Analyzing Network and Content Characteristics of Spim using Honeypots
|
|
|
- Earl Bruce
- 10 years ago
- Views:
Transcription
1 Analyzing Network and Content Characteristics of Spim using Honeypots Aarjav J. Trivedi Applied Research Secure Computing Corporation Paul Q. Judge Applied Research Secure Computing Corporation Sven Krasser Applied Research Secure Computing Corporation Abstract Instant messaging spam (spim), while less widespread than spam, is a challenging problem which has received little attention in formal research. Spim is harder to study than spam because of the walled garden nature of popular instant messaging platforms. We designed and deployed a proxy based IM honeypot with protocol decoding and analyzed content characteristics of spim and network characteristics of hosts sending spim. Our analysis strongly suggests that adversaries make use of botnets and well coordinated command and control mechanisms in sending spim. Current anti-spim mechanisms rely heavily on content filtering, whitelisting and blacklisting. Our analysis suggests that the same botnets are being employed by spimmers and spammers. Hence network-layer and cross-protocol information sharing between and IM anti-spam solutions and the use of crossprotocol IP reputation would significantly improve blocking rates. By comparing spim and ham IM data, we also identify several heuristics that can be used to distinguish spim traffic from non spam traffic. 1 Motive and Background Over the past few years, instant messaging (IM) has gone from becoming a tool for communication between friends to a mission critical corporate application at many companies. According to Gartner (a leading market analysis firm), more than 65 percent of all organizations already use instant messaging [1]. Because spim is not as widespread as spam and users share their IM ID less liberally than their ID, they are more inclined to trust content sent over IM. IM is more real-time in nature than , guaranteeing an immediate audience to spimmers if they can get through to the recipient. Because of misplaced trust, a spim recipient is more likely to click on a URL without realizing it is not from someone they know. This exacerbates attacks where URLs to mal-ware or phishing sites are sent using the same mechanisms as spim. An example of this is a recent bout of phishing IMs which resulted in a significant number of Yahoo accounts being compromised [2]. Sending spim is harder than sending spam because it requires the spimmer to have a working account on the IM platform unlike where one can setup their own server. However new developments like the recently announced interoperability between the Yahoo and MSN messaging platforms means that spimmers now have a much wider audience than before with a single account. Similarly Google Talk supports open Jabber federation, which could allow anyone running a Jabber server to send messages to Google Talk users. With a little bit of effort, it is possible even today to connect Google Talk to AIM, Yahoo and MSN services. All of these could lead to a large increase in spim in the future. The same reasons that have historically made it harder to spim than spam have also made it harder for researchers to study spim. Unlike , which passes through a receiving server where it can be filtered, instant messages typically pass only through a proprietary platform server. People typically do not store their instant messages, and most IM clients do not have built in forwarding mechanisms, making user reporting of spim harder. Furthermore, if one were to setup an account on an IM platform, proxy it through an instant messaging proxy at the receiving end to log and filter data, and receive spim on it, in most cases the platform, acting as an intermediary between the spimmer and the spim recipient, would not reveal the IP address of the spimmer unless they attempted to
2 explicitly establish a direct connection as required for e.g. file transfers. Attempting file transfers is atypical for most spim attacks. Current anti-spim mechanisms in IM clients and corporate IM security appliances seem to depend mainly on elementary content filtering, black listing and whitelisting. It is unknown what anti-spim mechanisms are used at the server level by IM platforms. Thus we are faced with a scenario where it is becoming increasingly important to analyze spim and identify new methods to counter it but this has so far been hard. The rest of the paper is organized as follows. In Section 2 we discuss related work in IM security. In Section 3 we describe the design and setup of our spim honeypot system. In Section 4 we describe the data we collected, identify interesting trends therein, analyze their implications, and discuss the difference between spim and ham IM characteristics. Based on this, we propose heuristics that can be used to identify spim. Section 5 has our concluding remarks including future research possibilities. 2 Related Work Most popular instant messaging protocols in use today (MSN, AIM, Yahoo) provide whitelisting and blacklisting as options in their client software. AIM also allows user reporting of spim and a rudimentary reputation mechanism for IM IDs which allows users to warn an offending IM sender. A large number of warnings result in decreased sending capabilities. Most instant messaging platforms also have built in rate limiting preventing senders from sending a large number of messages in a short period of time. Both blacklisting and whitelisting have well known shortcomings [3,4]. Blacklisting is inefficient in blocking spam in an environment where a large number of senders are available to a spammer. The spammer can abandon and replace blacklisted senders quickly rendering blacklist entries useless. Whitelisting, while useful for users who know everyone they expect messages from, can pose problems in a typical corporate environment where employees may receive messages from customers or partners who s IDs are not known in advance. Rate limiting could be effective against spimmers who send large amounts of spim from a small number of senders. However, our data suggest that they employ a large number of senders sending at low rates. Formal research in spim is scarce. Liu et al. suggest the use of black/whitelisting, challenge response and content filtering mechanisms [5]. Challenge/response, while a viable anti-spim mechanism, has some well known drawbacks including reduced usability and reduced ability to automate response generation. This is especially relevant when contending with spammers who have a large scale distributed system such as a botnet at their disposal. The common subsequence based filtering approach they suggest needs a spim message to have at least 6 words in common with a previously seen spim message for acceptable false positive rates. As we demonstrate, in practice this assumption is likely to be invalid because spimmers are already injecting randomized markup tokens into spim, even in the middle of a URL, resulting in less than 2 common tokens between spim messages advertising the same URLs in most cases. Furthermore, randomizing parts of the URL itself and registering new front URLs is cheap and already widely used by spimmers. These would also cause poor performance in a fingerprint vector based filtering approach. The authors do not specify the lengths of the short spam messages they use to test their Bayesian filtering approach and hence it is hard to predict its performance on real world spim. Mannan et al. discuss security threats to existing IM networks in [22]. Their analysis includes Malicious Hyperlinks which they define as links to web pages containing malicious content and a mechanism in the ICQ IM client that allows a user to accept or reject messages containing hyperlinks but they offer no suggestions on how to selectively block spim. They have also implemented an IM key exchange mechanism [23] that would allow secure communications where authentication, integrity and confidentiality are achieved. However this is unlikely to prevent spim which, even today, comes from authenticated users. Integrity and confidentiality are not directly relevant to the issue of spim. Their findings on (ham) text message rates per user per day in their paper on IM worms [24] are consistent with the rate of ham messages per session presented we observe in section 4.4. Honeypots are widely used to track and observe malicious network-level behavior [6,7,8]. Similarly the use of honeypots to study spam and spammer behavior has been widely researched [9,10,11]. To the best of our knowledge, honeypots have not been used to study instant messaging spam so far. 3 System Design, Deployment and Security concerns 3.1 Network setup and Security The intent of a spim honeypot is to appear as if it is an open socks proxy to a spimmer. Spimmers prefer routing through an open proxy in order to conceal their identity. The external firewall should allow in only traffic intended for the socks port (1080) on the proxy. An important concern in choosing what outbound traffic should be allowed from the honeypot to the Internet is making sure that the honeypot is not misused. An open socks proxy is attractive to many
3 Figure 1.Setting up the spim honeypot malicious users other than spimmers. For example, spam or a denial of service attack could be routed through such an open proxy. Hence it would be advisable to block outbound traffic to everything but the IM servers for the IM platforms you intend to proxy and then only to specific ports on these servers. Ports and hostnames for popular instant messaging platforms are well known. Furthermore, it would be advisable to rate limit the outbound traffic on the external firewall. The decision on what the limit should be is an ethical tradeoff made by all honeypot administrators and is left up to the reader. If a spimmer cannot proxy any traffic through the honeypot to an intended victim, they will not use the honeypot at all. On the other hand, allowing traffic through at a high rate basically amounts to playing into the hands of spimmers. The inbound firewall should block all inbound traffic from the DMZ to the internal network (if any). 3.2 Protocol decoding All traffic on the honeypot can be logged using a tool such as Wireshark [11] (formerly Ethereal). Wireshark itself has a protocol decoder for popular messaging protocols such as Yahoo, MSN and AIM that can be used to analyze the traffic. However extrapolating trends from a large set of instant messages using Wireshark is hard. While most popular messaging protocols are closed (other than Google Talk, which is largely based on XMPP [12]), information on these is available widely on the Internet [13,14,15]. Using this information and open source libraries available on the Internet [16,17,18] it is possible to extract the necessary information from network level logs. We used an internally developed decoder that allowed us to extract and study spim. We present a very simple decoder mechanism in Appendix I. 4 Analysis of Collected Data We collected data on our honeypot over a period of two weeks. Over this period, our honeypot registered 228,682 connection attempts from spimmers attempting to send spim. They were able to start sessions. Across these sessions, they sent spim messages containing total URLs and 7386 functional URLs. These messages were sent by 6952 distinct IM usernames to IM usernames. Each IM username sent fewer than 3 messages on average which seems to indicate a strategy to avoid detection based on per username rates. During this period we also received connections and messages from individuals who did not appear to be spimmers. These were typically individuals who appeared to be proxying through the honeypot simply for anonymity rather than spimming, as evidenced by the lack of a single URL sent across a multi-message session. We also logged a few hundred messages sent from a single ID to 5 other IDs that did not contain a URL and appeared to be an attempt to overwhelm the victims with a large number of messages. In the interest of focusing on commercial spim rather than targeted personal spim, we have discounted these from our analysis of spim messages 4.1 Content level analysis and trends The intent of all spam is financial gain and to this end, it usually includes a call to action. For spam this is usually a URL. Hence we focused our initial content analysis on the websites being advertised using spim. In the graphs below, we have labeled each website with a unique token instead of identifying it. A list of the actual websites and URLs these tokens represent has not been included for legal reasons. Figure 2.Websites advertised in spim
4 day forward. The two other campaigns also showed the same weekly sending pattern as the camazon campaign with the number of spim messages sent increasing towards the middle of the week. Figure 3.Actual URLs being advertised in spim Our analysis showed that a very large proportion of the functional URLs being advertised led to a single website (87%). More than 97% of the URLs advertised led to just 4 websites all of which were pornographic in nature. Of these, the 2 with the highest number or URLs advertised were blocked by SURBL. Percentage wise 96% of the spim messages would be blocked by SURBL if the actual website they led to were analyzed. Essentially it looked like spimmers had carried out 4 major campaigns. The website with the highest number of URLs leading to it (camazon) was never advertised using its actual URL. Instead, 6 front URLs were used that led to it. 3 of these front URLs suggested a website with sexual content (boredstaci, stacispreads, camhunterz). 2 suggested racial or political content (the-kkk, thenaacp) and 1 suggested humor or general content (whatthedillyyo). This pattern, where the actual website being advertised was rarely used in spim, was repeated across other campaigns. We then analyzed the actual URLs for presence on SURBL and found that only 9% of these were actually blocked by SURBL. Hence use of SURBL merely as a blacklist on the spim content would have allowed 91% of the spim traffic through. Analysis of the sending frequency per day of URLs in the camazon campaign revealed that it was likely carried out in two parts, each utilizing 3 URLs. Furthermore the campaigns showed a distinct weekly pattern with the number of spim messages being sent increasing towards the middle of the week and falling towards the weekend. This pattern is not seen in spam [19]. Analysis of the daily frequency for two other campaigns ( bush/fling and iwantu ) revealed that they had a similar sending pattern but did not match with the sending pattern of the camazon URLs or of each other. The first URL was sent on the first day the honeypot was up. However for the entire first week only 0 to 7 URLs of each type were sent out. These numbers reached close to 60 exactly one week after the honeypot was up and more than doubled from the next Figure 4.Daily frequency of Camazon front URLs Figure 5.Daily frequency for two other campaigns The similar rate of sending across different campaigns suggested the possibility that these campaigns were being carried out by the same individuals. Analyzing the user IDs of spimmers confirmed this. They all followed a pattern of a female first name followed by an underscore, two random letters and 4 random integers. This suggested that either the same individuals were carrying out different campaigns or at the very least the same spimming software was being used. Taken together with similar sending rates and network level analysis covered in Section 4.2, we found strong evidence of a single controller behind all campaigns. The average length of spim messages sent was characters. The average number of tokens, separated by space, in a spim message was This put the length of an average token at characters. Considering only those spim messages that contained a URL, the average length of spim messages containing a URL was characters. The average number of tokens, separated by space, in a spim message containing a URL was This put the length of an average token for spim messages containing a URL at characters. The average length of an English word is considered 4.5 letters [20]. The discrepancy in these
5 figures is explained by the presence of randomized markup text present in all messages. An example of this with two spim messages advertising the exact same URL and how they are rendered in a messenger client is shown in figure 6. As evident, the bottom two messages show up as the exact same English content in an IM client barring a randomized 3 letter token at the end but are very different in actual text due to insertion of different randomized markup tokens. Figure 6.Actual text in spim versus rendering in client Taken at the raw level, this insertion of random markup would reduce the accuracy of any content filtering solution that didn t explicitly remove these tokens. The random 3 letter token at the end seems to be intended for the same purpose avoiding filtering at both raw (server) and representation (client) levels. Figure 7.Different surrounding text advertising the same URL Figure 7 depicts two other messages advertising the same URL but with different English text surrounding each, also possibly aimed at defeating content filtering. 4.2 Network-level analysis and trends Over a period of two weeks, a total of 3148 unique IP addresses established connections to our IM honeypot. Of these 2081 unique IP addresses actually tried to send spim. Table 1 shows the distribution of countries where these IP addresses originate. Only the top 12 out of 45 total countries have been individually shown. Table 2 shows the same distribution for IP addresses of spammers. As with spam, USA remains the country with the single largest number of IPs sending spim followed by Iran, Germany and France. 3 of the top 5 countries (USA, Germany and France) are common between the spam and spim lists. This, along with the large number of nations where spim advertising a comparatively smaller set of websites originates, supports our thesis that botnets are being used to send spim. To identify whether the same zombies were being used to send spam and spim, we checked the reputation of IP addresses sending spim in our Trusted Source [21] for database. Trusted Source operates on a wide range of public and proprietary data sources. The former includes public information obtained from DNS records, WHOIS data and real-time blacklists (RBLs). The proprietary data is gathered by several thousand IronMail anti-spam appliances. We found that over 29% of IP addresses sending spim had either a spam or a suspicious reputation classification in Trusted Source indicating that they were either being actively used to send spam or had several behavioral characteristics of an spam sender. An unverified classification indicates that the IP address has shown neither of these behaviors. Table 1. Country wise distribution - Spim IP addresses Country Percentage USA 23.55% Others (33) 14.18% IRN 13.74% DEU 8.99% FRA 7.50% JOR 7.02% TWN 5.05% ITA 4.76% IND 3.99% AUS 3.27% ESP 2.93% VNM 2.55% GBR 2.50%
6 Table 2.Country wise distribution Spam IP addresses Country Percentage USA 19.08% CHN 14.56% KOR 9.61% DEU 5.99% FRA 5.69% BRA 5.56% JPN 3.70% GBR 3.13% ESP 2.96% Table 3. reputation of IP addresses sending spim Reputation Percentage No. of IPs Unverified 70.39% 1465 Suspicious 13.26% 276 Spam 16.34% Aggregating network and content level analysis To find whether the same IPs were being used across separate campaigns, we analyzed IPs used to advertise the Camazon front URLs in the two campaigns shown in Appendix II. We found that two IP addresses were common across all front URLs advertised. Further, each individual campaign had more common IP addresses resulting in higher correlation in daily frequency. This trend was present across all campaigns in our data set. 4.4 Comparing Spim and Ham IM Heuristics To identify heuristics that can be used to counter spim, we compared data collected from an internal instant messaging proxy deployed at Secure Computing with data from the spim honeypot. We found that for each of the heuristics depicted in Table 4, spim differs from spam by multiple orders of magnitude. By monitoring IP addresses and/or IM users, at the server or proxy level, who exhibit behavior matching the spim heuristics presented here consistently over a certain period of time, it would be possible to identify and block spimmers. The URLs/Message measure, which is almost 100 times larger for spimmers than for normal IM users, the Bytes/session and Messages/Session measures are likely to be quick and effective heuristics for spimmer identification. Table 4.Spim versus Ham IM heuristics Heuristic Spim Ham IM Bytes/Session URLs/Message Messages/Session Avg. Length of messages in characters Avg. number of tokens per message Avg. length of a token in characters Concluding Remarks Our analysis suggests that spim is being sent using widely distributed botnets. Spimmers have already developed tactics to circumvent anti-spim measures that are likely being deployed by IM platforms and organizations. These tactics include the use of unsophisticated but cheap means like using front URLs to sophisticated techniques like randomization of spim content and URL obfuscation. Hence the use of URL blacklists and dictionaries would likely not be an effective measure against spim. Our research suggests that sharing data across protocols at both the content level (i.e. sharing spam URLs advertised in with anti-spim mechanisms and vice-versa) and at the network level (sharing IP reputation across anti-spam and anti-spim mechanisms) would substantially benefit anti-spam efforts across protocols. Sharing information across protocols about IP addresses which are caught sending spam over one protocol, allows traffic from them to be blocked across several protocols reducing unwanted traffic on the Internet by several multiples. Our comparison of spim and ham IM characteristics suggests that the use of behavioral heuristics to separate spam from spim is likely to be an effective measure to identify IDs and IP addresses involved in spimming at both for IM platforms and organizational anti-spim mechanisms. For future research we intend to analyze the performance of anti-spam algorithms on spim content and how they can be tuned to maximize performance. Acknowledgements The authors thank Dmitri Alperovitch for his thoughts and comments.
7 References [1] MacDonald, Neil. Recommendations for Infrastructure Protection, gartner.com/gc/webletter/qwest/issue4/gartner1.htm [2] InformationWeek. New IM Phishing Attacks Unleashed on Yahoo. Nov informationweek.com/story/showarticle.jhtml?articlei D= [3] Graham, Paul. A Plan for Spam. August [4] Graham, Paul. Filters vs. Blacklists September [5] Zhijun, Liu., Weili, Lin., Na, Li., Lee, D. Detecting and filtering instant messaging spam - a global and personalized approach. 1st IEEE ICNP Workshop on Secure Network Protocols, pp [6] Krasser, Grizzard, Owen, Levine. The Use of Honeynets to Increase Computer Network Security and User Awareness _krasser_jse.pdf [7] Lance Spitzner. Honeyd, Honeypots Tracking Hackers, Addison Wesley, 2002, pp [8] The Honeynet Project, Know Your Enemy: Sebek, [9] N, Provos. A virtual honeypot framework. Proceedings of the 13 th USENIX Symposium pp [10]Andreolini., Bulgarelli, Colajanni, Mazzoni. HoneySpam: Honeypots fighting spam at the source. Proceedings of the International Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI'05). July pp [11] Schryen, G. An honeypot addressing spammers' behavior in collecting and applying addresses. Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, June pp [12] P Saint-Andre, Ed. RFC 3921: Extensible Messaging and Presence Protocol (XMPP): Instant Messaging and Presence, 2004 [13] Yahoo Messenger Protocol v-9. [14] MSN Messenger Protocol. [15] Fritzler, Adam. Unofficial AIM MSN Protocol Specification. [16] libyahoo2 A C library for Yahoo Messenger. [17] libmsn a C++ library for Microsoft's MSN Messenger service. [18] libpurple Core GAIM library. [19] Gomes, LH., Cazita, C., Almeida, JM., Almeida, V., Meira, W. Characterizing a spam traffic. Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, 2004, pp [20] Shannon, C.E. Prediction and Entropy of Printed English. September Bell Systems Technical Journal, 30. pp [21] TrustedSource, [22] Mannan, Mohammad. and van Oorschot, Paul. Secure public Instant Messaging: A survey. Proceedings of Privacy, Security and Trust, [23] Mannan, Mohammad. and van Oorschot, Paul. A Protocol for Secure Public Instant Messaging. Financial Cryptography pp [24] Mannan, Mohammad. and van Oorschot, Paul. A Proceedings of the ACM workshop on Rapid malcode, pp 2-11.
8 Appendix I: Building a sample instant messaging protocol decoder Figure: Wireshark log of a single Yahoo message as seen in Emacs The figure above depicts the Wireshark log of a single Yahoo message as seen in Emacs. It is easy to write a simple program to extract information about the sender, recipient and the actual text of this message based on information about the Yahoo messenger protocol [13]. For the Yahoo messenger protocol the 0xc080 byte sequence is a separator. In Emacs, this is rendered as Á\200. Yahoo also uses key value pairs where each numeric key denotes a specific variable and is followed by the value of that variable. Three of these variables are: (0x31) 1: active (sender) id (0x35) 5: recipient id (0x3134) 14: message to send Hence in the message above, 1 is followed by the separator Á\200 followed by bhumishah which is the IM id of the sender, followed by the separator, then 5, denoting that the recipient ID follows, followed by the separator and aarjavtrivedi which is the recipient ID. This is again followed by the separator, then 14, denoting that the actual message follows, the separator and the string demo message which was the actual message sent here. Using the above information, it should be easy to use Wireshark to log all messages, select and save only messages belonging to the Yahoo protocol and write a program to extract the sender, recipient and actual spim message from the message capture files. Note: In the analysis above, the IM IDs have been altered to preserve privacy.
9 Appendix II Aggregating Network and Content Analysis Figure: Correlating common IP addresses across campaigns with their daily frequency across two weeks The above figure depicts two campaigns carried out by spimmers, one using front URLs that suggest sexual content and the other using front URLs that suggest racial, political or general content. Two IP addresses are common across all 6 URLs advertised across both campaigns. This results in similar but not exactly same shapes in the two aggregate daily frequency graphs, one for each campaign, across two weeks evident in the figure. Further each campaign has an even higher number of common IPs used to advertise the URLs for that campaign. This results in the aforementioned two aggregate curves for each campaign, but each with 3 different curves for each individual URL in that campaign with an almost identical daily frequency.
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
An Overview of Spam Blocking Techniques
An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now
Whose IP Is It Anyways: Tales of IP Reputation Failures
Whose IP Is It Anyways: Tales of IP Reputation Failures SESSION ID: SPO-T07 Michael Hamelin Lead X-Force Security Architect IBM Security Systems @HackerJoe What is reputation? 2 House banners tell a story
Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats
Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in
Emerging Trends in Fighting Spam
An Osterman Research White Paper sponsored by Published June 2007 SPONSORED BY sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone: +1 253 630 5839 Fax: +1 866
The Growing Problem of Outbound Spam
y The Growing Problem of Outbound Spam An Osterman Research Survey Report Published June 2010 SPONSORED BY! #$!#%&'()*(!!!!"#$!#%&'()*( Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058
A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior
A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior Danilo Michalczuk Taveira and Otto Carlos Muniz Bandeira Duarte UFRJ - PEE/COPPE/GTA - DEL/POLI P.O. Box 6854-2945-97, Rio de Janeiro, RJ,
Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development
Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Author André Tschentscher Address Fachhochschule Erfurt - University of Applied Sciences Applied Computer Science
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
A Phased Framework for Countering VoIP SPAM
International Journal of Advanced Science and Technology 21 A Phased Framework for Countering VoIP SPAM Jongil Jeong 1, Taijin Lee 1, Seokung Yoon 1, Hyuncheol Jeong 1, Yoojae Won 1, Myuhngjoo Kim 2 1
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
E-MAIL FILTERING FAQ
V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
Intercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
Groundbreaking Technology Redefines Spam Prevention. Analysis of a New High-Accuracy Method for Catching Spam
Groundbreaking Technology Redefines Spam Prevention Analysis of a New High-Accuracy Method for Catching Spam October 2007 Introduction Today, numerous companies offer anti-spam solutions. Most techniques
Email Marketing Glossary of Terms
Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to
SPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5
Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed
Cloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
The Network Box Anti-Spam Solution
NETWORK BOX TECHNICAL WHITE PAPER The Network Box Anti-Spam Solution Background More than 2,000 years ago, Sun Tzu wrote if you know yourself but not the enemy, for every victory gained you will also suffer
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
Why Spamhaus is Your Best Approach to Fighting Spam
Page 1 of 10 Executive Summary The spam problem is evolving and while overall spam volumes are down, the problems are getting worse. No longer just a nuisance wasting resources and time, spam is now a
eprism Email Security Suite
FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks
Recurrent Patterns Detection Technology. White Paper
SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware
http://connectwise.reflexion.net/login?domain=connectwise.net
ConnectWise Total Control: Managed Email Threat Protection Version: 1.5 Creation Date: 11-September-2009 Last Updated: 24-August-2012 LOGGING IN An e-mail will be or has sent with your username and password.
HONEYPOT SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
HONEYPOT SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Anti Spam Best Practices
53 Anti Spam Best Practices Anti Spam LIVE Service: Zero-Hour Protection An IceWarp White Paper October 2008 www.icewarp.com 54 Background As discussed in the IceWarp white paper entitled, Anti Spam Engine:
Get Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper
When Reputation is Not Enough Barracuda Email Security Gateway s Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level
Implementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
Next Generation IPS and Reputation Services
Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam
Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2
Email. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Email Daniel Zappala CS 460 Computer Networking Brigham Young University How Email Works 3/25 Major Components user agents POP, IMAP, or HTTP to exchange mail mail transfer agents (MTAs) mailbox to hold
FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives
FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,
Opus One PAGE 1 1 COMPARING INDUSTRY-LEADING ANTI-SPAM SERVICES RESULTS FROM TWELVE MONTHS OF TESTING INTRODUCTION TEST METHODOLOGY
Joel Snyder Opus One February, 2015 COMPARING RESULTS FROM TWELVE MONTHS OF TESTING INTRODUCTION The following analysis summarizes the spam catch and false positive rates of the leading anti-spam vendors.
Ipswitch IMail Server with Integrated Technology
Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
Cisco EXAM - 300-207. Implementing Cisco Threat Control Solutions (SITCS) Buy Full Product. http://www.examskey.com/300-207.html
Cisco EXAM - 300-207 Implementing Cisco Threat Control Solutions (SITCS) Buy Full Product http://www.examskey.com/300-207.html Examskey Cisco 300-207 exam demo product is here for you to test the quality
Why Content Filters Can t Eradicate spam
WHITEPAPER Why Content Filters Can t Eradicate spam About Mimecast Mimecast () delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate
SPAMMING BOTNETS: SIGNATURES AND CHARACTERISTICS
SPAMMING BOTNETS: SIGNATURES AND CHARACTERISTICS INTRODUCTION BOTNETS IN SPAMMING WHAT IS AUTORE? FACING CHALLENGES? WE CAN SOLVE THEM METHODS TO DEAL WITH THAT CHALLENGES Extract URL string, source server
Examining Proxies to Mitigate Pervasive Surveillance
Examining Proxies to Mitigate Pervasive Surveillance Eliot Lear Barbara Fraser Abstract The notion of pervasive surveillance assumes that it is possible for an attacker to have access to all links and
Anti Spam Best Practices
39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing
Gateway Security at Stateful Inspection/Application Proxy
Gateway Security at Stateful Inspection/Application Proxy Michael Lai Sales Engineer - Secure Computing Corporation MBA, MSc, BEng(Hons), CISSP, CISA, BS7799 Lead Auditor (BSI) Agenda Who is Secure Computing
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property
FortiMail Email Filtering Course 221-v2.2 Course Overview
FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
AlienVault. Unified Security Management (USM) 5.x Policy Management Fundamentals
AlienVault Unified Security Management (USM) 5.x Policy Management Fundamentals USM 5.x Policy Management Fundamentals Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products. www.cyberoam.com
CYBEROAM UTM s Outbound Spam Protection Subscription for Service Providers Our Products Unified Threat Management Agenda of Presentation What is Outbound Spam? Consequences of Outbound Spam Why current
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Application Firewalls
Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Application Distributed
GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall
GFI Product Comparison GFI MailEssentials vs Barracuda Spam Firewall GFI MailEssentials Barracuda Spam Firewall Integrates closely with Microsoft Exchange Server 2003/2007/2010 Integrates closely with
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT)
Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT) Vijay Radhakrishnan & Ranjith Mukundan Wipro Technologies, Bangalore, India Email:{radhakrishnan.vijay,
An outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
Honeypot as the Intruder Detection System
Honeypot as the Intruder Detection System DAVID MALANIK, LUKAS KOURIL Department of Informatics and Artificial Intelligence Faculty of Applied Informatics, Tomas Bata University in Zlin nam. T. G. Masaryka
ThreatSTOP Technology Overview
ThreatSTOP Technology Overview The Five Parts to ThreatSTOP s Service We provide 5 integral services to protect your network and stop botnets from calling home ThreatSTOP s 5 Parts: 1 Multiple threat feeds
Spam DNA Filtering System
The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,
REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS
REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS Rami Khasawneh, Acting Dean, College of Business, Lewis University, [email protected] Shamsuddin Ahmed, College of Business and Economics, United Arab
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Taxonomy of Hybrid Honeypots
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore Taxonomy of Hybrid Honeypots Hamid Mohammadzadeh.e.n 1, Masood Mansoori 2 and Roza
Barracuda Spam Firewall User s Guide
Barracuda Spam Firewall User s Guide 1 Copyright Copyright 2004, Barracuda Networks www.barracudanetworks.com All rights reserved. Use of this product and this manual is subject to license. Information
PineApp Anti IP Blacklisting
PineApp Anti IP Blacklisting Whitepaper 2011 Overview ISPs outbound SMTP Services Individual SMTP relay, not server based (no specific protection solutions are stated between the sender and the ISP backbone)
How To Secure A Website With A Password Protected Login Process (Www.Siphone)
Preventing Spoofing, Phishing and Spamming by Secure Usability and Cryptography ICDCS 07/07/2006 Amir Herzberg Computer Science Department, Bar Ilan University http://amirherzberg.com 04/05/06 http://amirherzberg.com
White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks
White Paper Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks White Paper Executive Summary Around the world, organizations are investing massive amounts of their budgets
Articles Fighting SPAM in Lotus Domino
Page 1 of 5 Articles Fighting SPAM in Lotus Domino For many e-mail administrators these days, the number one complaint from the users and managers is unsolicited emails flooding the system, commonly called
Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy
Overview An Evolution Improving Trust, Confidence & Safety working together to fight the e-mail beast Holistic strategy Prescriptive guidance and user education, collaboration & technology Evolution of
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
ICTN 4040. Enterprise Database Security Issues and Solutions
Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of
Image Based Spam: White Paper
The Rise of Image-Based Spam No matter how you slice it - the spam problem is getting worse. In 2004, it was sufficient to use simple scoring mechanisms to determine whether email was spam or not because
The Leading Email Security Suites
The Leading Email Security Suites What is SpamSniper? The Leading Email Security Suites for Your Secure Messaging SpamSniper is the leading email security solution which locates in front of mail server
Comprehensive Email Filtering. Whitepaper
Comprehensive Email Filtering Whitepaper Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email loses
SIP Service Providers and The Spam Problem
SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation
