Spam from an ISP perspective Simon Lyall, Ihug Uniforum NZ NetForum Conference July 2003.

Slides:



Advertisements
Similar presentations
Eloqua Providing Industry-Leading Management Tools.
Advertisements

1 Bandwidth management essentials Issues for technical staff and technical solutions.
Google Series Part 1: gmail Part 2: maps Part 3: talk Part 4: earth Part 5: books Part 6: picasa Part 7: sites Part x: ?
1 Effective, secure and reliable hosted security and continuity solution.
Justin Mason, SpamAssassin Project & Deersoft
IP Warming Overview and Implementation Using Eloqua.
© 2012 Eloqua, Inc. Confidential 1 Deliverability and IP Warming Overview and Implementation Using Eloqua.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Module 6 Implementing Messaging Security. Module Overview Deploying Edge Transport Servers Deploying an Antivirus Solution Configuring an Anti-Spam Solution.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Methods for Stopping Spam James Lick
Course 201 – Administration, Content Inspection and SSL VPN Filtering
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
FROM RICHARD RODRIGUES JOHN ANIMALU FELIX SHULMAN THE HONORARY MEMBERS OF THE INTERCONTINENTAL GROUP Information security in real business firewall security.
UC Irvine’s New Anti-Spam Measures Keith Chong Network & Support Programming Network & Academic Computing Services UC Irvine August 9, 2005 Keith Chong.
Issue Project - SPAM - EDCI 564 Vaithinathan Vanitha & Sookeun Byun.
Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and.
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
Office 365 SMTP Relay June Relay Method Send to rcpts in domain Relay to Internet via O365 Configuration Requirements Requires Authentication.
Using the Engaging Networks tools Ghazal Vaghedi Toronto February 21, 2012 #12ENCONF.
Broadcast service Core tools. Agenda 1.Introduction – tool and its main features 2.Setting up and sending a simple broadcast 3.Achieving.
Spam Resources How can I help you? William Stearns
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
Spam Reduction Techniques Using greylisting and SpamAssassin.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
OCR Functional Skills Keywords Use the right keywords To do this you need to know what it is you are searching for! – For example, you might want to search.
IP Blacklisting Causes & Solution Marcus Low, R&D Director InternetNow International Sdn Bhd.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
1 RedIRIS Reputation Block List September RedIRIS Reputation Block ListPágina 2 RedIRIS and mail services At the beginning, RedIRIS was directly.
Taiwan Network Information Center Spam Status & Anti-Spam Schemes in Taiwan Taiwan Network Information Center David Chen Sep 5, 2002.
Untouchable?: A Canadian Perspective on the Anti- Spam Battle Michael Geist Canada Research Chair in Internet & E- commerce Law University of Ottawa, Faculty.
Copyright © 2000, ZipLink Inc. Patent Pending 1 Mail Message Metering or, how to block outbound spam Robert D. Haskins.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Networking I Chapter II The Internet. How does one Connect? Dial-Up Connection – Modem ISDN – Integrated Services Digital Network DSL – Digital Subscriber.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
Combating Abuse Brian Nisbet NOC Manager HEAnet.
© Toronto Area Security Klatch 2007 A drop-in anti-spam solution A 15 minute speed talk by Paul Wouters.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
An Anti-Spam Method with SMTP Session Abort Nariyoshi YAMAI 1 Kiyohiko OKAYAMA 1 Takumi SEIKE 1 Keita KAWANO 1 Motonori NAKAMURA 2 Shin MARUYAMA 3 1 Okayama.
and VOIP. Definitions Storage- the action or method of storing something for future use. Forward system- Address book- A book for recording the.
Using Traffic Shaping to Combat Spam David Cawley, Senior Engineer December 12th, 2007.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
Anti-Spam update Unsolicited Electronic Messages Bill and ISP Spam Code of Practice 2 February 2006 Keith Davidson Executive Director.
Tired of Spam? The solution is MailWasher
Anti-Spam Tagging Al Lilianstrom. Spam Tagging The Computing Division is testing a Spam Tagging solution Based on SpamAssassin All incoming mail to the.
SpamAssassin Filter Rodney Weakly April 26, 2006.
XP Practical PC, 3e Chapter 7 1 Connecting to the Internet.
SpamAssassin An Introduction PacNOG I Workshop June 20, 2005 Nadi, Fiji Hervey Allen.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, and Ivan Osipkov. SIGCOMM, Presented.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Understanding the network level behavior of spammers Published by :Anirudh Ramachandran, Nick Feamster Published in :ACMSIGCOMM 2006 Presented by: Bharat.
Source pictures for document ”Thoughts about increasing spam annoyance” by License: This material may be distributed only subject.
How a major ISP built a new anti-abuse platform Mike O’Reirdan Comcast Distinguished Engineer Internet Systems Engineering Comcast National Engineering.
By Toby Reed.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
[1] Control Spam by the Use of Greylisting Torgny Hallenmark LDC - Computing Center Lund University, Sweden TERENA Networking.
Anti-Spam Updates Activity Coordination Meeting March 2006 Kevin Hill.
Spamfilter Relay Mailserver Mark McSweeney CentraLUG, February 1, 2010.
28th March 2003 SPAM Presenter: Matthew Sullivan.
Deliverability and IP Warming
CONNECTING TO THE INTERNET
Firewalls Routers, Switches, Hubs VPNs
This is the Sign In page for the Dashboard
Presentation transcript:

Spam from an ISP perspective Simon Lyall, Ihug Uniforum NZ NetForum Conference July 2003

Who is Ihug? 3 rd largest ISP in New Zealand 90,000 dialup and broadband customers System software: Exim, qmail, openldap on Debian Linux. system spread across 14 servers. Duplicate system in Australia.

The Scale of the Problem Total s received each day1,250,000 Estimate Legitimate s per day 400,000 Estimated Spam s per day 560,000 Sent to invalid addresses 270,000 Proportion of that is Spam60%

Spams Blocked per customer PercentileSpams/dayUnblocked

Mid 2004 on Current trends ● Total volume has doubled in 12 months ● 90% of each customer's is Spam ● Anti-Spam solutions need to block 95-98% of Spam ● 2004's Spam has evolved to beat 2003's filters

If 10% monthly growth for 12 months PercentileSpams / dayUnblocked

History of Spam Filtering at Ihug Before 2000Little or no filtering Feb 2002 MAPS RBL Jun 2003MAPS RBL+ & Spamcop Jun presentSpamassassin based

Why ISPS care about Spam? ● Customers Unhappy – Close accounts – Blame the provider – Call helpdesk – Install their own anti-spam software ● Resources Wasted ● Staff unhappy/offended/wasting time ● Money to be made

Customer expectations of Mail and Anti-Spam system ● All must go through instantly – Bouncing or deleting suspected spam is not an option – False positives must be kept to an absolute minimum ● Except the mail I don't want – 100% hit rate is expected – Each customer's definition of Spam is unique ● Must be free and involve no work for me ● Must be optional

Technology for Blocking Spam ● External Solution Providers ● DNSBLs ● Other methods

External Providers ● Pros ● Brandname Product ● Support ● Pretty Effective ● Cons ● Cost ● Not 100% effective ● Implementation costs

DNS Block Lists (DNSBLs) ● Used to check IP of sending server ● VERY wide variety of DNSBLs and organisations running them. ● Wide range in quality, goals and usefulness. ● Spam Blocking vs Behavour Changing vs Group of Networks

Types of DNSBLs ● Open Relay (ORDB) ● Open Proxy, Open formail (monkeys.com) ● Country or Provider based (blackholes.us, Cluecentral) ● Dialup and Dynamically assigned Ips (MAPS DUL) ● Known Spammers, Spam friendly ISPs, slow reacting ISPs (Spews, Spamhaus SBL)

Types of DNSBLs (cont) ● Current Spam (bl.spamcop.net, MAPS RSS) ● Whitelists (bondedsender.org) ● Other – Random – Everything – Very aggressive – Specific – Private

Using DNSBLs ● Read the listing and delisting criteria ● Don't use duplicate lists ● They ALL make mistakes ● Some make more mistakes than others ● Make sure the list's values align with yours ● Mirror the lists locally to cut down on delays

Other Technologies ● Distributed Checksums (Razor, DCC) ● Suspicious Connection Throttling ● Marking non-Spam – Habeas – Bonded Sender – Challenge response (Earthlink, Actrix) – Force lists to register (AOL)

Other Technologies (cont) ● Baysian – Paul Graham article ● Rules Based – Procmail – Spamassassin – Spambouncer

Integrating Spam filtering ● It must be optional. ● Customers must be able to examine and retrieve deleted ● Remember each customer is different ● Plan beforehand what to do about mistakes ● Aim to block at least 90% of Spam ● Remember to review and upgrade regularly

Controlling Customers ● Clear AUP ● Ability to suspend and close customers ● Monitored abuse address ● Open relay scanning ● Open proxy scanning ● Port 25 blocking ● Management support

Questions ● This talk online –

Links ● External Providers – Brightmail – Postinihttp:// – Message Labshttp:// ● RBLs – Multi RBL lookuphttp:// – MAPShttp:// – Spamcophttp://spamcop.net/bl.shtml – Spamhaus

More Links ● Software – Spamassassin – Procmail ● Baysian Filters – Paul Graham – Bogofilterhttp://bogofilter.sourceforge.net ● Reporting Spam – Abuse.nethttp://