The problem of email spam from IPv6. Modern filters.

Slides:



Advertisements
Similar presentations
IPv6 Prefix Discovery Murray S. Kucherawy. Today IPv4-based abuse prevention relies heavily on a database of IP addresses with bad reputations A.
Advertisements

IT Services & UEA IT Helpdesk Information Services (IS)
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Dealing With Spam The kind, not the Food product.
Methods for Stopping Spam James Lick
“We Can Stop the Spam!” Article written by Jack McHugh Presented by Sebastian Fischer.
SM3121 Software Technology Mark Green School of Creative Media.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Sender policy framework. Note: is a good reference source for SPFhttp://
Junxian Huang 1 Feng Qian 2 Yihua Guo 1 Yuanyuan Zhou 1 Qiang Xu 1 Z. Morley Mao 1 Subhabrata Sen 2 Oliver Spatscheck 2 1 University of Michigan 2 AT&T.
{ Etiquette Handbook. Feature Creating an Font, colour and sizes etc Sending an Sending using Cc Sending using Bcc Creating a signature.
Bulk Sending . What we'll look at... Why is important The main features and benefits of the Engaging Networks tool Technology overview.
Mass And Export Processor Edward M. Kwang President.
AND SPAM BY OLUWATOBI BAKARE
ICT Essential Skills. (electronic mail) Snail Mail.
Visit for Marketing and Deliverability Tips, Tools, & Trainingwww. Delivered.com.
E – Mail History of s What is an ? What happens when we sent an ? messages Folders Address Attachments Types of.
Two Questions Coaching Program [Your Name] [Your Address] [Date] [please name the file: your-name-2questions.pptx] —e.g. bill-marshall-2questions.pptx.
Welcome! – Audio Check Audio Check Instructions Press Talk or Hold CTRL Check Options > Filters< click Audio Gain Control off Check your headset Please.
Department of Computer Sciences The University of Texas at Austin Zmail : Zero-Sum Free Market Control of Spam Benjamin J. Kuipers, Alex X. Liu, Aashin.
 Internet Regulation  Some people think that Internet Regulations and Business exchange are the same. That is why many consider this a controversial.
Web 1.0 vs. Web 2.0 Shift from the read to the write web!
By: Nick Burman, Austin Corbin, Megan Nieszala, Taylor Marshall One of the largest services in the world with more than 360 million active acounts.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
1 IPv4 Depletion and Migration to IPv6 John Curran Chairman American Registry for Internet Numbers (ARIN)
Silicon & Software Systems (S3)‏ Copyright © Silicon & Software Systems Limited Antispam protection IT Department 20/03/2008 Ondrej Valousek.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Understanding the network level behavior of spammers Published by :Anirudh Ramachandran, Nick Feamster Published in :ACMSIGCOMM 2006 Presented by: Bharat.
Introduction to Information Technology Applications.
© 2009 WatchGuard Technologies WatchGuard ReputationAuthority Rejecting Unwanted & Web Traffic at the Perimeter.
1 Information Systems 2/26/03 Tom Coppeto Mark Silis MIT Mail System Update 26 February 2003.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Sender policy framework. Note: is a good reference source for SPFhttp://
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Wikispam, Wikispam, Wikispam PmWiki Patrick R. Michaud, Ph.D. March 4, 2005.
UNIT 2 LESSON 9 CS PRINCIPLES. UNIT 2 LESSON 9 OBJECTIVES Students will be able to: Explain the inefficiencies of everyone managing their own name-to-
The Dangers and Usefulness of Social Communication.
Easily Organize Common Templates, Phrases, Statements and More to Quickly Reuse Within Microsoft Office 365 Using Dolphin Compose WHAT WE OFFER Replace.
Chapter 9 Sending and Attachments. Sending and Attachments FAQs: – How does work? – How do I use local ? – How do I use Web-based.
Etiquette & Safety This is based on things you might experience when using you’re .
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
WHAT WE OFFER Go-To-Market Services MICROSOFT AZURE APP BUILDER PROFILE: MxHero MxHero, launched in 2012 in New York, is a cloud-based application that.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
IEEE Alias (Not) IEEE Twin Cities Section Officer & Volunteer Training January, 2014.
Objectives.  is short for electronic mail.  It allows you to quickly send a message to anyone else in the world as long as they have their.
– Purposes & Uses 20 – Purposes & Uses 20.
ORGANIZING . 1.Sort messages quickly. 2.Group similar messages in folders or labels. 3.Route mail efficiently to specific folders or labels. 4.Reduce.
sender policy framework
Intro to Google Docs 2014.
Internet Quarantine: Requirements for Containing Self-Propagating Code
Networking Objectives
CALL ON  Windows Live Mail is an client, services which is provided by Microsoft.  Live Mail is also a part of Windows live set.
Windows Live Mail Customer Service Phone Number
Windows Live Mail Customer Service Number |
THANK YOU… Welcome to Roadrunner Support Welcome to Roadrunner Support For More Visit on:
Welcome To Hotmail Support Number
Call Outlook customer support toll free number Ireland.
Fix AOL Mail Error Code 554 Call for Help
Outlook Technical Support Number Ireland
Hotmail Technical Support Services.
Attach In Gmail very Easily
Huntington Beach Public Library
Year 10.
Basics HURY DEPARTMENT OF COMPUTER SCIENCE M.TEJASWINI.
COMPUTER SAFTEY IS IMPORTANT….
Creating PowerPoint Presentations
Dark Arts of Deliverability
Tips to Stop Spam in Gmail Account |Gmail Customer Helpline Number
How to Send an Encrypted in Gmail on Android? | Hotmail Customer Service Number
Presentation transcript:

The problem of spam from IPv6

Modern filters

The problem of scale IP lists must be updated in (near) real time Max IPv4 addresses ~ 4 billion Max IPv6 addresses ~ 18 x 10 – Even if everyone gets their own /64, max addresses = 18 x

The problem of scale (cont’d) What happens when we build a better spammer? – Every spam comes from a unique IP (or limited reuse) – 5 billion spamming IPs per day  Size of file = 190 GB (XBL+SBL+PBL = 138 MB) – This is too big!

Too big to process Geo-distributed systems must replicate across network quickly (large files take too long for real time effectiveness). Processing the file takes a long time. IP stats history tables (e.g., Microsoft maintains its own IP reputation tables) grows too big for so many unique IPs.

Drop in effectiveness If spammers don’t reuse IP addresses, it makes IP blocklists useless

Proposal (short term) – Allow Lists Allow List = “I sometimes send legitimate mail over IPv6.” You still perform content filtering. We already do this for big mailers like Hotmail, Gmail, etc. Either a central reputation service for IPv6, or build your own. Do not allow anyone to send you IPv6 ! Allow lists are way smaller and easier to maintain.