Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan 2003.8.25 Dave Crocker Brandenburg InternetWorking

Slides:



Advertisements
Similar presentations
The Benefits and Challenges of Implementation of Basel II in Europe José María Roldán | 27 Sept 2005.
Advertisements

Virtual Conference on Anti-spam Regulation and Policy Development Sharing The Singapore Experience By Low Boon Kiat Policy & Competition Development Group.
Anti-Spam Management for Service Provider in Malaysia Alan Lee NTT MSC.
1 Effective, secure and reliable hosted security and continuity solution.
Identify Problems, Planning Objectives and Constraints.
Basic Communication on the Internet:
Introduction to the Anti-Spam Research Group (ASRG) Presented by Yakov Shafranovich, ASRG Co-chair NIST Spam Technology Workshop Gaithersburg, Maryland,
Chapter 19: Network Management Business Data Communications, 5e.
Presented to Adventist Educational Leaders and Practitioners By Dr. Lilya Wagner, CFRE.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Methods for Stopping Spam James Lick
The Dance of Co-Opetition Dave Crocker Brandenburg Consulting MY: +60 (19) (408)
Access Control Methodologies
How Will Authentication Reduce Global Spam? OECD Anti-Spam Task Force Pusan – September, 2004 Dave Crocker Brandenburg InternetWorking OECD Anti-Spam Task.
Proposal Writing Workshop Features of Effective Proposals: Fellowship Track Washington, DC January 9, 2014.
IMF Mihály Andó IT-IS 6 November Mihály Andó 2 / 11 6 November 2006 What is IMF? ­ Intelligent Message Filter ­ provides server-side message filtering,
System Aspects of Spam Control Architecture and Operations Issues IBM Academy 6 Apr 2005 Dave Crocker Brandenburg InternetWorking IBM.
Risk Management and Strategy Prioritisation Intelligence Step 8 - Risk Management and Strategy Prioritisaiton Considering the risks associated with action.
Spam May CS239. Taxonomy (UBE)  Advertisement  Phishing Webpage  Content  Links From: Thrifty Health-Insurance Mailed-By: noticeoption.comReply-To:
Lecture 11 Reliability and Security in IT infrastructure.
The State Aid Action Plan Thibaut KLEINER DG COMP Global Competition Law Centre 19 September 2005 – Brussels.
Health Systems and the Cycle of Health System Reform
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
Simple, Effective, Transparent Regulation: Best Practices in OECD countries Cesar Cordova-Novion Deputy Head of Programme Regulatory Reform, OECD.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Exchange deployment at CERN and new ideas for SPAM fighting Michel Christaller, Emmanuel Ormancey, Alberto Pace.
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray,
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Untouchable?: A Canadian Perspective on the Anti- Spam Battle Michael Geist Canada Research Chair in Internet & E- commerce Law University of Ottawa, Faculty.
E-Domec Electronic archving and document management in the Commission.
SEC835 Database and Web application security Information Security Architecture.
© 2007 Convio, Inc. HOW TO: Best Practices for Sending to Organizations Confidential for use by American Cancer Society and Convio – Copyright ©
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Taking Common Action Against Spam Internet Society of China Beijing – 2004 Dave Crocker Brandenburg InternetWorking
DNS-based Message-Transit Authentication Techniques D. Crocker Brandenburg InternetWorking D. Crocker Brandenburg InternetWorking.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Department of Computer Sciences The University of Texas at Austin Zmail : Zero-Sum Free Market Control of Spam Benjamin J. Kuipers, Alex X. Liu, Aashin.
SALSA-NetAuth Joint Techs Vancouver, BC July 2005.
A Trust Overlay for Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg.
Event Management & ITIL V3
Cluster Management Scorecard FITT (Fostering Interregional Exchange in ICT Technology Transfer)
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Object-Oriented Software Engineering Practical Software Development using UML and Java Chapter 1: Software and Software Engineering.
Spam: Ready, Fire, Aim! APCAUCE / APRICOT Kuala Lumpur – 2004 Dave Crocker Brandenburg InternetWorking APCAUCE / APRICOT Kuala Lumpur – 2004 Dave Crocker.
GovernmentConnect is a software solution that supports business operations and all important business processes within government institutions. It enables.
A Retrospective on Future Anti-Spam Standards Internet Society of China Beijing – September, 2004 Dave Crocker Brandenburg InternetWorking
Directorate for Food, Agriculture, and Fisheries 1 ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT ORGANISATION DE COOPÉRATION ET DE DEVELOPMENT.
NMI End-to-End Diagnostic Advisory Group BoF Fall 2003 Internet2 Member Meeting.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, and Ivan Osipkov. SIGCOMM, Presented.
Detecting Phishing in s Srikanth Palla Ram Dantu University of North Texas, Denton.
Source pictures for document ”Thoughts about increasing spam annoyance” by License: This material may be distributed only subject.
Objectives and Criteria: What are they and how do we use them? Where do they come from? What are the “must-have” criteria? How are market and government.
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
The Success Failure INBOX Accountability Panel San Jose, CA – 2004 Dave Crocker Brandenburg InternetWorking INBOX Accountability Panel San Jose,
Forum on Internet of Things: Empowering the New Urban Agenda Geneva, Switzerland, 19 October 2015 Cooperation and Opportunities for Standards in the New.
1 DMPT: Controlling Spam Through Message Delivery Differentiation Zhenhai Duan, Kartik Gopalan Florida State University Yingfei Dong University of Hawaii.
Extracting value from grey literature Processes and technologies for aggregating and analysing the hidden Big Data treasure of the organisations.
I SPCon 2003 – Evaluating Spam Control SolutionsBrandendenburg.com / 1 Points of Control UA = User Agent MTA = Message Transfer Agent o =originator.
Continual Service Improvement Methods & Techniques.
1 An Overview of Process and Procedures for Health IT Collaboration GSA Office of Citizen Services and Communications Intergovernmental Solutions Division.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
TIARA – WP6 Involving Industry in TIARA Lucio Rossi (WPD) CERN.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
ADDRESS INTERNATIONALIZATION ( EAI ) ICANN-55 Mar 06, 2016 TF-AIDN Member 35+ Min : 10- Min ( Q & A )
Group 9: Matilda Akkola, Reetta Arokoski, Lauri Kokkila, Miikka Laitila CROWDSOURCING: HOW TO BENEFIT FROM (TOO) MANY GREAT IDEAS? “The article gives recommendations.
The Challenge of Spam Spam is a harmful, costly, and evolving threat to Internet users. A collaborative approach is needed to provide the best spam-mitigation.
Internet Interconnection
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
KNOWLEDGE MANAGEMENT (KM) Session # 36
Presentation transcript:

Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking

2 What we will discuss Derived from  We need a “framework” for spam  Technical response to a social problem  Points of control in the architecture  How do the components provide opportunities?  We need a framework for spam control  What is practical and effective on a global scale?  Evaluating proposals  Carefully consider any changes to global infrastructure

3 What is Spam? Challenges  No clear community consensus on definition  Strong on emotion  Weak on useful discussion  Minor, transient technical differences from other mail (!)  Internet mechanisms are expensive to implement  We must ensure they will quickly be effective for extended time Sample Definitions 1.Whatever the sender decides  This means we cannot provide institutional enforcement 2.Unsolicited Commercial  Religious, political, and “crazies” are just as problematic 3.Unsolicited Bulk  Focus on consent/permission  Focus on aggregate traffic

4 Experience of Spam  It is very serious, and it is getting worse  It is probably permanent, like cockroaches  It probably can be controlled to an acceptable level  But spammers are smart and adaptable  Likely to require an array of techniques  Legal, administrative, and filtering  Service providers and users  Collaborative and independent  Simple rules and statistical heuristics

5 Types of Spammers  Accountable  Legitimate businesses engaging in aggressive marketing, in the absence of formal rules  Rogue  Actively avoid accountability  Likely to always have “safe haven”  Not always seeking money

6 Points of Control UA = User Agent MTA = Message Transfer Agent o =originator i = intermediate r = recipient MTA r UA r UA o MTA o DNS MTA i1 MTA i2  Accountability  Filtering  Enforcement  Accountability  Filtering  Enforcement  Filtering

7 Types of Control Proactive  Accountability  Sender/author  Sending host  Enforcement  Laws and contracts  Scope of control?  Sufficiently objective rules?  Avoids negative side-effects Reactive (filtering)  Detection  Source or destination  Content  Aggregate traffic  Action  Divert or delete  Label  Notification

8 Filtering  Detection CriteriaAttribute, semantic, process Match the criteria? Positive vs. negative Likelihood of error? False positive or negative Explicitly registered? Whitelist or blacklist  Disposition Accept or RejectDanger if not recipient Label the messageStill requires action Notify interested partiesThen do what?

9 Evaluating Proposals  Adoption  Effort to adopt proposal  Effort for ongoing use  Balance among participants  Threshold to benefit  Operations impact on  Adopters of proposal  Others  Internet scaling – What if…  Use by everyone  Much bigger Internet  Robustness  How easily circumvented  System metrics  Cost  Efficiency  Reliability  Impact  Amount of Net affected  Amount of spam affected  Test scenarios  Personal post/Reply  Mailing List  Inter-Enterprise

10 A Sample Array of Efforts  Terminology and labels  UA/MTA spam information exchange  Provide examples and filter rules  Message authentication  Not the same as content authentication  MTA/MTA reporting  Collaborate on aggregate traffic analysis

11 In summary  Changes to complex systems always have unintended, negative consequences  We must attack spam, but we must attack it carefully  Attacking superficial spam characteristics invites an arms race  Constantly “improving” tools, but constantly failing to reach a stable level of effectiveness  Adequate solutions for one constituency might be inappropriate for another  Look at their communications styles