Accelerating Techniques for Rapid Mitigation of Phishing and Spam s
|
|
|
- Joshua Booker
- 10 years ago
- Views:
Transcription
1 Accelerating Techniques for Rapid Mitigation of Phishing and Spam s Pranil Gupta, Ajay Nagrale and Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Buffalo, NY {pagupta, anagrale, Abstract - Spam filters that are implemented using Naïve Bayesian learning techniques are widely deployed worldwide with clients such as Outlook. These filters that are deployed on end user s computers and typically used to filter out spam for individual users are effective when the spam load is around spam s per day per user. However, when the spam load increases, these solutions prove to be slow and hence insufficient for practical use. In this paper, we identify the computation intensive functions of such machine learning algorithms and solve the performance issues by implementing these functions on hardware. Earlier similar approaches made use of specialized hardware chips or coprocessors to achieve such acceleration. These chips being dedicated hardware represent a cost and scalability limitation. Our approach makes use of a more generic Intel desktop processor, viz. Tolapai (Intel EP80579) that has several built-in cryptographic functionalities, viz. security accelerators for bulk encryption, authentication, hashing and public/private key generation. Experimental results show that significant acceleration can be achieved by migrating some of the functionalities to hardware in a transparent way. Keywords - Hardware acceleration, Hashing, Intel EP80579, Naïve Bayesian, Phishing attacks, Spam filters, Tolapai I. INTRODUCTION A common synonym for spam is unsolicited bulk (UBE). Definition of spam usually includes the aspects that is unsolicited and sent in bulk [8]. As of 2009, the estimated damage due to spam worldwide is $130 billion, of which $42 billion is in the U.S. alone [5]. According to Symantec report, in the year 2008, around 80% of all Internet traffic has been spam s [10]. Spam is a medium for fraudsters to scam users to enter personal information on fake Web sites using forged to look like it is from a bank or other organization such as PayPal [14]. This is known as phishing [8]. According to recent Gartner report, in the year 2007, more than 25,000 unique phishing s hijacking 150 different brands were sent out on a monthly basis resulting over $3 billion dollars in damage worldwide. Furthermore, the report also estimates that due to their lucrative nature phishing attacks are going to skyrocket through 2009 [9]. There are various techniques used to detect phishing and fight spam. Among them Bayesian filtering methods are most popular because of their simplicity and high filtering accuracy [1, 3, 11]. Machine learning algorithms such as Naïve Bayesian are computation-intensive algorithms and hence overload the processors. spam filters that make use of Naïve Bayesian and are implemented in software tend to become sluggish as spam traffic increases. Our goal in this paper is to introduce a hardware accelerating SOC processor which will improve the performance of Naïve Bayesian spam filters and phishing attack detectors. We achieve this performance improvement by moving hashing functions used in Naïve Bayesian spam filters to hardware. We, however, are not trying to design a new algorithm for spam filtering. On the other hand, we are proposing acceleration technique for existing Naïve Bayesian Spam filters. The organization of the paper is as follows. Section 2 describes the related work on spam filters and earlier approaches to move spam filter s functionalities to hardware. Section 3 details the Intel processor, the Naïve Bayesian approach and the acceleration techniques. The experimentation that were carried out to prove our performance goals are described in Section 4. The results, conclusions and future work are briefed out in sections 5 and 6 respectively. II. RELATED WORK Sahami et al. [2] have shown the use of Naïve Bayesian in classifying as spam and legitimate (ham). They have tested their Naïve Bayesian spam filter on real usage scenario with an accuracy of 92%. They have shown that by considering domain-specific features of this problem in addition to the raw text of messages, much more accurate filters can be produced. Chandrasekaran et al. [13] have shown the ability to identify phishing based on structural properties of using machine learning algorithms. Graham [3] has used statistical filtering for spam detection using one corpus of spam and another one of non-
2 spam s with each having about 4000 messages in it. The entire text, including headers and embedded html and JavaScript of each message in each corpus was scanned and tokenized. Two large hash tables, one for each corpus, mapping tokens to number of occurrences were created. Next a third hash table was created, this time mapping each token to the probability that an containing it is a spam. As noted much of the intensive part of the algorithm is hashing. Alkabani et al. [4] have tried an approach to move functionality of a Naïve Bayesian filter to hardware, namely hash table and tokenizing. A software Bayesian spam filter was implemented and run on the Microblaze processor softcore on a Xilinx FPGA. This was used as a first step towards designing an efficient spam filtering platform based on the Microblaze processor. When the hash table was replaced by a content addressable memory, the overall performance achieved an average improvement of 10%. This technique however requires a special co-processor for spam filtering. Our approach is to use a multi-purpose cryptographic processor provided by Intel to achieve these results. Being a generic processor, it can run like a normal desktop processor and at the same time make use of its accelerating capabilities for security applications. III. EXPERIMENTAL BASIS We are using Intel EP80579 (Tolapai) processor to achieve acceleration of Naïve Bayesian Spam filtering process. The details are described next. 3.1 Intel EP80579 Processor The Intel EP80579 Integrated Processor with Intel QuickAssist Technology, Tolapai, is a complete System-ona-Chip for Security, Communications, Storage and Embedded Designs. This SOC processor delivers a significant leap in architectural design, with an outstanding combination of performance, power efficiency, footprint savings and cost-effectiveness compared to discrete, multichip solutions. Using multi-chip solutions for different security applications pose scalability and cost issues. Tolapai aims to provide a single chip solution for security applications. The integrated accelerators in this SOC processor support Intel QuickAssist Technology through software packages provided by Intel. These software packages provide the library structures to integrate security and/or VoIP functionality into the application, completely adjunct to the Intel architecture complex, freeing up CPU cycles to support additional features and capabilities. This provides the efficiency of customized hardware with the flexibility to design diverse applications with one platform. The design also includes PCI Express, High Speed Serial1 (HSS) ports for TDM or analog voice connectivity, security accelerators for bulk encryption, hashing and public/private key generation [6]. 3.2 Naïve Bayesian Spam Filtering Algorithm Naïve Bayesian is a text classifier algorithm that analyzes textual features of an to identify it as a ham or spam based on probabilistic scoring of its textual attributes. The Naïve Bayesian approach consists of two phases training phase and the learning phase Training Phase The training phase scans an existing corpus of spam and ham s. It consists of three main steps Parsing An is parsed to identify different sections such as headers, body, to, from, subject, etc. Based on different filters different parsing techniques are used Tokenization Tokenization consists of creating tokens from different sections of . These tokens will be later used to classify s. Tokenization process is different for different spam filters. But it is one of the computation intensive functions of Naïve Bayesian spam filters Hash Maps Hash tables are created for tokens. Normally two separate hash tables are created for spam and ham s. Probabilistic scores are calculated for each token and a third hash table is created for mapping probabilities to tokens Classification Phase In classification phase an incoming is classified as a spam or ham. An incoming is first tokenized to get individual tokens. The corresponding probabilities for each token are retrieved from the hash table by hash lookup. Finally, Naïve Bayesian formula is used to classify this as ham or spam using these probabilities. The formula that the software uses to determine these probabilities is derived from Bayes theorem. It is, in its most general form: Where: Pr(S W) is the probability that a message is a spam, knowing that the word W is in it; Pr(S) is the overall probability that any given message is spam; Pr(W S) is the probability that the word W appears in spam messages; Pr(H) is the overall probability than any given message is not spam (is "ham"); Pr(W H) is the probability that the word W appears in ham messages [12]. 3.3 Achieving Acceleration As may be noted from above section, much of the computation goes into tokenizing and calculating hashes.
3 Section 4 gives actual statistics about these functions. Both functions form integral part of the training and classification phase. The Intel EP80579 Integrated Processor is a System- On-a-Chip (SOC), integrating the Intel Architecture core processor, the Integrated Memory Controller Hub (IMCH) and the Integrated I/O Controller Hub (IICH) all on the same die. In addition, it has integrated Intel QuickAssist Technology, which provides acceleration of cryptographic and packet processing. Fig. 1 shows the architecture of Intel EP IV. EXPERIMENTAL SETUP Intel EP80579 Development Board was assembled as per the instructions by Intel User guide for EP80579 [7]. Fig. 2 depicts a setup for experiments in our lab. RedHat Linux kernel was installed on this system along with software drivers and kernel modules for QuickAssist Technology provided by Intel. These modules consist of hardware APIs necessary to utilize the accelerating capabilities of Tolapai. 4.1 Naïve Bayesian Spam Filter Profiling A C code for naïve Bayesian spam filter was implemented in software. The training phase was completed using 40 s of spam and 40 s of ham. Sample s were classified using this training data. The various computation times were calculated by profiling the program. The timings are listed as below. Table 1. Training Phase Function Time (S) Uses Hashing Parse No Tokenize No Add token Yes Table 2. Classification Phase Fig. 1. Block Diagram for Intel EP80579 [6] The Intel QuickAssist Technology components, housed in the Acceleration and I/O Complex (AIOC), are as follows: The Security Services Unit (SSU) provides acceleration of cryptographic processing for most common symmetric cryptography (cipher algorithms such as AES, 3DES, DES, (A)RC4, and messages digest/hash functions such as MD5, SHA-1, SHA-2, HMAC, etc.); asymmetric cryptography (modular exponentiation to support public key encryption such as RSA, Diffie- Hellman, DSA); and true random number generation. The Acceleration Services Unit (ASU) includes packet processing acceleration engines. We utilize this acceleration capability of Intel EP80579 to improve the performance of Naïve Bayesian spam filter. The hashing function, as identified in Section 3.2 is moved to hardware using the hashing APIs provided by Intel QuickAssist technology. Function Time (S) Uses Hashing Tokenize No Find token Yes Classify No It is evident from the above results that hashing and tokenization are the most computation intensive functions of the program. 4.2 Hashing acceleration A program was written that makes use of hardware acceleration APIs of Tolapai to calculate SHA1 hash digest of input strings. Additionally, for the purpose of comparison, a software code was implemented that does the same SHA1 calculation and does not make use of these hardware APIs. An input sample of string tokens was created. SHA1 hashing digests for these input tokens were calculated in a gradual manner in software. The same input sample was fed to the hardware program and SHA1 hashing digests were calculated. The number of operations and processing times were noted for the software and hardware experiments. The results are described in the following section.
4 shows that performance for a spam filter can be increased by 25% using the Tolapai processor. Alkabani et al. [4] made use of a dedicated chip to achieve a performance improvement of 10% for hash function of spam filters. Our approach not only achieves better performance but at the same time doesn t require a dedicated hardware coprocessor or chip. Being a generic processor, no additional chip is required to achieve this acceleration. The interface to hardware through APIs that are provided by Intel, make the acceleration completely transparent to the user. The implementation of spam filter is still flexible, thus, overcoming shortcomings of any dedicated hardware modules. Other security applications can make use of the accelerating capabilities of Tolapai without additional costs. Our conclusion is that, spam filters utilizing Tolapai will perform better to detect spam and phishing s even when the traffic increases in real-time. Figure1. Intel EP80579 Lab Setup [7] VI. FUTURE WORK V. RESULTS & DISCUSSION The hardware implementation showed significant amount of performance gain over software. The results of our experiments are tabulated in Table 3. As can be seen, an average improvement of 26% was achieved. Table 3. Hashing Acceleration No. of Words Hardware (S) Software (S) %Gain w.r.t Software % % % % % % % % % % % % % % % % The hashing computation in a spam filter can be offloaded from software to achieve an overall performance improvement for Naïve Bayesian spam filters. The data Our future work would consist of moving more functions of Naïve Bayesian spam filters to Intel EP Tokenizing is one major time consuming function of such filters which if moved to hardware for speed optimization will improve overall performance of spam filters greatly. We also focus on utilizing Tolapai to implement other security applications which will be more efficient in performance than their software counterparts. ACKNOWLEDGEMENTS This research has been done in part through a grant from Intel Corporation. The authors would like to thank Vinodh Gopal and Madhusudhanan Chandrasekaran for the useful discussions during the course of this research. REFERENCES [1] S. Saroiu, S. D. Gribble and H. M. Levy, Measurement and Analysis of Spyware in a University Environment, In Proceedings of the 1 st ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, CA, [2] M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz. A Bayesian Approach to Filtering Junk . In Learning for Text Categorization - Papers from the AAA1 Workshop, pp , Madison Wisconsin. AAAI Technical Report WS-98-05, [3] Paul Graham - A Plan for Spam. Onlinehttp://paulgraham.com/spam.html [4] Alkabani, Y.M.; El-Kharashi, M.W.; Bedor, H.S. Hardware/Software Partitioning of a Bayesian Spam Filter via Hardware Profiling; Industrial Electronics, 2006 IEEE
5 International Symposium on Volume 4, 9-13 July 2006 Page(s): [5] Ferris Research Industries Statistic [Online] [6] Product Brief - Intel EP80579 Integrated Processor with Intel QuickAssist Technology Embedded Computing [Online]. Available: [7] Intel EP80579 Integrated Processor with Intel QuickAssist Technology Development Kit User Guide [Online]. Available: [8] Wikipedia, Spam, (electronic) -The free encyclopedia. Available [Online]. [9] Gartner, Inc. - Gartner Survey [Online] - [10] Symantec Global Internet Security Threat Report [Online]. [11] I. Androutsopoulos, J. Koutsias, K. V. Chandrinos, G. Paliouras, and C.D. Spyropoulos, "An evaluation of naive Bayesian anti-spam filtering," in Proceedings of the Workshop on Machine Learning in the New Information Age, G. Potamias, V. Moustakis and M. van Someren (eds.), 11th European Conference on Machine Learning, Barcelona, Spain, May 2000, pp [12] Wikipedia, Bayesian spam filtering, (electronic) -The free encyclopedia. Online [13] Madhusudhanan Chandrasekaran, Krishnan Narayanan, Shambhu Upadhyaya. Phishing Detection based on Structural Properties, NYS Cyber Security Conference, Albany, NY, June [14] Paypal
Vallisha Keshavamurthy and Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Buffalo, NY 14260 {vallisha,shambhu}@buffalo.
Accelerated Processing of Secure Email by Exploiting Built-in Security Features on the Intel EP80579 Integrated Processor with Intel QuickAssist Technology Vallisha Keshavamurthy and Shambhu Upadhyaya
Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN
Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN By Paul Stevens, Advantech Network security has become a concern not only for large businesses,
Bayesian Spam Filtering
Bayesian Spam Filtering Ahmed Obied Department of Computer Science University of Calgary [email protected] http://www.cpsc.ucalgary.ca/~amaobied Abstract. With the enormous amount of spam messages propagating
A MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM E-MAIL FILTERING 1 2
UDC 004.75 A MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM E-MAIL FILTERING 1 2 I. Mashechkin, M. Petrovskiy, A. Rozinkin, S. Gerasimov Computer Science Department, Lomonosov Moscow State University,
CAS-ICT at TREC 2005 SPAM Track: Using Non-Textual Information to Improve Spam Filtering Performance
CAS-ICT at TREC 2005 SPAM Track: Using Non-Textual Information to Improve Spam Filtering Performance Shen Wang, Bin Wang and Hao Lang, Xueqi Cheng Institute of Computing Technology, Chinese Academy of
IMPROVING SPAM EMAIL FILTERING EFFICIENCY USING BAYESIAN BACKWARD APPROACH PROJECT
IMPROVING SPAM EMAIL FILTERING EFFICIENCY USING BAYESIAN BACKWARD APPROACH PROJECT M.SHESHIKALA Assistant Professor, SREC Engineering College,Warangal Email: [email protected], Abstract- Unethical
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement
certicom application notes Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage
FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0
FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282
Simple Language Models for Spam Detection
Simple Language Models for Spam Detection Egidio Terra Faculty of Informatics PUC/RS - Brazil Abstract For this year s Spam track we used classifiers based on language models. These models are used to
A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering
A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering Khurum Nazir Junejo, Mirza Muhammad Yousaf, and Asim Karim Dept. of Computer Science, Lahore University of Management Sciences
On Attacking Statistical Spam Filters
On Attacking Statistical Spam Filters Gregory L. Wittel and S. Felix Wu Department of Computer Science University of California, Davis One Shields Avenue, Davis, CA 95616 USA Abstract. The efforts of anti-spammers
Naive Bayes Spam Filtering Using Word-Position-Based Attributes
Naive Bayes Spam Filtering Using Word-Position-Based Attributes Johan Hovold Department of Computer Science Lund University Box 118, 221 00 Lund, Sweden [email protected] Abstract This paper
1 Introductory Comments. 2 Bayesian Probability
Introductory Comments First, I would like to point out that I got this material from two sources: The first was a page from Paul Graham s website at www.paulgraham.com/ffb.html, and the second was a paper
Adaptive Filtering of SPAM
Adaptive Filtering of SPAM L. Pelletier, J. Almhana, V. Choulakian GRETI, University of Moncton Moncton, N.B.,Canada E1A 3E9 {elp6880, almhanaj, choulav}@umoncton.ca Abstract In this paper, we present
An Efficient Spam Filtering Techniques for Email Account
American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-02, Issue-10, pp-63-73 www.ajer.org Research Paper Open Access An Efficient Spam Filtering Techniques for Email
Detecting E-mail Spam Using Spam Word Associations
Detecting E-mail Spam Using Spam Word Associations N.S. Kumar 1, D.P. Rana 2, R.G.Mehta 3 Sardar Vallabhbhai National Institute of Technology, Surat, India 1 [email protected] 2 [email protected]
Email Filters that use Spammy Words Only
Email Filters that use Spammy Words Only Vasanth Elavarasan Department of Computer Science University of Texas at Austin Advisors: Mohamed Gouda Department of Computer Science University of Texas at Austin
An Efficient Three-phase Email Spam Filtering Technique
An Efficient Three-phase Email Filtering Technique Tarek M. Mahmoud 1 *, Alaa Ismail El-Nashar 2 *, Tarek Abd-El-Hafeez 3 *, Marwa Khairy 4 * 1, 2, 3 Faculty of science, Computer Sci. Dept., Minia University,
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
A Case-Based Approach to Spam Filtering that Can Track Concept Drift
A Case-Based Approach to Spam Filtering that Can Track Concept Drift Pádraig Cunningham 1, Niamh Nowlan 1, Sarah Jane Delany 2, Mads Haahr 1 1 Department of Computer Science, Trinity College Dublin 2 School
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.
Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0 Accellion, Inc. December 24, 2009 Copyright Accellion, Inc. 2009. May be reproduced only in its original entirety
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Journal of Information Technology Impact
Journal of Information Technology Impact Vol. 8, No., pp. -0, 2008 Probability Modeling for Improving Spam Filtering Parameters S. C. Chiemeke University of Benin Nigeria O. B. Longe 2 University of Ibadan
UVOIP: CROSS-LAYER OPTIMIZATION OF BUFFER OPERATIONS FOR PROVIDING SECURE VOIP SERVICES ON CONSTRAINED EMBEDDED DEVICES
UVOIP: CROSS-LAYER OPTIMIZATION OF BUFFER OPERATIONS FOR PROVIDING SECURE VOIP SERVICES ON CONSTRAINED EMBEDDED DEVICES Dinil.D 1, Aravind.P.A 1, Thothadri Rajesh 1, Aravind.P 1, Anand.R 1, Jayaraj Poroor
Increasing the Accuracy of a Spam-Detecting Artificial Immune System
Increasing the Accuracy of a Spam-Detecting Artificial Immune System Terri Oda Carleton University [email protected] Tony White Carleton University [email protected] Abstract- Spam, the electronic
Immunity from spam: an analysis of an artificial immune system for junk email detection
Immunity from spam: an analysis of an artificial immune system for junk email detection Terri Oda and Tony White Carleton University, Ottawa ON, Canada [email protected], [email protected] Abstract.
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2
Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version: 1.0.0.2 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.1 Prepared for: Prepared
Filtering Junk Mail with A Maximum Entropy Model
Filtering Junk Mail with A Maximum Entropy Model ZHANG Le and YAO Tian-shun Institute of Computer Software & Theory. School of Information Science & Engineering, Northeastern University Shenyang, 110004
A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack
A Novel Approach for Evaluating and Detecting Low Rate SIP Flooding Attack Abhishek Kumar Department of Computer Science and Engineering-Information Security NITK Surathkal-575025, India Dr. P. Santhi
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and
How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and non-repudiation. How to obtain a digital certificate. Installing
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
International Journal of Research in Advent Technology Available Online at: http://www.ijrat.org
IMPROVING PEFORMANCE OF BAYESIAN SPAM FILTER Firozbhai Ahamadbhai Sherasiya 1, Prof. Upen Nathwani 2 1 2 Computer Engineering Department 1 2 Noble Group of Institutions 1 [email protected] ABSTARCT:
Pulse Secure, LLC. January 9, 2015
Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May
A Proposed Algorithm for Spam Filtering Emails by Hash Table Approach
International Research Journal of Applied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 4 (9): 2436-2441 Science Explorer Publications A Proposed Algorithm for Spam Filtering
Controlling Spam E-mail at the Routers
Controlling Spam E-mail at the Routers Banit Agrawal Nitin Kumar Mart Molle Department of Computer Science & Engineering University of California, Riverside, CA, 92521, USA email: bagrawal, nkumar, mart
Image Spam Filtering Using Visual Information
Image Spam Filtering Using Visual Information Battista Biggio, Giorgio Fumera, Ignazio Pillai, Fabio Roli, Dept. of Electrical and Electronic Eng., Univ. of Cagliari Piazza d Armi, 09123 Cagliari, Italy
Anti Spamming Techniques
Anti Spamming Techniques Written by Sumit Siddharth In this article will we first look at some of the existing methods to identify an email as a spam? We look at the pros and cons of the existing methods
Voice over IP Security
Voice over IP Security Patrick Park Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA vii Contents Introduction xvii Part I VoIP Security Fundamentals 3 Chapter 1 Working with
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Cyber Security Practical considerations for implementing IEC 62351
1. Introduction Cyber Security Practical considerations for implementing IEC 62351 Frank Hohlbaum, Markus Braendle, Fernando Alvarez ABB [email protected] Switzerland Two trends are currently changing
Lan, Mingjun and Zhou, Wanlei 2005, Spam filtering based on preference ranking, in Fifth International Conference on Computer and Information
Lan, Mingjun and Zhou, Wanlei 2005, Spam filtering based on preference ranking, in Fifth International Conference on Computer and Information Technology : CIT 2005 : proceedings : 21-23 September, 2005,
AN EFFECTIVE SPAM FILTERING FOR DYNAMIC MAIL MANAGEMENT SYSTEM
ISSN: 2229-6956(ONLINE) ICTACT JOURNAL ON SOFT COMPUTING, APRIL 212, VOLUME: 2, ISSUE: 3 AN EFFECTIVE SPAM FILTERING FOR DYNAMIC MAIL MANAGEMENT SYSTEM S. Arun Mozhi Selvi 1 and R.S. Rajesh 2 1 Department
Chapter 4 Application, Data and Host Security
Chapter 4 Application, Data and Host Security 4.1 Application Security Chapter 4 Application Security Concepts Concepts include fuzzing, secure coding, cross-site scripting prevention, crosssite request
Textbooks: Matt Bishop, Introduction to Computer Security, Addison-Wesley, November 5, 2004, ISBN 0-321-24744-2.
CSET 4850 Computer Network Security (4 semester credit hours) CSET Elective IT Elective Current Catalog Description: Theory and practice of network security. Topics include firewalls, Windows, UNIX and
ERserver. iseries. Securing applications with SSL
ERserver iseries Securing applications with SSL ERserver iseries Securing applications with SSL Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users
Non-Parametric Spam Filtering based on knn and LSA
Non-Parametric Spam Filtering based on knn and LSA Preslav Ivanov Nakov Panayot Markov Dobrikov Abstract. The paper proposes a non-parametric approach to filtering of unsolicited commercial e-mail messages,
Detecting Spam in VoIP Networks
Detecting Spam in VoIP Networks Ram Dantu, Prakash Kolan Dept. of Computer Science and Engineering University of North Texas, Denton {rdantu, prk2}@cs.unt.edu Abstract Voice over IP (VoIP) is a key enabling
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
UM0586 User manual. STM32 Cryptographic Library. Introduction
User manual STM32 Cryptographic Library Introduction This manual describes the API of the STM32 cryptographic library (STM32-CRYP-LIB) that supports the following cryptographic algorithms: AES-128, AES-192,
Adaption of Statistical Email Filtering Techniques
Adaption of Statistical Email Filtering Techniques David Kohlbrenner IT.com Thomas Jefferson High School for Science and Technology January 25, 2007 Abstract With the rise of the levels of spam, new techniques
Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2
BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution
NetScaler 2048-bit SSL Performance
WHITE PAPER NetScaler Performance NetScaler 2048-bit SSL Performance July 2010 www.citrix.com/netscaler Overview NetScaler 9.2 boosts SSL performance with 2048-bit keys 5X to meet the needs of customers
Impact of Feature Selection Technique on Email Classification
Impact of Feature Selection Technique on Email Classification Aakanksha Sharaff, Naresh Kumar Nagwani, and Kunal Swami Abstract Being one of the most powerful and fastest way of communication, the popularity
Tim Bovles WILEY. Wiley Publishing, Inc.
Tim Bovles WILEY Wiley Publishing, Inc. Contents Introduction xvii Assessment Test xxiv Chapter 1 Introduction to Network Security 1 Threats to Network Security 2 External Threats 3 Internal Threats 5
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
Cisco VPN Internal Service Module for Cisco ISR G2
Data Sheet Cisco VPN Internal Service Module for Cisco ISR G2 Compact Versatile High-Performance VPN Module The Cisco VPN Internal Service Module (VPN ISM) is a module for the Cisco Integrated Services
Abstract. Find out if your mortgage rate is too high, NOW. Free Search
Statistics and The War on Spam David Madigan Rutgers University Abstract Text categorization algorithms assign texts to predefined categories. The study of such algorithms has a rich history dating back
McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.
McAfee Endpoint Protection for SMB You grow your business. We keep it secure. Big Protection for Small to Medium-Sized Businesses With the Internet and connected devices now an integral part of your business,
A Three-Way Decision Approach to Email Spam Filtering
A Three-Way Decision Approach to Email Spam Filtering Bing Zhou, Yiyu Yao, and Jigang Luo Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 {zhou200b,yyao,luo226}@cs.uregina.ca
Usable Crypto: Introducing minilock. Nadim Kobeissi HOPE X, NYC, 2014
Usable Crypto: Introducing minilock Nadim Kobeissi HOPE X, NYC, 2014 2012 Browsers are an environment that is hostile to cryptography Malleability of the JavaScript runtime. The lack of low-level (system-level)
Key & Data Storage on Mobile Devices
Key & Data Storage on Mobile Devices Advanced Computer Networks 2015/2016 Johannes Feichtner [email protected] Outline Why is this topic so delicate? Keys & Key Management High-Level Cryptography
BroadSAFE Enhanced IP Phone Networks
White Paper BroadSAFE Enhanced IP Phone Networks Secure VoIP Using the Broadcom BCM11xx IP Phone Technology September 2005 Executive Summary Voice over Internet Protocol (VoIP) enables telephone calls
A Personalized Spam Filtering Approach Utilizing Two Separately Trained Filters
2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology A Personalized Spam Filtering Approach Utilizing Two Separately Trained Filters Wei-Lun Teng, Wei-Chung Teng
Email Classification Using Data Reduction Method
Email Classification Using Data Reduction Method Rafiqul Islam and Yang Xiang, member IEEE School of Information Technology Deakin University, Burwood 3125, Victoria, Australia Abstract Classifying user
Filtering Spam Using Search Engines
Filtering Spam Using Search Engines Oleg Kolesnikov, Wenke Lee, and Richard Lipton ok,wenke,rjl @cc.gatech.edu College of Computing Georgia Institute of Technology Atlanta, GA 30332 Abstract Spam filtering
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
Computer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network
MESSAGING SECURITY GATEWAY Detect attacks before they enter your network OVERVIEW This document explains the functionality of F-Secure Messaging Security Gateway (MSG) what it is, what it does, and how
How To Protect Your Data From Being Hacked On Security Cloud
F-SECURE SECURITY CLOUD Purpose, function and benefits October 2015 CONTENTS F-Secure Security Cloud in brief 2 Security Cloud benefits 3 How does Security Cloud work? 4 Security Cloud metrics 4 Security
SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128
SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication
Email Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
Wireless Mobile Internet Security. 2nd Edition
Brochure More information from http://www.researchandmarkets.com/reports/2330593/ Wireless Mobile Internet Security. 2nd Edition Description: The mobile industry for wireless cellular services has grown
ERserver. iseries. Secure Sockets Layer (SSL)
ERserver iseries Secure Sockets Layer (SSL) ERserver iseries Secure Sockets Layer (SSL) Copyright International Business Machines Corporation 2000, 2002. All rights reserved. US Government Users Restricted
Image Spam Filtering by Content Obscuring Detection
Image Spam Filtering by Content Obscuring Detection Battista Biggio, Giorgio Fumera, Ignazio Pillai, Fabio Roli Dept. of Electrical and Electronic Eng., University of Cagliari Piazza d Armi, 09123 Cagliari,
SpamNet Spam Detection Using PCA and Neural Networks
SpamNet Spam Detection Using PCA and Neural Networks Abhimanyu Lad B.Tech. (I.T.) 4 th year student Indian Institute of Information Technology, Allahabad Deoghat, Jhalwa, Allahabad, India [email protected]
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
System-on-a-Chip with Security Modules for Network Home Electric Appliances
System-on-a-Chip with Security Modules for Network Home Electric Appliances V Hiroyuki Fujiyama (Manuscript received November 29, 2005) Home electric appliances connected to the Internet and other networks
AN E-MAIL SERVER-BASED SPAM FILTERING APPROACH
AN E-MAIL SERVER-BASED SPAM FILTERING APPROACH MUMTAZ MOHAMMED ALI AL-MUKHTAR College of Information Engineering, AL-Nahrain University IRAQ ABSTRACT The spam has now become a significant security issue
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT April 2009 EXAMINERS' REPORT Network Information Systems General Comments Last year examiners report a good pass rate with
MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS MODULE OVERVIEW. Security Policy REV 1.3, 10/2002
Security Policy MOTOROLA MESSAGING SERVER SERVER AND MOTOROLA MYMAIL DESKTOP PLUS ENCRYPTION DLL CRYPTOGRAPHIC MODULE REV 1.3, 10/2002 CONTENTS Module Overview... 1 Scope of Document... 2 Terms and Definitions...
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation
Bricata Next Generation Intrusion Prevention System A New, Evolved Breed of Threat Mitigation Iain Davison Chief Technology Officer Bricata, LLC WWW.BRICATA.COM The Need for Multi-Threaded, Multi-Core
Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection
Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection Govinda.K 1, Sathiyamoorthy.E *2, Surbhit Agarwal 3 # SCSE,VIT University Vellore,India 1 [email protected]
Confidentio. Integrated security processing unit. Including key management module, encryption engine and random number generator
Confidentio Integrated security processing unit Including key management module, encryption engine and random number generator Secure your digital life Confidentio : An integrated security processing unit
OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE. Guillène Ribière, CEO, System Architect
OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE Guillène Ribière, CEO, System Architect Problem Statement Low Performances on Hardware Accelerated Encryption: Max Measured 10MBps Expectations: 90 MBps
