Research In Motion Limited Introduction to Mobile Device Web Development Trainer name Date.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Advanced Web 2012 Lecture 2 Sean Costain How the Web Works - Refresh Sean Costain 2012 The web is a matrix of servers that handle client requests.
Deployment Options Frank Bergmann
Computer Network (MASQ/NAT/PROXY)
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Installing software on personal computer
1 of 13 Back to Start Working Remotely Your company’s Windows SBS computer network makes it easy for you and your coworkers to work remotely—and to stay.
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
Overview SAP Basis Functions. SAP Technical Overview Learning Objectives What the Basis system is How does SAP handle a transaction request Differentiating.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
UNIT 14 Lecturer: Ghadah Aldehim 1 Websites. Introduction 2.
M. Taimoor Khan * Java Server Pages (JSP) is a server-side programming technology that enables the creation of dynamic,
Internet Service Provisioning Phase - I August 29, 2003 TSPT Web:
NETWORK CENTRIC COMPUTING (With included EMBEDDED SYSTEMS)
Administering Windows 7 Lesson 11. Objectives Troubleshoot Windows 7 Use remote access technologies Troubleshoot installation and startup issues Understand.
Chapter 7: Using Windows Servers to Share Information.
XA R7.8 Upgrade Process and Technical Overview Ruth Anne Pharr Sr. IT Consultant, CISTECH Inc.
PC Maintenance: Preparing for A+ Certification Chapter 25: The Internet.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Module 8: Managing Client Configuration and Connectivity.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Chapter 9: Novell NetWare
1.1 What is the Internet What is the Internet? The Internet is a shared media (coaxial cable, copper wire, fiber optics, and radio spectrum) communication.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
9 Chapter Nine Compiled Web Server Programs. 9 Chapter Objectives Learn about Common Gateway Interface (CGI) Create CGI programs that generate dynamic.
Bonrix SMPP Client. Index Introduction Software and Hardware Requirements Architecture Set Up Installation HTTP API Features Screen-shots.
Module 6 Planning and Deploying Messaging Security.
Module 4 Planning and Deploying Client Access Services in Microsoft® Exchange Server 2010 Presentation: 120 minutes Lab: 90 minutes After completing.
Computer Emergency Notification System (CENS)
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Mail-Filters The Global Leader in OEM Anti-Spam Solutions.
© Paradigm Publishing, Inc. 4-1 Chapter 4 System Software Chapter 4 System Software.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Web Server.
Enterprise Network Systems Client/ Server Mark Clements.
Introduction TO Network Administration
TOPIC 3 DATA TRANSMISSION AND NETWORKING MEDIA. INTERNET SERVICE PROVIDER (ISP) also known as Internet Access Provider (IAP) It is a company that offers.
Enterprise Network Systems TCP Mark Clements. 3 March 2008ENS 2 Last Week – Client/ Server Cost effective way of providing more computing power High specs.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
Role Of Network IDS in Network Perimeter Defense.
Windows SharePoint Services Installation and Configuration.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
LINUXCHIX WEBMAIL. Software run by an ISP or online service that provides access to send, receive, and review using only your Web browser. Users.
Troubleshooting Windows Vista Lesson 11. Skills Matrix Technology SkillObjective DomainObjective # Troubleshooting Installation and Startup Issues Troubleshoot.
VIRTUAL SERVERS Chapter 7. 2 OVERVIEW Exchange Server 2003 virtual servers Virtual servers in a clustering environment Creating additional virtual servers.
Unit 3 Computer Systems. What is software? unlike hardware it can’t be physically touched it’s the missing link between the computer hardware and the.
IST 201 Chapter 11 Lecture 2. Ports Used by TCP & UDP Keep track of different types of transmissions crossing the network simultaneously. Combination.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Chapter 7: Using Windows Servers
Chapter Objectives In this chapter, you will learn:
InGenius Connector Enterprise Microsoft Dynamics CRM
Netscape Application Server
Web Caching? Web Caching:.
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Presentation transcript:

Mail-Filters Technical Presentation How it works, Why it’s Better

Mail-Filter Technology Overview Why Mail-Filters Bullet Signature Creation Star Engine Process Overview Implementation Options SDK Contents Getting Started The API Commands Testing Options OEM Implementation Examples FAQs

Why Mail-Filters It’s Fast – 100s of messages per second (or higher) It’s Accurate – over 95% of spam caught, less than 1 in 1,000,000 false positive rate Many implementation options – the right solution for any environment It’s Proprietary – it’s not fooled by spammer tricks - gives time to market and competitive differentiation It catches Foreign Language Spam – in over 30 languages – a worldwide solution Easy Implementation – usually less than a day Full Support – Integration, technical support and training, marketing materials, sales training and lead generation

How Mail-Filters Works 2. Human Editors Craft Bullet Signatures 1. Spam Collection occurs from many sources 3. Bullet Signatures Are Updated Every 1-15 Minutes 4. Mail-Filters Technology Integrated into OEM Solutions - Catches Spam, without False Positives 5. Tuning Users and Administrators provide feedback to help identify spam and those that send them.

Bullet Signature Creation Mail-Filters’ Process Overview To Capture Spam & Create Bullet Signatures www Phish Trolling Quality Check Translation Tools Customer submissions Bullet Signatures Aristotle (Signature Auto-Suggest) Customer Mail-Filters Technology on Customer Device Spam DB Prioritization Process International Spam Harvester Partner Collections Phish Traps www Traffic and Connection Heuristics Spam Pre-Qualification Partner Pre-Qualification Expert Auto-Nominate Process Bullet Signature Updater Scam Sensors Traffic Analysis Pre-Qualified & Auto-Nominated Reputation Analysis Human Editors Language Assignment Spammer Profile Creation Data Quality Manager Culling Engine Mail-Filters Data Centers Message Profile Creation Traffic Profiles Bullet Signature Updates

STAR Engine Server STAR Engine Management Module Message Normalizer SnowFlake Buster Language Analyzer Malformed Message Processor Message Analysis Traffic Analysis Reputation Analysis Spammer Profile Check False Positive Rationalizer Bullet Signatures Bullet Signature Updater Mail-Filters Data Centers Known Good Mail Star Engine Process Overview Star Engine Interface OEM Software Is Message Spam? Yes / No

Implementation Options Enterprise –Most typical implementation – highest performance – uses more resources Desktop –Small footprint – message is local – scan and database is remote Embedded –Tiny amount of resources required – scanning is done remotely

Star Engine – Enterprise (Very High Performance) Can process 100s or even over 1000 messages per second Requests Bullet Signature updates every 1-10 minutes ( only changes are downloaded) The SEI and SES are typically deployed on the same hardware The SEI is linked into the OEM application using C or C++ The SES runs as a Service or Daemon and it manages it’s own Database Updates The Database is usually between 3-10MB – will download a fresh DB upon startup if none present OEM Application Server or Appliance Hardware Star Engine Interface (SEI) Star Engine Server (SES) (Service or Daemon) Linked Together by OEM at compile C or C++ API TCP / IP Mail-Filters Data Centers TCP / IP

Star Engine - Enterprise The Star Engine Server is fully multi-threaded The Star Engine Server will run as a Service under Windows or as a Daemon under Linux, FreeBSD, or Solaris TCP/IP outbound on Port 80 is required – IP proxies are supported Typical requirements are P4, 100MB RAM, Hard Disk optional A unique Mail-Filters Customer ID is required to download the Bullet Signature Database

Star Engine – Desktop (Small Footprint) Only requires 128kb of RAM Can process 10s of messages per second Secondary server can be anywhere, including and typically Mail-Filters’ Data Centers Database updates are not required on the SEI (just the SES) Same exact API as the Enterprise implementation Can also be used in a server cluster environment – many SEI’s feeding one SES OEM Application PC or Other Device (with limited resources ) Star Engine Interface Linked Together by OEM at compile C or C++ API TCP / IP Mail-Filters Data Centers TCP / IP Star Engine Server Separate Server

Star Engine – Embedded A Completely New Approach Anti-Spam detection for edge devices with almost no resource requirements OEM code requires less than 10kb of RAM No software need be installed on any user PC – the service is turned on or off at the OEM device Works with POP3 & IMAP OEM device intercepts the message delivery request and sends it to Mail- Filters Mail-Filters receives the messages on behalf of the end user, filters for viruses and spam, then sends the clean messages to the end user OEM or customer determines what happens to spam (delete, mark with an X- header, decorate the subject line) Since spam can be deleted and the downlink speed is probably slower than the link from Mail-Filters’ data centers to the servers – good mail will get to the end user faster. WWW PC Mail-Filters Data Centers Server 1. Client requests mail 2. OEM device intercepts the request based on port the request is made on (Ex. 110 = POP3) – and redirects the request to Mail-Filters’ data centers. 3, Mail-Filters makes the request on behalf of the user, filters the messages, then sends the good mail to the user. No mail is kept at Mail- Filters – it just passes through. 4. Mail-Filters’ authenticates as the user to the ISP or Corporate servers - the mail is delivered

Embedded Architecture OEM Application OEM Device Redirect Code Outbound Listening Code (Port 110 for POP3 or Port 147 for IMAP Requests) Customer Premise The Internet The Client requests from an server – it makes the request on port 110 or 147 – the OEM device redirects the request to Mail-Filters. A port is opened by the server via Mail-Filters to the PC. The is filtered, a policy is applied, then delivered to the Client. Mail-Filters Data Centers Server PCs

SDK Contents Star Engine Server software executables Star Engine Interface libraries in C and C++ Simple Single-Threaded implementation example application Documentation Typical integration time is less than a day

Getting Started with the SDK Install the Star Engine Server Run the Star Engine Server Run the Example Application –This application will scan the files in the directory of choice and all sub-directories to see if they are spam. The results will display on the screen. Begin the Integration to the OEM application

The Star Engine API (The Star Engine Interface) The Commands are Straight-Forward –Initialize – This command establishes a connection to the Star Engine Server –Shutdown – Used to tear down the thread after a successful Initialize command –Scan SMTP Buffer – Passes the SES the data to be scanned – will return TRUE if Spam –SCAN Buffer – Passes the SES data to be scanned – best used for non-SMTP types of content such as IM, SMS, web pages, etc. –Version – Returns the versions of all the components currently being used, including the database version date.

Testing Options The Mail-Filters database is culled to eliminate old/unused signatures. –As a result, the catch rate will suffer on old corpuses of –Best results are obtained with live (or very close to it) . There are several options to test the Mail-Filters technology –To test for catch rate or false positive rate Use the Example scan utility to check individual messages in a directory Send mail to an account Mail-Filters can set up for you at Cleantree.com. Good mail will go to the Inbox, spam to the Spam folder. Check results using your browser. Integrate into the OEM application and run it to check catch rate. –To test throughput: Unfortunately, the Example application is only a single-threaded application and will not show what the SES can achieve throughput-wise (it does fine on catch rate) The only fair test is to do an integration and run through it. Most OEMs fine the solution throughput is the same whether Mail-Filters technology is running or not. –To test Foreign Language: Do a beta test with a customer or partner in the region of interest Mail-Filters have several partners in various regions that may assist in a beta test, if desired.

Implementation Examples Enterprise –Most OEMs have implemented the Mail-Filters technology as the primary anti-spam solution AV solutions company scans for spam while it has the message in memory to scan for viruses. Because spam is more prevalent and is a much faster scan, spam is typically scanned for first. –Some have augmented their own anti-spam technology Because Mail-Filters technology is both fast and accurate, some have used it as a pre-processor to their own, more computationally expensive technology, to increase the throughput of the overall solution, and to increase spam catch rates.

Implementation Examples Desktop –Some devices don’t have the processing power or resources available for spam detection. For these, the Mail-Filters technology can provide a smaller footprint Firewalls, security gateways, messaging gateways, enterprise PCs may prefer a secondary server to handle the scanning to free up resources on their own hardware. –An MSP has a cluster environment where there are many SEIs feeding one SES per tower. This is very efficient and allows their overall throughput to increase dramatically.

Implementation Examples Embedded –Ideal for DSL routers, Cable Modems, Wireless gateways, SMB security gateways etc. –Because it requires no end user software installation or configuration, it is simple to sign- up and have spam and viruses eliminated.

Frequently Asked Questions How do I get the SDK? –Sign the Mail-Filters MNDA and we’ll send it to you via . Is the Star Engine Server multi-threaded? –Yes. Does it handle messages in double-byte character sets? –Yes, our technology catches spam in over 30 languages, including multi-byte character sets such as Japanese, Korean, Chinese, Arabic, and Hebrew. How is the update interval set – can it be changed? –The update interval is set by the OEM, but can be changed on a customer by customer basis. The default is an incremental every 10 minutes and a full update written to disk once a week. Will this solution work on less than a Pentium IV PC? –Yes, but it works more efficiently on a PIV.

Frequently Asked Questions What happens if the SES can’t get a database, or quits running, or some other catastrophe? –The SES or SEI will fail safe. It will return a FALSE ( the message isn’t spam) and continue to process messages while trying to reconnect. The customer will see more missed spam, but won’t miss any messages. What if the SES doesn’t have the rights to write the database to disk, or the disk is full? – The SES will continue to function properly and will acquire updates to the database in memory. The version command will return the database currently being used in RAM. Is the API really just 5 functions? –Yes – it doesn’t get much simpler than that. Can the SES return a probability of a message being spam? –No - Because the technology uses human editors to craft profiles and message signatures, we’re very very confident the message is spam if we identify it. Because our false positive rate is so low, our methodology is proven to be correct. A probability is required by technologies that guess or compute whether a message is spam – we know it, so we tell you. For those solutions that require a probability, they set our TRUE response to the highest probability – 10 or 1 or 100.

Conclusions The Mail-Filters technology is easy to implement and provides options for any situation. The underlying technology far surpasses what others are doing, giving the Mail-Filters OEM a significant advantage over competitors in catch rate and accuracy, language coverage, and throughput. Human review provides the difference -the technology delivers it.