Modelling Incentives for Email Blocking Strategies Andrei Serjantov Richard Clayton WEIS 2005 KSG, Harvard 2 nd June 2005.

Slides:



Advertisements
Similar presentations
IP Warming Overview and Implementation Using Eloqua.
Advertisements

© 2012 Eloqua, Inc. Confidential 1 Deliverability and IP Warming Overview and Implementation Using Eloqua.
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
Managing Incoming Chapter 3 Bit Literacy. Terminology client – program which retrieves s from a mail server, lets you read the mails,
Using Capability to prevent Internet Denial-of-Service attacks  Tom Anderson  Timothy Roscoe  David Wetherall  Offense Team –Khoa To –Amit Saha.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Using Traffic Analysis to Detect Spam Richard Clayton TERENA, Lyngby, 22 nd May 2007.
Predicting Tor Path Compromise by Exit Port IEEE WIDA 2009December 16, 2009 Kevin Bauer, Dirk Grunwald, and Douglas Sicker University of Colorado Client.
Methods for Stopping Spam James Lick
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
Understanding the Network-Level Behavior of Spammers Anirudh Ramachandran Nick Feamster.
Distributed Intrusion Detection Systems (dIDS) 2/10 CIS 610.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Fighting Spam Randy Appleton Northern Michigan University
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
How to Own the Internet in your spare time Ashish Gupta Network Security April 2004.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Routing of Outgoing Packets with MP-TCP draft-handley-mptcp-routing-00 Mark Handley Costin Raiciu Marcelo Bagnulo.
By Laura Trawin.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
1 Authors: Anirudh Ramachandran, Nick Feamster, and Santosh Vempala Publication: ACM Conference on Computer and Communications Security 2007 Presenter:
Spam Reduction Techniques Using greylisting and SpamAssassin.
Size and Cost of the Problem Steve Atkins SpamCon Foundation Word to the Wise.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
‘Hosting & Server’ is constructed by Marketing Dept, InternetNow! International Sdn Bhd.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Taiwan Network Information Center Spam Status & Anti-Spam Schemes in Taiwan Taiwan Network Information Center David Chen Sep 5, 2002.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Quality Data: Fresno State's Analytics Strategy Rob Robinson Web Developer for Fresno
Staying Safe Online Keep your Information Secure.
© Toronto Area Security Klatch 2007 A drop-in anti-spam solution A 15 minute speed talk by Paul Wouters.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
BY OLIVIA WILSON AND BRITTANY MCDONALD Up Your Shields with Shields Up!
Prohibiting Redirection & Synthesized DNS Responses in Top Level Domains Mar 2010 Kuala Lumpur APTLD Meeting.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Identifying Application Impacts on Network Design Designing and Supporting.
Security at NCAR David Mitchell February 20th, 2007.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Team 6: (DDoS) The Amazon Cloud Attack Kevin Coleman, Jeffrey Starker, Karthik Rangarajan, Paul Beresuita, Arunabh Verma and Amay Singhal.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
| imodules.com Marketing Renovation Andrea Ganier and Josh Bourdon.
Web Content Filtering Mayur Lodha (mdl2130). Agenda  Need of Filtering  Content Filtering  Basic Model  Filtering Techniques  Filtering  Circumvent.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
How a major ISP built a new anti-abuse platform Mike O’Reirdan Comcast Distinguished Engineer Internet Systems Engineering Comcast National Engineering.
PwC New Technologies New Risks. PricewaterhouseCoopers Technology and Security Evolution Mainframe Technology –Single host –Limited Trusted users Security.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
Tracking Rejected Traffic.  When creating Cisco router access lists, one of the greatest downfalls of the log keyword is that it only records matches.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
An Analysis of Using Reflectors for Distributed Denial-of- Service Attacks Paper by Vern Paxson.
Hostway Confidential & Proprietary Introduction to Web Hosting.
Survey Results Aaron Brown Billy Kakes Calvin Ling Professor David Patterson.
#16 Application Measurement Presentation by Bobin John.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
5 Reasons Your Website Doesn’t Convert. Website Not Converting? Don’t Worry You invest time and energy to get on Page 1 of Google You have great keywords.
Yahoo Customer Service Phone Number , Jemishire CT, Piscataway, NJ United States.
– Protocols 21 – Protocols 21. – Protocols 21 Now we’ll move on to more technical aspects of This means protocols Remember.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Deliverability and IP Warming
DDoS Attacks on Financial Institutions Presentation
NET323 D: Network Protocols
NET323 D: Network Protocols
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Pavel Dobrý Engineering Director
Presented by Shashank Shekhar Sahoo
Presentation transcript:

Modelling Incentives for Blocking Strategies Andrei Serjantov Richard Clayton WEIS 2005 KSG, Harvard 2 nd June 2005

Summary Setting the scene The model The implications of the model What is the pattern of outgoing What is the pattern of incoming Where next?

Setting the scene goes via ISP “smarthosts” Blacklists identify spam sources –may be a factor for Bayesian classifiers –may be used to block the sender altogether ISPs act in an ad hoc manner doing what seems to make sense to their sysadmins, and sometimes their customers Blacklists pretty much ad hoc as well!

The Model A C B

Utility of ISP depends on its connectivity –Positive:ability to send to others Depends on how many people there are “out there” –Positive:reception of good from others Hard to perceive (all sorts of possible errors): ignore this term –Negative:reception of spam from others Depends on how vulnerable remote clients are And how many clients we have they may send to

Implications of the model The more “vulnerable” your clients are the bigger the negative term other ISPs see –they have to estimate this: guard your reputation! Dictionary attack spam affects large ISPs more (they have more clients who see it) Tit-for-tat blocking may work : remote ISP blocking us, we block them, our users don’t notice (!) but their users do

The view from large ISPs To large ISPs rest of world is very small Hence utility of connection to remote ISP dominated by how much spam they send Furthermore, utility equation dominated by self-sending term, and hence internal controls should be the overriding concern!

Outgoing Measured outgoing from Demon Internet (medium sized UK ISP) for four week period in March excluded virus infected, spam sources etc customers (>50% use Hotmail etc) s (of which “bounces”) destination MX servers but only used once (typos + spam rejects)

ISP Rôle s customers messagelabs.comSpam filtering 1,361,916 35,641 hotmail.comGlobal webmail 1,320,900 43,350 aol.comGlobal ISP 820,645 37,674 btinternet.comUK ISP 809,367 39,048 yahoo.co.ukUK portal 367,327 24,302 demon.netUK ISP (self) 363,112 15,212 ntl.comUK ISP 337,441 25,174 yahoo.comGlobal portal 298,491 18,139 uk.tiscali.comUK ISP 235,858 22,022 virgin.netUK ISP 189,389 18,358 schlund+partner German web hosting 166,077 14,540 nhs.uk UK health service 160,793 9,816 blueyonder.co.uk UK ISP 149,521 14,677 pipex.net UK ISP 97,495 9,576 spicerhaart.co.uk UK estate agent 85, clara.net UK ISP 82,309 8,106 mailcontrol.com Spam filtering 80,941 6,978 global.net.uk UK ISP 77,957 10,586 plus.net UK ISP 77,080 9,289 postini.com Spam filtering 74,777 6,092

Destinations: amount of Power law distribution –see paper for straight line graph viz: same amount of being sent to top 10 sites as to the next 100 as to the next 1000 as to the next 10000… A strategy that keeps only 10 destinations sweet (or only 100 etc) will fail

Destinations : number of senders 13 sites >10,000customers sending to them 213 sites >1,000customers sending to them 2601 sites >100 customers sending to them Potential for many complaints if just one of many other ISPs blocks Demon’s How much should Demon spend on their abuse team ? –clearly has a simple answer: Enough!

Incoming 14 days incoming million s 66.5% categorised as spam by “Brightmail” 13,378 sending ASs If an AS sent nothing but spam then would be rational to bar them –early test: one AS sent 9948, all spam in a day

Incoming: results inconclusive Many sources sent mainly spam, but still a few a day that were not Large volumes of spam (which would make real difference) accompanied by large volumes of good Much more study needed –results much influenced by Brightmail –fast responses needed (infamous AS now OKish)

Conclusions Model explains much real world behaviour Figures clearly show very diverse aspect to communications: so ISPs cannot operate on a handful of special relationships Barring incoming without impacting real traffic doesn’t look simple Still believe rational strategies are possible

Modelling Incentives for Blocking Strategies Andrei Serjantov Richard Clayton