Revealing Social Networks of Spammers
|
|
|
- Evan Merritt
- 10 years ago
- Views:
Transcription
1 Revealing Social Networks of Spammers Kevin S. Xu Alfred O. Hero III Spam doesn t really need an introduction anyone who owns an address likely receives spam s every day. However, spam is much more than just an annoyance. Spam s hidden economic cost for companies in wasted storage, bandwidth, technical support, and most important, the loss of employee productivity, is astronomical. The annual cost of spam for a company with 12,000 employees is approximately $2.4 million, according to a study conducted by Windows &.NET Magazine in 2003 [1]. Since then, the amount of spam received has only increased. According to estimates from MessageLabs, over 80 percent of s received from 2005 to 2008 were spam [2]. 26 Revealing Social Networks of Spammers
2 FEATURE The Next Wave Vol 18 No
3 The magnitude of the spam problem has not gone unnoticed by the US government. In 2003, the United States government drafted the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act to address the issue. CAN-SPAM provided guidelines on unsolicited practices and specified how unsolicited could be sent legally. Unfortunately, compliance has been extremely low; therefore, the act has had virtually no effect on lowering the volume of spam. On the other hand, CAN-SPAM allowed Internet service providers (ISPs) and web site owners to file lawsuits against spammers, resulting in fines and occasional jail sentences for convicted spammers. While lawsuits are certainly a way to fight back against spammers, given the vast number of spammers, suing an individual has a negligible effect on reducing the overall volume of spam, especially when lawsuits are brought regardless of the impact of the offense. Unfortunately, spammers have responded by taking greater measures to conceal their identities to avoid being detected. Clearly, other mechanisms are necessary to combat spam effectively. One type of spam that represents a significant threat to individuals and companies alike is phishing spam. Phishing is an attempt to fraudulently acquire sensitive information by appearing to represent a trustworthy entity. Phishing spam often takes the form of s appearing to be from a trusted financial institution with which the recipient does business. These s are written to persuade the recipient to reveal confidential information such as online banking passwords, credit card numbers, or a social security number. Many victims of identity theft have been fooled into revealing sensitive information by phishing s. Current methods to combat spam before it reaches a user include content-based filtering at the recipient s server as well as blacklisting servers known to send only spam s. Both measures reduce the annoyance of spam and the loss of employee productivity by decreasing spam s arriving at employee inboxes. However, these strategies can also backfire. For example, content-based filtering has the unintended side effect of misclassifying legitimate as spam. Furthermore, filtering does nothing to reduce the volume of spam that is sent. When spammers know that a smaller percentage of s are getting past the spam filters to the intended recipients, they might compensate by sending more spam s. Thus, content-based filtering may even increase the volume of spam sent! servers that send only spam can be blacklisted to filter out all s sent from them. Blacklisting differs from content-based filtering in that the filtering is done on servers instead of on individual s. Blacklisting is a more efficient filtering approach, but the disadvantage to blacklisting is that many servers send both legitimate as well as spam; blacklisting such a server would result in legitimate s being misclassified as spam. Current anti-spam methods share one common weakness they are local; that is, they detect and filter out spam at a single location, which is the recipient s server. Local anti-spam solutions are easy to maintain because a single administrator, usually the information technology group of the company or ISP, manages the process. But what could an analyst discern by examining how spam operates on a greater network level? In this article, we investigate the spam problem using a global approach, which requires detection and monitoring of an entire network or at multiple locations within a network. By taking a global approach, an analyst can correlate data over multiple servers, times, and locations to infer the behavior of spammers on a large scale, which can then be used to combat spam nearer to its source. The best defense spammers have against antispam techniques is to send spam s without being detected. So how do they do this? Consider the path of spam, illustrated in Figure 1. First, a spammer acquires addresses on a web page using a harvester, which is a piece of software designed to visit web sites and extract addresses from the HTML source code. Next, spam servers send s to the acquired addresses. These can be servers that belong to the spammers, or they can be zombie computers, computers compromised by viruses or other malware that end up sending spam without their owners knowledge. Finally, these spam s make their way to the recipients inbox or junk mail folder. The address acquisition process, known as harvesting, is an often overlooked part of the spam problem. Malicious spammers typically take 28 Revealing Social Networks of Spammers
4 FEATURE Spammer Web page Harvester Spam server Recipient Figure 1: The path of spam from an address on a web page to your inbox measures to conceal their identities when sending spam. One common method is to use massive networks of compromised computers, known as botnets. However, studies have indicated that spammers do not take comparable precautions when harvesting [3], perhaps because harvesting is seen as a safer and more acceptable activity than sending spam. Hence, monitoring harvesting activity and tracking harvesters can be useful for identifying spammers. This is one of the goals of Project Honey Pot, created by anti-spam company Unspam Technologies, Inc. [4]. Project Honey Pot Project Honey Pot was started in 2004 to monitor harvesting and spamming activity via a network of decoy web pages set with trap addresses, known as honey pots. These honey pots are embedded in the HTML source code of a web page and are invisible to human visitors. Harvesters looking for addresses in HTML source code sometimes stumble across the trap addresses and acquire them. Harvesters can also be directed to trap addresses by links to honey pots from legitimate web sites that they also scan for addresses. Each time a honey pot is visited, the centralized Project Honey Pot server generates a unique trap address. The visitor s IP address is associated with the trap address and then recorded on the server. The address embedded in the honey pot is unique, so only the visitor to that honey pot could have collected it. Because these trap addresses are not published anywhere besides the honey pot, all s received at these addresses are assumed to be spam. Project Honey Pot provides a unique opportunity to investigate the social structure of spammers. It is normally very difficult to uncover anything at the spammer level because we cannot associate a spam with a particular spammer. The from address can be easily spoofed, and the spam served from a compromised computer has little association with the spammer. With Project Honey Pot each spam is associated with the harvester that acquired the recipient s address. When spammers fail to conceal their identities while harvesting, the IP address of the harvester is likely to be closely related to the actual location of the spammers. Because each received at a trap address is associated with the harvester that acquired it, the identity of the spammer is revealed. As of March 2010, Project Honey Pot comprised over 48 million honey pots distributed all over the world [4]. The data collected by Project Honey Pot provides a global perspective on spam and makes it possible to investigate correlations over many spam servers and time periods. Discovering communities of spammers As mentioned earlier, understanding the behavior of spammers on an expanded scale is one of the benefits of a global approach for fighting spam. But what do the social networks of spammers look like? In particular, how well organized are spammers? Do they operate alone, or in groups? Are there meaningful communities or organizations of spammers? Sending spam s is profitable for spammers; otherwise, there wouldn t be so much spam. Can a business model be derived from the community structure of spammers? These questions can be answered using the data collected by Project Honey Pot and a technique known as spectral clustering [5]. The social network of spammers can be represented as a graph consisting of nodes and edges, as shown in Figure 2. The nodes correspond to spammers, and an edge between two nodes corresponds to a social relationship between the corresponding spammers. A social relationship can be inferred by the use of common resources or by similar behavior patterns over time. Communities The Next Wave Vol 18 No
5 in a social network emerge by partitioning the graph into groups of nodes. Sets of nodes in the same group are highly similar and sets of nodes in different groups are not similar. Spectral clustering aims to minimize the normalized cut between groups, which is defined by Normalized cut = Sum of all edge weights between groups Sum of all edge weights within groups For example, spectral clustering divides the graph shown in Figure 2 into the two communities indicated by the blue and green nodes, respectively. The groups revealed by spectral clustering correspond to communities in the social network. For these communities to be meaningful, the graph must be constructed so the edges between nodes correspond to actual relationships between spammers. Figure 2: An example of a graph and its separation into two communities by spectral clustering The main challenge in constructing the graph is choosing the edges and edge weights, because we cannot observe relationships among spammers. This problem does not arise in most other community detection studies. For example, in friendship or collaboration networks, users willingly participate in the study, and information on relationships among members of the network is readily available. However, for spammer network discovery, relationships between spammers are only inferred through correlations between behavior patterns. Two spammers who have high behavioral correlation are likely to be collaborating. This likelihood, which is treated as the strength of the relationship between these two spammers, can be used as the weight of the edge between the two corresponding nodes in the graph. For this research, we investigate two types of behavioral correlation between spammers: correlation in spam server usage and temporal correlation. Correlation in spam server usage Correlation in spam server usage between two spammers corresponds to common usage of a set of spam servers. Spammers typically try to conceal their identity by using spam servers that aren t traceable back to them, such as botnets. Thus spam servers can be viewed as resources for spammers, and common usage of a set of spam servers between two spammers translates into resource sharing, which suggests that the two spammers are collaborating. By constructing the graph using correlation in spam server usage between all active spammers over a period of time, many interesting communities of spammers are revealed, as shown in Figure 3. Each node in the graph corresponds to a spammer, and the color and shape of a node indicates the community to which he or she belongs. Note that the majority of spammers belong in a large, loosely-connected community identified by the red nodes. These are the spammers who do not exhibit extremely high correlation with other spammers. Hence it is not a true community, but a collection of spammers who appear to be operating alone. The interesting communities are the smaller, tightly-connected ones surrounding the large red community. We believe that these nodes correspond to actual social communities of spammers working together and sharing substantial server resources. Reinforcing our belief is the observation that the discovered communities tend to divide into phishing and non-phishing communities, as shown in Figure 4. The shade of each node corresponds to the phishing level of each spammer, which is defined by Phishing level = Number of phishing s sent Total number of s sent We denote spammers with high phishing levels as phishers and the rest as non-phishers. Notice that phishers tend to form communities with other phishers, and that non-phishers tend to form communities with other non-phishers. This is also evident from looking at the most frequent subject 30 Revealing Social Networks of Spammers
6 FEATURE Figure 3: Community structure of spammers inferred by correlation in spam server usage in October 2006 Figure 4: Alternate view of the same social network shown in Figure 3, shaded by phishing level The Next Wave Vol 18 No
7 Table 1: Most common subject lines from a phishing and a non-phishing community (truncated to 50 characters by the Project Honey Pot database) Phishing Community Password Change Required Question from ebay Member Credit Union Online $50 Reward Survey PayPal Account PayPal Account - Suspicious Activity Non-Phishing Community Make Money by Sharing Your Life with Friends and F Premiere Professional & Executive Registries Invit Texas Land/Golf is the Buzz Keys to Stock Market Success An Entire Case of Fine Wine plus Exclusive Gift to lines of s from all spammers in a community. For example, the most frequent subject lines from both a phishing community, namely the orange community of triangular nodes at the top of Figure 3, and a non-phishing community, namely the blue community of circular nodes on the right of Figure 3, are listed in Table 1. Notice the distinct separation between phishing subject lines and non-phishing subject lines. The subject headings were not provided to the clustering algorithm and therefore confirm that server usage patterns alone can provide evidence of coordinated phishing behavior. We note that phishers tend to concentrate in small, tightlyconnected communities. This observation provides empirical evidence that communities of phishing spammers are sharing resources, namely spam servers, among the community. This suggests that phishers tend to exist in isolated, well-organized social communities or teams. Temporal correlation Temporal correlation refers to correlation of the times when s were sent. High correlation is expected among spammers who are working together. Because we do not know the times when s were sent, we correlate the times when s were received. The community structure as revealed using temporal correlation is shown in Figure 5. Again, the shape and color of a node represent the community that a particular spammer belongs to. Two large communities appear, and as before, they can be interpreted as loosely-connected communities of individuals who do not exhibit much correlation with each other. However, in the smaller communities, some interesting patterns emerge. In particular, we discover groups of spammers with nearly coherent temporal spamming behavior. Consider the group of ten spammers Figure 5: Community structure of spammers inferred by temporal correlation in October Revealing Social Networks of Spammers
8 FEATURE whose temporal spamming behavior is shown in Figure 6, in which the horizontal axis corresponds to days in a month and the vertical axis corresponds to the number of s sent each day. The figure consists of ten lines overlaid onto the same plot, with each line corresponding to the temporal spamming behavior of one spammer in the group. How striking that the ten spammers in Figure 6 are sending almost identical numbers of s over time! And how probable that they are working together and belong to an actual social community. These ten spammers, found in the community of dark-blue colored nodes in the top left of Figure 5, are especially interesting because they are among the heaviest spammers in the Project Honey Pot data set, where a heavy spammer denotes someone who sends a large number of spam s. In addition to their highly coherent temporal behavior, these spammers also have IP addresses in the same block, indicating that they are operating from the same physical location, perhaps in the same building. Furthermore, these ten spammers IP addresses are in the IP address range of a known rogue ISP, McColo Corp., which had been hosting and providing services for cybercriminals until it was taken down in November 2008 [6]. All of the abovementioned observations point to this group of spammers being very well-organized, and thus we conclude that they form a tight social community. Conclusions Current methods of fighting spam are local and take place at the receiving end, which does not help to reduce the amount of network traffic consumed by spam s. By studying spam from a global perspective using the data collected by Project Honey Pot, we were able to correlate the behavior of spammers, allowing us to identify different communities of spammers. We found that the majority of spammers appeared to be working alone, but a significant number of them appear to form communities or organizations. In particular, we discovered many small communities of spammers who predominantly sent phishing s, likely attempting to acquire sensitive information to engage in identity theft. We also discovered several communities of spammers operating from the same physical location, suggesting strong social connections between these spammers. Number of s Day in month Figure 6: Temporal spamming behavior of group of ten spammers over the month of October 2006, by IP By analyzing spam and spammer behavior from a global perspective, we were able to identify meaningful communities of spammers. The next step would be to use these findings to combat spam. Several avenues that could be pursued include identifying social cliques that could perhaps be linked to an organization and identifying important members of the social network who could be sued, which would have a much greater effect than randomly targeting spammers. There is also potential for online detection of communities; that is, updating the detected communities as s are received. This would allow for a new method of spam filtering, not by content or blacklisting, but by behavioral patterns of spammers, which are less variable. Thus filtering by behavioral patterns has the potential to be more effective than existing filtering methods. Although the problem of spam does not appear to be going away anytime soon, methods and tools for combating it are improving. Spectral clustering and network discovery can lead to insights into how spammers operate by revealing their social networks. The methods described in this paper might also be applied to discovery of illicit behavior patterns in other applications, such as financial transaction networks or chat room interaction networks. For additional details on our methods, the reader is referred to Revealing Social Networks of Spammers Through Spectral Clustering [7] The Next Wave Vol 18 No
9 Acknowledgment The authors would like to thank Dr. Mark Kliger, Yilun Chen, and Dr. Peter Woolf for their contributions to the presented analysis. We also thank Matthew Prince, Eric Langheinrich, and Lee Holloway of Unspam Technologies for providing us with the Project Honey Pot data set. This research was partially supported by Office of Naval Research grant N and National Science Foundation grants CCF and CCR About the authors Kevin S. Xu is a PhD student in the Department of Electrical Engineering and Computer Science at the University of Michigan, Ann Arbor, working under the supervision of Dr. Hero. His current areas of interest are in the study of networks, including information networks and social networks among others. In particular, he is interested in developing methods for inferring properties of networks such as their community structure or their temporal dynamics from observations taken within the network. Alfred O. Hero III is the R. Jamison and Betty Williams Professor of Engineering at the University of Michigan, Ann Arbor, where he is affiliated with the Department of Electrical Engineering and Computer Science, the Department of Biomedical Engineering, and the Department of Statistics. His recent research interests have been in signal extraction and pattern analysis for Internet, sensor net, and bionet data streams. He is a Fellow of the Institute of Electrical and Electronics Engineers (IEEE) and has received an IEEE Signal Processing Society Meritorious Service Award (1998), best paper awards from the Clinical Cytometry Society (2009) and the IEEE Signal Processing Society (1998, 2010), and the IEEE Third Millennium Medal (2000). Alfred Hero was President of the IEEE Signal Processing Society ( ) and sits on the Board of Directors of the IEEE as Director of Division IX ( ). References: [1] The Secret Cost of Spam. Windows &.NET Magazine. [Online]. Available: itmanagement.com/whitepaper/the-secret-cost-of-spam/, [2] MessageLabs Intelligence: 2008 Annual Security Report. Symantec Corp. [Online] Available: [3] M. Prince, L. Holloway, E. Langheinrich, B. M. Dahl, and A. M. Keller. Understanding How Spammers Steal Your Address: An Analysis of the First Six Months of Data from Project Honey Pot. In Proc. 2nd Conf. and Anti-Spam, [4] Project Honey Pot. Unspam Technologies Inc. [Online] Available: org/, [5] S. Yu and J. Shi. Multiclass Spectral Clustering. In Proc. 9th IEEE Int. Conf. Computer Vision, [6] J. Nazario. Third Bad ISP Disappears McColo Gone. Arbor Networks. [Online] Available: asert.arbornetworks.com/2008/11/third-bad-isp-dissolves-mccolo-gone/, [7] K. S. Xu, M. Kliger, Y. Chen, P. J. Woolf, and A. O. Hero III. Revealing Social Networks of Spammers Through Spectral Clustering. In Proc. IEEE Int. Conf. Communications, Revealing Social Networks of Spammers
Who will win the battle - Spammers or Service Providers?
Who will win the battle - Spammers or Service Providers? Pranaya Krishna. E* Spam Analyst and Digital Evidence Analyst, TATA Consultancy Services Ltd. ([email protected]) Abstract Spam is abuse
Emerging Trends in Fighting Spam
An Osterman Research White Paper sponsored by Published June 2007 SPONSORED BY sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone: +1 253 630 5839 Fax: +1 866
Ipswitch IMail Server with Integrated Technology
Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these
How to stay safe online
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
How To Ensure Your Email Is Delivered
Everything You Need to Know About Delivering Email through Your Web Application SECTION 1 The Most Important Fact about Email: Delivery is Never Guaranteed Email is the backbone of the social web, making
Fighting spam in Australia. A consumer guide
Fighting spam in Australia A consumer guide Fighting spam Use filtering software Install anti-virus software Use a personal firewall Download security patches Choose long and random passwords Protect your
What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails
2000 Linwood Ave Suite 19J Fort Lee, NJ 07024-3012 What Spammers Don t Want You To Know About Permanently Blocking Their Vicious E-mails Following Last Year s Hack Attack At Epsilon, You May Be Overwhelmed
Phishing Past, Present and Future
White Paper Phishing Past, Present and Future By Theodore Green, President, SpamStopsHere.com Abstract A particularly dangerous and now common type of spam known as "Phishing attempts to trick recipients
An Efficient Methodology for Detecting Spam Using Spot System
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
ModusMail Software Instructions.
ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account
Context Adaptive Scanning Engine: Protecting Against the Broadest Range of Blended Threats
Context Adaptive Scanning Engine: Protecting Against the Broadest Range of Blended Threats W h i t e P a p e r Executive Summary The email and Web security problem can no longer be addressed by point solutions
WHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering Email through Your Web Application
WHITEPAPER SendGrid Deliverability Guide V2 Everything You Need to Know About Delivering Email through Your Web Application The Most Important Fact about Email: Delivery is Never Guaranteed Email is the
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
Savita Teli 1, Santoshkumar Biradar 2
Effective Spam Detection Method for Email Savita Teli 1, Santoshkumar Biradar 2 1 (Student, Dept of Computer Engg, Dr. D. Y. Patil College of Engg, Ambi, University of Pune, M.S, India) 2 (Asst. Proff,
DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise
Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How
SIMPLE STEPS TO AVOID SPAM FILTERS EMAIL DELIVERABILITY SUCCESS GUIDE
SIMPLE STEPS TO AVOID SPAM FILTERS SECTION 1 UNDERSTANDING THE BASICS Marketing emails account for most this is spam complaints, 70% in fact, which explains the scrutiny some marketers see applied to their
Being labeled as a spammer will drive your customers way, ruin your business, and can even get you a big fine or a jail sentence!
Getting Your Email Delivered Beware: If you send out spam mail (unsolicited emails), whether it be knowingly or not, you will put your business and your reputation at risk. Consequences for spamming have
Managing Junk Mail. About the Junk Mail Filter
Managing Junk Mail Outlook can filter out certain types of messages and send them to a separate folder to keep your Inbox from being cluttered with junk mail. Outlook can also disable links in suspicious
Recurrent Patterns Detection Technology. White Paper
SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware
Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your
Overview of the Junk E-mail Filter in Outlook (Much of this text is extracted from the Outlook Help files.) Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages
Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered
The Growing Problem of Outbound Spam
y The Growing Problem of Outbound Spam An Osterman Research Survey Report Published June 2010 SPONSORED BY! #$!#%&'()*(!!!!"#$!#%&'()*( Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058
More Details About Your Spam Digest & Dashboard
TABLE OF CONTENTS The Spam Digest What is the Spam Digest? What do I do with the Spam Digest? How do I view a message listed in the Spam Digest list? How do I release a message from the Spam Digest? How
Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5
Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed
E-MAIL FILTERING FAQ
V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:
Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data
Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer
eprism Email Security Suite
FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks
SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing
EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render
COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
Anti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
Professional Ethics for Computer Science
Professional Ethics for Computer Science Chapter 4: Privacy Jie Gao Computer Science Department Stony Brook University Privacy Issues Internet privacy consists of privacy over the media of the Internet:
October Is National Cyber Security Awareness Month!
(0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Email Security. 01-15-09 Fort Mac
Email Security 01-15-09 Fort Mac Most Common Mistakes in Email Security Email Security 1. Using just one email account. 2. Holding onto spammed-out accounts too long. 3. Not closing the browser after logging
Introduction:... 3. What is Spam?... 3 How to Bypass Spam Filters... 5. Common Mistakes... 7
Table of Contents Introduction:... 3 What is Spam?... 3 How to Bypass Spam Filters... 5 Common Mistakes... 7 How Spam Filters Work... 8 Testing Your Email Campaign... 8 Preventing False Abuse Reports...
BULLGUARD SPAMFILTER
BULLGUARD SPAMFILTER GUIDE Introduction 1.1 Spam emails annoyance and security risk If you are a user of web-based email addresses, then you probably do not need antispam protection as that is already
Why Spamhaus is Your Best Approach to Fighting Spam
Page 1 of 10 Executive Summary The spam problem is evolving and while overall spam volumes are down, the problems are getting worse. No longer just a nuisance wasting resources and time, spam is now a
Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs AN IN-DEPTH ANALYSIS
Trend Micro Incorporated Research Paper 2012 Blackhole Exploit Kit: A Spam Campaign, Not a Series of Individual Spam Runs AN IN-DEPTH ANALYSIS By: Jon Oliver, Sandra Cheng, Lala Manly, Joey Zhu, Roland
How To Filter Email From A Spam Filter
Spam Filtering A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction Spam filtering is a catch- all term that describes the steps that happen to an email between a sender and a receiver
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
The Latest Internet Threats to Affect Your Organisation. Tom Gillis SVP Worldwide Marketing IronPort Systems, Inc.
The Latest Internet Threats to Affect Your Organisation Tom Gillis SVP Worldwide Marketing IronPort Systems, Inc. Agenda Spam Trends Staying Ahead Blended Threats Spam Trends What Do Dick Cheney & Bill
Finding Email Security in the Cloud
WHITE PAPER: FINDING EMAIL SECURITY IN THE CLOUD Finding Email Security in the Cloud CONTENTS Introduction 3 I. Why Good Enough Security is Never Good Enough 3 Mind your security gaps 4 II. Symantec Email
AVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
A White Paper. VerticalResponse, Email Delivery and You A Handy Guide. VerticalResponse,Inc. 501 2nd Street, Suite 700 San Francisco, CA 94107
A White Paper VerticalResponse, Email Delivery and You Delivering email seems pretty straightforward, right? You upload a mailing list, create an email, hit send, and then mighty wizards transport that
SIP Service Providers and The Spam Problem
SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation
INBOX. How to make sure more emails reach your subscribers
INBOX How to make sure more emails reach your subscribers White Paper 2011 Contents 1. Email and delivery challenge 2 2. Delivery or deliverability? 3 3. Getting email delivered 3 4. Getting into inboxes
Purchase College Barracuda Anti-Spam Firewall User s Guide
Purchase College Barracuda Anti-Spam Firewall User s Guide What is a Barracuda Anti-Spam Firewall? Computing and Telecommunications Services (CTS) has implemented a new Barracuda Anti-Spam Firewall to
Anti Spam Best Practices
53 Anti Spam Best Practices Anti Spam LIVE Service: Zero-Hour Protection An IceWarp White Paper October 2008 www.icewarp.com 54 Background As discussed in the IceWarp white paper entitled, Anti Spam Engine:
The Anti-Phishing/Anti-Spoofing Guide: What Every Email Marketer Should Know About Brand Protection and Securing the Email Channel GET MORE INFO
The Anti-Phishing/Anti-Spoofing GET MORE INFO [email protected] 1-866-362-4577 The Anti-Phishing/Anti-Spoofing : What Every Email Marketer Should Know About Brand Protection and Securing the Email
Evaluating DMARC Effectiveness for the Financial Services Industry
Evaluating DMARC Effectiveness for the Financial Services Industry by Robert Holmes General Manager, Email Fraud Protection Return Path Executive Summary Email spoofing steadily increases annually. DMARC
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
Reputation Monitor User Guide
August 18, 2015 Return Path, Inc. Table of Contents What is Reputation Monitor... 3 How Reputation Monitor Works... 4 What is a Sender Score... 5 How is a Sender Score Calculated... 5 Reputation Measures
Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution.
Security capabilities To support your business objectives Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution. Preemptive protection and spam control
Abused Internet Domain Registration Analysis for Calculating Risk and Mitigating Malicious Activity
2012 Abused Internet Domain Registration Analysis for Calculating Risk and Mitigating Malicious Activity KnujOn.com LLC Brief Version 2/18/2012 Promising Research KnujOn.com LLC is proud to release this
Spam filtering. Peter Likarish Based on slides by EJ Jung 11/03/10
Spam filtering Peter Likarish Based on slides by EJ Jung 11/03/10 What is spam? An unsolicited email equivalent to Direct Mail in postal service UCE (unsolicited commercial email) UBE (unsolicited bulk
Detecting spam using social networking concepts Honours Project COMP4905 Carleton University Terrence Chiu 100605339
Detecting spam using social networking concepts Honours Project COMP4905 Carleton University Terrence Chiu 100605339 Supervised by Dr. Tony White School of Computer Science Summer 2007 Abstract This paper
Best Practices: How To Improve Your Survey Email Invitations and Deliverability Rate
Best Practices: How To Improve Your Survey Email Invitations and Deliverability Rate Below, you will find some helpful tips on improving your email invitations and the deliverability rate from a blog post
SPAM. What can be done by governments, to prevent spam? What can be done by IT professional bodies?
SPAM What can be done by governments, to prevent spam? What can be done by IT professional bodies? 2 SPAM - Professional Practice Group Presentation Introduction What is Spam? Spam Origin Spam Categories
IBM Lotus Protector for Mail Security 2.5. Empower users and extend your IBM Lotus Notes and Lotus Domino security features
Security capabilities To support your business objectives IBM Lotus Protector for Mail Security 2.5. Empower users and extend your IBM Lotus Notes and Lotus Domino security features Give users complete
Symantec Protection Suite Add-On for Hosted Email and Web Security
Symantec Protection Suite Add-On for Hosted Email and Web Security Overview Your employees are exchanging information over email and the Web nearly every minute of every business day. These essential communication
CommuniGator. Avoiding spam filters
CommuniGator Avoiding spam filters How to dodge the junk box; deliverability and avoiding spam filters Email marketers often have more to battle with than just creating an email and sending it to their
Email Expanded Header: Viewing in Microsoft Outlook
Email Expanded Header: Viewing in Microsoft Outlook Figure 1: Default Shown Header in an Outlook 2003 E-mail Message The Internet header of an e-mail message can have twenty lines or more showing all kinds
ContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering
Voyant Strategies ContentCatcher Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering tm No one can argue that E-mail has become one of the most important tools for the successful
Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy
Overview An Evolution Improving Trust, Confidence & Safety working together to fight the e-mail beast Holistic strategy Prescriptive guidance and user education, collaboration & technology Evolution of
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Panda Cloud Email Protection
Panda Cloud Email Protection 1. Introduction a) What is spam? Spam is the term used to describe unsolicited messages or messages sent from unknown senders. They are usually sent in large (even massive)
2009 Antispyware Coalition Public Workshop
2009 Antispyware Coalition Public Workshop Jeffrey Fox Technology Editor, Consumer Reports Media contact: Lauren Hackett, 914-378-2561 Background For several years, Consumer Reports has been testing and
Domain Name Abuse Detection. Liming Wang
Domain Name Abuse Detection Liming Wang Outline 1 Domain Name Abuse Work Overview 2 Anti-phishing Research Work 3 Chinese Domain Similarity Detection 4 Other Abuse detection ti 5 System Information 2 Why?
