How a major ISP built a new anti-abuse platform Mike O’Reirdan Comcast Distinguished Engineer Internet Systems Engineering Comcast National Engineering.

Slides:



Advertisements
Similar presentations
Eloqua Providing Industry-Leading Management Tools.
Advertisements

1 Effective, secure and reliable hosted security and continuity solution.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Microsoft ® Exchange Online Advanced Security Name Title Microsoft Corporation.
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
FIREWALLS Chapter 11.
Module 6 Implementing Messaging Security. Module Overview Deploying Edge Transport Servers Deploying an Antivirus Solution Configuring an Anti-Spam Solution.
Curtis Parker | December 2010 | Microsoft Corporation.
Barracuda Security Service. Barracuda Networks Introduction to Barracuda Security Service 2 Easy to Deploy Cloud-based security Nothing.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
Exchange 2003 and SPAM Fighting Emmanuel Ormancey, Rafal Otto Internet Services Group Department of Information Technology CERN 3 June 2015.
Unified Logs and Reporting for Hybrid Centralized Management
Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and.
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Princeton University
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
SIM334. Internet Comprehensive Protection Multi-Engine Antivirus and Multi layered continuously evolving Anti-spam In the Leader’s quadrant in the.
Team Excel What is SPAM ?. Spam Offense Team Excel '‘a distinctive chopped pork shoulder and ham mixture'' Image Source:Appscout.com.
Barracuda Spam & Virus Firewall. Introduction to the Barracuda Spam & Virus Firewall Complete server protection –Spam Blocking (95+ percent) Extremely.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.
1 RedIRIS Reputation Block List September RedIRIS Reputation Block ListPágina 2 RedIRIS and mail services At the beginning, RedIRIS was directly.
Forefront Security Exchange. Problem Meddelande system och sammarbetsprodukter är underbarar mål för elak kod och “distrubition” av äkta dynga… Viruses.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
1 SMTP Transport Configuration SMTP Configurations and Virtual Servers Customizing the SMTP Service.
DUKE UNIVERSITY DNSSEC 101 Kevin Miller.
Copyright© Microsoft Corporation Speaker:Engagement consultant Title of presentation:Assessment of the Environment Length of presentation: 45 minutes Audience:Customer.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
Combating Abuse Brian Nisbet NOC Manager HEAnet.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
© Toronto Area Security Klatch 2007 A drop-in anti-spam solution A 15 minute speed talk by Paul Wouters.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
Classification 10/3/2015 Worry-Free Business Security 5.0.
Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.
Module 6 Planning and Deploying Messaging Security.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Content Control Stewart Duncan Technical Manager.
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Spam from an ISP perspective Simon Lyall, Ihug Uniforum NZ NetForum Conference July 2003.
2.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 2: Examining.
Detecting Phishing in s Srikanth Palla Ram Dantu University of North Texas, Denton.
Source pictures for document ”Thoughts about increasing spam annoyance” by License: This material may be distributed only subject.
Department of Computer Science and Engineering Applied Research Laboratory Architecture for a Hardware Based, TCP/IP Content Scanning System David V. Schuehler.
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
1 Hosted security and continuity. 2 GFI MAX MailProtection overview GFI MAX MailProtection is a cloud-based security solution » Inbound .
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
Implementing Microsoft Exchange Online with Microsoft Office 365
Connect Applications and Business Partners in Integration Cloud, the Reliable and Transparent Integration Environment Built on Microsoft Azure MICROSOFT.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Using Multihomed BGP Networks.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
Exchange versionMainstream support phase Extended support phase Exchange Server 5.512/31/20031/10/2006 Exchange 2000 Server12/31/20051/11/2011 Exchange.
Dell SonicWALL Security Series 2/14. Confidential 2 Dell SonicWALL Security solutions Product overview Agenda About threats Protecting.
Fighting Spam in an Exchange Environment Tzahi Kolber IT Supervisor - Polycom Israel.
FNAL Central Systems Jack Schmidt, Al Lilianstrom, Ray Pasetes, and Kevin Hill (Fermi National Accelerator Laboratory) Introduction The FNAL .
A Virtual Tour of SophosLabs Building next-generation protection
Exchange Online Advanced Threat Protection
Lab A: Planning an Installation
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Exchange Online Advanced Threat Protection
Network Attached Storage NAS100
Firewalls Jiang Long Spring 2002.
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Presentation transcript:

How a major ISP built a new anti-abuse platform Mike O’Reirdan Comcast Distinguished Engineer Internet Systems Engineering Comcast National Engineering & Technical Operations

Outline Comcast facts and figures Why build a new platform Fundamentals of anti spam Size of the problem Previous approach Current solution Migration methods Current status

Why a new platform? Moved from a hosted to an in-house platform Need to improve customer experience by further reducing volumes of spam to the mailbox Deploy a platform which can economically and easily scale Emerging threats in abuse landscape Image spam Botnets VoIP spam (SPIT) Need to have a plug-and-play architecture Firmly believe that no one vendor will be the best forever We need a mix of vendors and approaches to hedge our bets and reduce risk Somebody in this room may be our next vendor when you have gone from the lab to the VC and into beta

Size of the problem Volumes of spam are astronomical 596 million connection attempts (Jan25th 2008) 539 million connection attempts rejected 93% spam 76 million messages delivered Connection attempts increases massively above this around holidays such as Thanksgiving. The problems is criminality at massive scale

Fundamentals of anti-spam Not much differentiation between major mail box hosters and other ISPs with regard to spam percentages and volumes Three stages Blocking based on IP (reputation and DUL space) –5% of CPU cycles –Removes ~70% of the spam Blocking based on message protocol and heuristics –10% of CPU cycles –Removes ~15% of the spam Blocking based on content –85% of CPU cycles –Remove ~10% of the spam Idea is to use the least cycles to remove the most messages

Previous approach 100s of Linux blade servers No site fail over Multiple RBLs using BIND for DNS Heuristics and protocol filtering Spam content filtering using industry standard software Virus filtering using industry standard software

New Approach Fewer Linux Blade servers distributed over two sites Full dual site redundancy with each site fully capable of carrying 100% of traffic RBLs hosted on a specialised DNS based platform Trend Spamhaus Return Path Protocol and heuristics filtering performed on the Bizanga IMP MTAs which run on Linux Spam content filtering technology Anti-virus technology

Heuristics employed Directory Harvest attack Dictionary attack rDNS check Throttling Dynamic space blocking Non-existent user block

Content filtering-detecting spammy content Cloudmark Relies on multiple sources of data –Spam / no Spam reports from end users –Honeypots Initially based on Vipul’s Razor Applies algorithmically derived signatures to incoming (Proprietary) Zero hour anti virus Trend Anti-virus Signature analysis Heuristics

Migration Relatively simple process to migrate from old platform Moved traffic across by re-pointing comcast.net MX records to new platform and making lots of involved highly planned DNS configuration changes Performed a series of increasing short duration burst test scale Then moved 5% of the traffic. After platform rules proved stable, traffic was moved across in slightly larger increments over several days to the new platform. This method allowed us to quickly revert back (under 30 minutes) to old platform in the event of any issues without customer impact

Lessons learned It always helps to be able to test the new platform against an existing live flow but this is difficult at our scale with a multi-Gbps mail flow Failing that, heavy reliance has to be placed on cooperation with vendors and existing platform technology users Rules used on an old platform do not always map across neatly to a new one