PROTECTION AGAINST SPAM USING PRE- CHALLENGES
|
|
|
- Meagan Freeman
- 10 years ago
- Views:
Transcription
1 PROTECTION AGAINST SPAM USING PRE- CHALLENGES Rodrigo Roman 1, Jianying Zhou 1, and Javier Lopez 2 1 Institute for Infocomm Research, 21 Heng Mui Keng Terrace, Singapore ; 2 E.T.S. Ingenieria Informatica, University of Malaga, 29071, Malaga, Spain. Abstract: Keywords: Spam turns out to be an increasingly serious problem to users. A number of anti-spam schemes have been proposed and deployed, but the problem has yet been well addressed. One of those schemes is challenge-response, in which a challenge is imposed on an sender. However, such a scheme introduces new problems for the users, e.g., delay of service and denial of service attacks. In this paper, we introduce a pre-challenge scheme that avoids those problems. It assumes each user has a challenge that is defined by the user himself/herself and associated with his/her address, in such a way that an sender can simultaneously retrieve a new receiver's address and challenge before sending an in the first contact. Some new mechanisms are employed to reach a good balance between security against spam and convenience to users. electronic mail; anti-spam; internet security. 1. INTRODUCTION is one of the most valuable tools for Internet users, with which people at anywhere can communicate instantaneously regardless of the distance. However, this tool can be used for bad purposes too, and there is no doubt that the worst use of is spam. Spam, or unsolicited commercial , can be defined as advertising messages (mostly for fraudulent products) neither expected nor desired by the intended receivers. Since it is very easy to flood users mailboxes with little investment, spam is a big threat to systems, resulting in the loss of time and money to users.
2 2 Rodrigo Roman, Jianying Zhou, and Javier Lopez A lot of research in the area of anti-spamming has been done in the past years, trying to seek effective solutions to the spam problem. One of those solutions is challenge-response. When a sender sends an , he/she is first given a challenge from the receiver that must be solved before the reaches the receiver's mailbox. However, such a scheme introduces new problems, for example, delay of service (when a sender waits for arrival of a challenge from a receiver), and denial of service (when challenges are redirected to a victim's address that is spoofed by spammers as the sender). Our Contribution. In this paper, we propose a pre-challenge scheme, which is based on challenge-response mechanism, preserving its benefits while avoiding its drawbacks. It assumes that each user has a particular challenge associated with his/her address, in such a way that an sender can simultaneously retrieve a new receiver's address and challenge before sending an in the first contact. Our scheme enables management of mailing list and error messages. Our scheme is easy to be integrated into existing systems as it is a standalone solution, without changing the other party's software and configuration. The rest of the paper is organized as follows. In section 2, we summarize the existing solutions against spam and analyze their limitations and/or problems. After that, we present a new solution in section 3, and further discuss it in section 4. Finally, we conclude the paper in section PREVIOUS WORK The original SMTP protocol [1] was introduced in 1982, with only minor modifications [2] in the past 20 years. The main problem in SMTP is the lack of authentication. When an is received, it is not possible to know whether the source of the is who claims to be. This is precisely the flaw that spammers make use of. However, as the SMTP protocol has been standardized and widely deployed, most of the research focuses on avoiding spam while maintaining the actual SMTP protocol and infrastructure in order to ensure compatibility. This implies that anti-spamming solutions must be based on the operation with headers and contents or on specific implementations at the application level. One of the headers that can provide information regarding an eventual spam of the incoming is the Received: headers, which give information about the client MTA. There are some projects [3] that try to identify misconfigured MTAs or major sources of spam. However, it does not work effectively against individual spammers, and innocent client MTAs might be blocked.
3 Protection Against Spam Using Pre-Challenges 3 Another header that can be used against spamming is the receiver's address, with policy or password-like extensions. In policy-based systems [4], policies are encoded inside the address and an is discarded at its destination if the policy is not fulfilled. In password-based systems [5 7], the receiver's address is extended with a sequence of characters that act like a password, which can be obtained with a proof of computational task [10]. These solutions work well in some scenarios (e.g., using mail addresses in computer-based systems like web forums). However, as the addresses created in such schemes are very hard to remember, they may cause problems when used by humans. There are several works dealing with content analysis based on artificial intelligence (AI) and statistical techniques [8,9]. They try to distinguish whether an comes from a legitimate user or from a spammer by assigning a spam score to any incoming message. This approach may lead to false positives, and spammers may try to bypass the classifier algorithms. Other implementation approaches against spam include micropayment, challenge-response, and obfuscation schemes. Micropayment schemes [10-13] are applied to systems in order to prevent spammers sending millions of s. They require the user or client MTA to compute a moderately hard function in order to gain access to the server MTA. As a result, a spammer will not be able to send a large number of s to a certain server MTA. Such an approach is difficult to be applied to those client devices with very weak computing capability (e.g., mobile phones). In challenge-response schemes [14,15], whenever an from an unknown user is received, a challenge is sent back to that user. The solution to that challenge can be simple (e.g., just reply), complicated (e.g., solve a CAPTCHA [17] ), or time consuming. Only when the correct response is received, the s from that user are allowed to enter into the receiver's mailbox. These schemes do not work when a human user is not involved in sending s (e.g., in the case of mailing lists). Moreover, these schemes may introduce new problems such as delay of service and denial of service. In the obfuscation scheme, addresses are displayed in an obfuscated format (e.g., John HIPHEN Smith AT yahoo DOT com), from which senders can reconstruct the real addresses. It does not require any software from the user side or from the server side. However, the problem with this scheme is the constraints that the human users face when constructing the obfuscated addresses. As the combinations are limited, it allows AI-based harvest programs to easily retrieve real addresses. Moreover, once the is captured by the spammer, there is no protection against spam (unless other solutions are utilized).
4 4 Rodrigo Roman, Jianying Zhou, and Javier Lopez 3. A PRE-CHALLENGE SCHEME 3.1 Overview As stated, our pre-challenge scheme is based on challenge-response mechanism in the sense that both of them impose a challenge that must be solved by a potential sender. However, in the pre-challenge scheme, the sender retrieves the receiver's address together with his/her challenge simultaneously (see Fig. 1). Once the challenge is solved, the answer will be included inside the . 7 < MAIL 1, Response = 7 > [email protected] Challenge = Tel: < MAIL 2 > [email protected] [email protected] Figure 1. Basics of the pre-challenge scheme When a mail from an unknown sender arrives, the receiver's system tests whether that mail contains an answer to the challenge. If the test turns out positive, the sender is white-listed. That means future mails from this sender will get into the receiver's mailbox without being checked again. The goal of our scheme is to check whether there is really a human behind a sender's computer. The reason is that spammers use automatic programs to send their propaganda, and they feed these systems with addresses obtained by searching web sites and mail servers. However, it is a bit hard for these programs to retrieve a challenge that matches an address and even harder to answer each of these challenges. Therefore, whenever a spam arrives to destination, it will be automatically discarded if no correct answer to the challenge is attached. In comparison with a challenge-response scheme, our pre-challenge scheme preserves its benefits while avoiding its drawbacks, as we explain in the following: In a challenge-response scheme, there is a delay in obtaining the receiver's challenge. On the contrary, in our pre-challenge scheme,
5 Protection Against Spam Using Pre-Challenges 5 because the receiver's challenge is available in advance, the sender can directly solve the challenge and send the to the receiver 1. With a challenge-response scheme, if spammers forge a sender's address in their mails, the challenges will be sent to that address, launching a possible DDoS attack [16]. This attack will not take place in the prechallenge scheme because a receiver need not reply an unknown sender's request for a challenge. A challenge-response scheme can work with mailing lists only if some rules are manually introduced, and it cannot handle mail error messages properly. As we will show in section 4.1 and section 4.4, the prechallenge scheme manages mailing list systems and processes mail error messages without any problem. Another benefit of the pre-challenge scheme is the continuous protection against harvesting. When a correct address is retrieved by a spammer, he/she needs to get the solution of the current pre-challenge at the same time to make the address usable, but the user can change the prechallenge at any time (see section 3.2), making the combination < ,solution> useless. 3.2 Challenge Retrieval and Update A challenge is defined by an individual human user. Each user has one challenge at a time to be used by all incoming s, and the challenge can be updated at any time at his/her own discretion. The challenge can range from a simple question or mathematical operation to a hard-ai problem that only a human can solve [17]. Normally a user's challenge is published next to this user's address. Since any potential sender must retrieve the address of the receiver before contacting him/her, challenge and address can be accessed at the same time. However, in certain cases, a challenge may not be accessed directly. Instead, a URL may be provided to retrieve the challenge. Since the challenge is not restrained to obfuscate a valid address, which has a fixed structure (name, domain), the user has more freedom to produce it. When stored inside a website, the challenge can take advantage of its form and content personal information, the theme, or visual appearance of the website, etc. Challenges may also be retrieved using a majordomo style service [22]. To prevent spammers from using this service as a collector of valid addresses, the service must return a false challenge for every non-existent user. 1 The frequency of challenge update is a security parameter decided by the receiver, based on his/her own experience, to control the risk of replay attacks from spammers.
6 6 Rodrigo Roman, Jianying Zhou, and Javier Lopez 3.3 Data Structures The pre-challenge scheme requires certain data structures to accomplish its tasks. The two most important structures are the actual challenge (or a URL), and the solution to the challenge. By using these structures, it is possible to advertise the actual challenge and to check whether an incoming mail has solved the challenge. Additionally, the solutions to old challenges must be stored, as discussed later. Other data structures needed by the scheme are the white-list and the reply-list (both used by some challenge-response schemes), and the warninglist, that is a structure specifically created for our new scheme. Each of those structures contains a list of addresses and, optionally, a timestamp which indicates the time an can be in the list. White-List. The white-list contains addresses in such a way that s coming from those addresses are accepted without being checked. Some senders may even be white-listed by a receiver at the set-up phase if they are already known. Those senders are marked in order to send a confirmation when receiving their first message (see section 3.5). This list could be manually modified by a human user. Reply-List. The reply-list contains addresses of those users to which the local user has sent to, and has not replied yet. The use of this list is justified because the local user is the one who initiated the communication with those users; hence, there is no need to check any challenge when replies are received. This list will be managed automatically by the local user's system. Warning-List. The warning-list contains addresses of users that have sent an containing the answer of an old challenge. The existence of this list is justified because an message with an old response will cause a reply from the receiver indicating the new challenge. With this list, the local user does not need not send that reply more than once. This list will be reset every time when the challenge is updated, and will be managed automatically by the local user's system. 3.4 Security Levels The pre-challenge scheme can be configured to work at two security levels, high security and low security. The main difference between these two levels is how the reply-list is queried.
7 Protection Against Spam Using Pre-Challenges 7 The scheme starts working at the high security level of protection. High security means that all queries in the reply-list are done by looking for a <user, domain> match, and the matched entry will be erased from the replylist. On the other hand, low security means that all queries in the reply-list are done by looking for a <*, domain> match. The reason why the pre-challenge scheme needs these two levels of security is that some accounts have different addresses for receiving and for sending . This usually happens with mailing lists, and this issue will be discussed in section Architecture Now we explain the design of our pre-challenge scheme. Suppose user B wants to send an to user A. To simplify the explanation, we assume that user A is using the pre-challenge scheme while user B is not. 1. A's system checks if B's address is listed in the white-list. If this is the case, the reaches A's mailbox. Additionally, if that mail is the first message A received from B, A sends a confirmation to B. 2. Otherwise, if B is listed in the reply-list, the reaches A's mailbox and B is added to the white-list. We should point out that the query to the reply-list is different according to the level of security being applied, as seen in section 3.4. In case of using a high security level, B is erased from the reply-list because A received the reply expected from B. 3. Otherwise, A's system checks whether the challenge of the has been solved. If it is solved, the mail reaches A's mailbox and B is added to the white-list. Additionally, B receives a confirmation Otherwise, if the has a solution to an old challenge, A's system checks if B is listed in the warning-list 2. If that is the case, the mail is discarded. If it is not listed, B's address is added to the warning-list and B gets a reply containing information about the new challenge. 5. Otherwise, the is discarded without any reply to B indicating this fact. The problem of accidental discard of a legitimate will be addressed in section 4.3. It should be noted, however, that discarding the does not mean the user cannot read it. The scheme can be configured for labeling the message with a spam score and placing it in a special fold of the mailbox if the owner of that mailbox desires so. 2 Note, the warning-list will be reset whenever the challenge is updated.
8 8 Rodrigo Roman, Jianying Zhou, and Javier Lopez 3.6 Spam Scenarios When a spammer wants to send his/her advertisements to a final user that operates the pre-challenge scheme, he/she basically faces two scenarios. Scenario 1. The spammer only retrieves the address of a target, but not his/her challenge. When the spam is sent to the target, it will be silently discarded because no solution to a (current or old) challenge is included. Scenario 2. The spammer only retrieves the address of a target, and impersonates as a sender that happens to be in the receiver's white-list, due to the lack of authentication in the infrastructure. All schemes that use a white-list share this problem, but this is not a serious issue because spammers must find the white-listed senders for all the addresses he/she want to spam. And for millions of addresses to spam, this is unprofitable. It could seem that a spammer, using little investment (solving one challenge), can send many pieces of spam to a given address (a replay attack). It could also seem that a group of spammers interchange their solved challenges of the corresponding users in order to lessen each spammer's effort on accessing the victims mailboxes. However, what spammers want is to send millions of messages. And since the challenges are different for every user and a challenge can be solved only by a human, the task of repeatedly solving or sniffing a new challenge per user, or hiring cheap labor in order to send spam, becomes unprofitable. 4. FURTHER DISCUSSION Here we further discuss how our scheme works for users in a mailing list, and whether our scheme can make a challenge easily available to users and make users to be sure on the delivery status of an . We also discuss how to manage mail error messages. 4.1 Mailing Lists Mailing lists [18,19] share a common behaviour: upon registration, they send a challenge to the user in order to prove that the user is a real person. As a result, it seems not possible to use challenge-response schemes with mailing lists. Fortunately, there is a solution to this problem in the pre-challenge scheme. Since all mails from the same mailing list come from the same
9 Protection Against Spam Using Pre-Challenges 9 domain, a user can switch to the low security level (see section 3.4) whenever he/she wants to subscribe to a mailing list. At the low security level, all the incoming mails from the mailing list domain (including all the challenges and all the messages from the mailing list) that have a match in the reply-list are accepted into the user's mailbox and their senders are whitelisted. When the user finally receives the first mail of the mailing list, he/she switches to the high security level (see Fig. 2). 5) Finally, [email protected] is in the white-list 1) subscribe to [email protected] 2) negotiate with [email protected] 4) M From [email protected] 3) M From *@user.com [email protected] list.com Other subscribed users Figure 2. Process of subscription to a mailing list The risk of inserting a spammer inside the user's white-list while the user is at the low security level is very low, because the spammer's address must have the same domain as the people in the user's reply-list, and because a user normally only subscribes to a few mailing lists in a year. Also, the user can set up the system not for adding the incoming mails to the white-list when running at the low security level, but for adding to a temporary white-list instead. He/She will decide later whether to add (manually) them into the final white-list. 4.2 Availability It is clear that some availability problems exist when the challenge is not published along with the address. If a sender cannot obtain the challenge of a new receiver and solve it, his/her may not be able to reach the receiver's mailbox. It might be good to provide both the challenge and a URL that points to the challenge for better availability. In case the URL does not work, the challenge (even if outdated) can still be used by an sender to get in touch with a new receiver. (The receiver will reply with the latest challenge on receiving the answer of an old challenge.) Finally, there is an availability problem that is common for both prechallenge and challenge-response schemes: A challenge easy for a normal
10 10 Rodrigo Roman, Jianying Zhou, and Javier Lopez user might be impossible to solve for a disabled user. For example, a blind user will find impossible to solve a challenge based on images without help. 4.3 Accessibility One of the main issues in the pre-challenge scheme is that an incoming from a new sender without the answer of the receiver's challenge is automatically discarded, and the sender is not notified. This approach avoids the increment of Internet traffic due to the responses to spammers mails, but also introduces a problem: a normal sender is not sure whether the receiver really got the . A possible solution is to define a standard prefix in each address that is enabled with the pre-challenge scheme. In such a way, the sender knows clearly that a challenge should be answered in his/her first to such a receiver and a notification is expected should the reach the receiver's mailbox. There is an alternative solution if the pre-challenge scheme is implemented at the MTA level. In this solution, the sender is warned of the invalid answer of challenge using the error reporting mechanism of the SMTP delivery negotiation protocol. This protocol works as follows: 1. The client MTA sends the contents of the to the server MTA. After that, the server MTA checks if the must be accepted or rejected by searching the answer to the pre-challenge. 2. If the negotiation fails, the client MTA creates an that includes the cause of the error and the undelivered . That is sent to the original sender, if the client MTA does not manage his/her s. By using this solution, the final user will receive an error message if he/she sends an with an invalid answer of a challenge, without increasing the Internet bandwidth in most cases. We have more discussions on managing error messages in section Managing Mail Error Messages During the SMTP delivery negotiation between two MTAs, if an cannot be delivered to its recipient, the client MTA has to send the original sender an containing an error message. Errors can range from an invalid recipient to over-quota mailboxes, or (as seen in the previous section) pre-challenge errors. A problem arises when the error message is not created by the MTA of the client that implements the pre-challenge scheme. An example is shown
11 Protection Against Spam Using Pre-Challenges 11 in Fig. 3. In the example, the error happens at MTA lvl 2, thus MTA lvl 1 creates and sends an error message back to the original sender. But MTA is a computer and will not include any answer of a challenge inside the error message. Therefore, it will not reach the client's protected mailbox a problem of availability. Error in 4) due to No answer to pre-challenge Error in 2) due to Mailbox full 1) Send , OK 2) Send , ERROR [email protected] 4) Send error , ERROR MTA lvl 1 hotmail.com 3) MTA lvl 1 creates error MTA lvl 2 hotmail.com Figure 3. Problems while dealing with error messages This problem can be solved based on two premises. First, error messages can be identified with the message/delivery-status header, and have attached the that caused the problem. Second, all s have a unique ID issued by the original client MTA, stored in the Message-ID header. When an error message arrives, the pre-challenge scheme accepts the if both address of the recipient and ID of the original message are inside the reply-list. Thus, it is necessary to add the ID of outgoing s to the reply-list. A spammer may try to bypass this scheme by forging both the unique ID and the recipient of the original message. This requires the spammer to wiretap the communication channel, which is unprofitable for massive spamming. 5. SUMMARY In this paper, we presented a pre-challenge scheme for spam controlling, based on challenge-response mechanism but avoiding its drawbacks. Our scheme is a standalone solution, since there is no need to install software or change the configuration in the sender's side. Our scheme allows senders to have no delay in reaching the receiver's mailbox, and prevents the denial of service attack if the origin of the is forged. It also manages mailing list messages and error messages properly. Finally, our scheme offers protection against harvesting.
12 12 Rodrigo Roman, Jianying Zhou, and Javier Lopez This scheme can be used jointly with other major anti-spam solutions, because the type of protection that the pre-challenge scheme provides is centered in the protection of against harvesting, thus leaving the door open to other solutions such as content analysis. Moreover, the scheme could also be integrated with authentication solutions like DomainKeys [20] or Identity-Based Encryption [21], hence thwarting attacks like using forged senders to bypass the white-list checking. REFERENCES 1. J. Postel. Simple Mail Transfer Protocol. RFC 821, IETF, August J. Klensin. Simple Mail Transfer Protocol. RFC 2821, IETF, April SBL J. Ioannidis. Fighting Spam by Encapsulating Policy in Addresses. NDSS'03, February E. Gabber, M. Jakobsson, Y. Matias, and A. Mayer. Curbing Junk via Secure Classification Financial Cryptography, pages , February R. J. Hall. How to Avoid Unwanted . Communications of the ACM, 41(3):88-95, March L. F. Cranor and B. A. LaMacchia. Spam! Communications of the ACM, 41(8):74--83, August M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz. A Bayesian Approach to Filtering Junk . AAAI'98 Workshop on Learning for Text Categorization, July P. Cunningham, N. Nowlan, S. J. Delany, and M. Haahr. A Case-Based Approach to Spam Filtering that Can Track Concept Drift. ICCBR'03 Workshop on Long-Lived CBR Systems, June C. Dwork and M. Naor. Pricing via Processing or Combatting Junk Mail. Crypto'92, pages , August C. Dwork, A. Goldberg, and M. Naor. On Memory-Bound Functions for Fighting Spam. Crypto'03, pages , August M. Abadi, A. Birrell, M. Burrows, F. Dabek, and T. Wobber. Bankable Postage for Network Services. 8th Asian Computing Science Conference, December Microsoft Penny Black Project SpamArrest SpamCap J. Mirkovic, J. Martin, and P. Reiher. A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms. Technical Report #020018, Dept. of Computer Science. Univ. of California. 17.L. von Ahn, M. Blum, N. J. Hopper, and J. Langford. CAPTCHA: Using Hard AI Problems for Security. Eurocrypt'03, pages , May Ezmlm Mailing List Mailman Mailing List Yahoo DomainKeys D. Boneh and M. Franklin. Identity Based Encryption from the Weil Pairing. Crypto'01, pages , August Majordomo Mailing List.
How To Fight Spam With A Token On A Gmail Email Account
Enforcing Email Addresses Privacy using Tokens Roman Schlegel and Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasecwww.epfl.ch Abstract. We propose a system which allows users to monitor how
Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development
Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Author André Tschentscher Address Fachhochschule Erfurt - University of Applied Sciences Applied Computer Science
How To Block Ndr Spam
How to block NDR spam Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR
REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS
REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS Rami Khasawneh, Acting Dean, College of Business, Lewis University, [email protected] Shamsuddin Ahmed, College of Business and Economics, United Arab
Why Content Filters Can t Eradicate spam
WHITEPAPER Why Content Filters Can t Eradicate spam About Mimecast Mimecast () delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate
Cloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide
Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec
Email. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Email Daniel Zappala CS 460 Computer Networking Brigham Young University How Email Works 3/25 Major Components user agents POP, IMAP, or HTTP to exchange mail mail transfer agents (MTAs) mailbox to hold
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
An Overview of Spam Blocking Techniques
An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
Configuring MDaemon for Centralized Spam Blocking and Filtering
Configuring MDaemon for Centralized Spam Blocking and Filtering Alt-N Technologies, Ltd 2201 East Lamar Blvd, Suite 270 Arlington, TX 76006 (817) 525-2005 http://www.altn.com July 26, 2004 Contents A Centralized
Barracuda Spam Firewall
Barracuda Spam Firewall Overview The Barracuda Spam Firewall is a network appliance that scans every piece of email our organization receives. Its main purposes are to reduce the amount of spam we receive
Comprehensive Email Filtering. Whitepaper
Comprehensive Email Filtering Whitepaper Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email loses
USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security
USER S MANUAL Cloud Email Firewall 4.3.2.4 1 Contents 1. INTRODUCTION TO CLOUD EMAIL FIREWALL... 4 1.1. WHAT IS CLOUD EMAIL FIREWALL?... 4 1.1.1. What makes Cloud Email Firewall different?... 4 1.1.2.
SPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
BARRACUDA. N e t w o r k s SPAM FIREWALL 600
BARRACUDA N e t w o r k s SPAM FIREWALL 600 Contents: I. What is Barracuda?...1 II. III. IV. How does Barracuda Work?...1 Quarantine Summary Notification...2 Quarantine Inbox...4 V. Sort the Quarantine
Collateral Damage. Consequences of Spam and Virus Filtering for the E-Mail System. Peter Eisentraut 22C3. credativ GmbH.
Consequences of Spam and Virus Filtering for the E-Mail System 22C3 Introduction 12 years of spam... 24 years of SMTP... Things have changed: SMTP is no longer enough. Spam filters, virus filters are part
AntiSpam QuickStart Guide
IceWarp Server AntiSpam QuickStart Guide Version 10 Printed on 28 September, 2009 i Contents IceWarp Server AntiSpam Quick Start 3 Introduction... 3 How it works... 3 AntiSpam Templates... 4 General...
Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.
Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform
1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5
Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. What makes Panda Cloud Email Protection different?... 4 1.1.2. Is it secure?... 4 1.2.
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
Anti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1
PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. Why is Panda Cloud Email Protection
MDaemon configuration recommendations for dealing with spam related issues
Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did
GETTING STARTED GUIDE Exclaimer Anti-spam
GETTING STARTED GUIDE Exclaimer Anti-spam Getting Started Guide www.exclaimer.com Getting Started Guide - Anti-spam 01/30 Contents About This Guide...2 Anti-spam Overview...3 How does it Work?...3 What
EnterGroup offers multiple spam fighting technologies so that you can pick and choose one or more that are right for you.
CONFIGURING THE ANTI-SPAM In this tutorial you will learn how to configure your anti-spam settings using the different options we provide like Challenge/Response, Whitelist and Blacklist. EnterGroup Anti-Spam
Email Marketing Glossary of Terms
Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to
Sender and Receiver Addresses as Cues for Anti-Spam Filtering Chih-Chien Wang
Sender and Receiver Addresses as Cues for Anti-Spam Filtering Chih-Chien Wang Graduate Institute of Information Management National Taipei University 69, Sec. 2, JianGuo N. Rd., Taipei City 104-33, Taiwan
Spam Protection by using Sender Address Verification Extension (SAVE)
Spam Protection by using Sender Address Verification Extension (SAVE) Michael Conrad, Hans-Joachim Hof [conrad hof]@tm.uka.de Roland Bless [email protected] Institute of Telematics, Universität Karlsruhe
Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam
Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2
Using WinGate 6 Email. Concepts, Features, and Configurations.
WinGate Feature Guide Using WinGate 6 Email Concepts, Features, and Configurations. Neil Gooden Qbik New Zealand Limited Rev 1.0 December 2004 2 Introduction...3 Basic Email Concepts... 3 Differences in
How To Protect Your Email From Spam On A Barracuda Spam And Virus Firewall
Comprehensive Email Filtering: Barracuda Spam & Virus Firewall Safeguards Legitimate Email Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks
Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to this document, please check http://kuix.
Spam Salt aka Message Salt An invention against email abuse (Spam), introducing an email sender authentication mechanism. Author: Kai Engert, kaie at redhat dot com or kaie at kuix dot de For updates to
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
Advanced Settings. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Advanced Settings Abuse Detection SmarterMail has several methods
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
About this documentation
Wilkes University, Staff, and Students have a new email spam filter to protect against unwanted email messages. Barracuda SPAM Firewall will filter email for all campus email accounts before it gets to
Books and Beyond. Erhan J Kartaltepe, Paul Parker, and Shouhuai Xu Department of Computer Science University of Texas at San Antonio
How to Secure Your Email Address Books and Beyond Erhan J Kartaltepe, Paul Parker, and Shouhuai Xu p Department of Computer Science University of Texas at San Antonio Outline Email: A Brief Overview The
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
Savita Teli 1, Santoshkumar Biradar 2
Effective Spam Detection Method for Email Savita Teli 1, Santoshkumar Biradar 2 1 (Student, Dept of Computer Engg, Dr. D. Y. Patil College of Engg, Ambi, University of Pune, M.S, India) 2 (Asst. Proff,
Spam Testing Methodology Opus One, Inc. March, 2007
Spam Testing Methodology Opus One, Inc. March, 2007 This document describes Opus One s testing methodology for anti-spam products. This methodology has been used, largely unchanged, for four tests published
PANDA CLOUD EMAIL PROTECTION 3.3.0 / Administrator s Manual / 1
PANDA CLOUD EMAIL PROTECTION 3.3.0 / Administrator s Manual / 1 Contents 1 INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 5 1.1 WHAT IS PANDA CLOUD EMAIL PROTECTION?... 5 1.2 FUNCTIONALITIES... 5 2 PANDA
Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest?
Introduction The purpose of this memo is to explain how the email that originates from outside this organization is processed, and to describe the tools that you can use to manage your personal spam quarantine.
eprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
Purchase College Barracuda Anti-Spam Firewall User s Guide
Purchase College Barracuda Anti-Spam Firewall User s Guide What is a Barracuda Anti-Spam Firewall? Computing and Telecommunications Services (CTS) has implemented a new Barracuda Anti-Spam Firewall to
ContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering
Voyant Strategies ContentCatcher Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering tm No one can argue that E-mail has become one of the most important tools for the successful
When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper
When Reputation is Not Enough Barracuda Email Security Gateway s Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level
IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32
IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How
CONFIGURING FUSEMAIL ANTI-SPAM
CONFIGURING FUSEMAIL ANTI-SPAM In this tutorial you will learn how to configure your anti-spam settings using the different options we provide like FuseFilter, Challenge/Response, Whitelist and Blacklist.
Mailwall Remote Features Tour Datasheet
Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for
Exclaimer Anti-spam User Manual
Exclaimer UK +44 (0) 1252 531 422 USA 1-888-450-9631 [email protected] Contents GETTING STARTED... 8 Overview... 9 How Does It Work?... 9 What Next?... 9 No Technical Expertise Required... 10 But That's
Prevention of Spam over IP Telephony (SPIT)
General Papers Prevention of Spam over IP Telephony (SPIT) Juergen QUITTEK, Saverio NICCOLINI, Sandra TARTARELLI, Roman SCHLEGEL Abstract Spam over IP Telephony (SPIT) is expected to become a serious problem
Blackbaud Communication Services Overview of Email Delivery and FAQs
Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers
DMA s E-Mail Authentication Requirement: FAQs and Best Practices
DMA s E-Mail Authentication Requirement: FAQs and Best Practices DMA s Board of Directors approved a new guideline for ethical marketing practices in October 2005, with the new member requirement going
ModusMail Software Instructions.
ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
Quick Start Policy Patrol Spam Filter 5
Quick Start Policy Patrol Spam Filter 5 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.
Sonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
Quick Start Policy Patrol Spam Filter 9
Quick Start Policy Patrol Spam Filter 9 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.
Email Filter User Guide
Table of Contents Subject Page Getting Started 2 Logging into the system 2 Your Home Page 2 Manage your Account 3 Account Settings 3 Change your password 3 Junk Mail Digests 4 Digest Scheduling 4 Using
FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives
FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,
Guardian Digital Secure Mail Suite Quick Start Guide
Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................
How To Filter Email From A Spam Filter
Spam Filtering A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction Spam filtering is a catch- all term that describes the steps that happen to an email between a sender and a receiver
DomainKeys Identified Mail DKIM authenticates senders, message content
DomainKeys Identified Mail DKIM authenticates senders, message content Alt-N Technologies, Ltd. 2201 East Lamar Blvd, Suite 270 Arlington, Texas 76006 Phone: (817) 525-2005 Fax: (817) 525-2019 http://www.altn.com/
Quick Start Policy Patrol Mail Security 10
Quick Start Policy Patrol Mail Security 10 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step
A D M I N I S T R A T O R V 1. 0
A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA
What is a Mail Gateway?... 1 Mail Gateway Setup... 2. Peering... 3 Domain Forwarding... 4 External Address Verification... 4
Contents CHAPTER 1 IMail Secure Server as a Mail Gateway What is a Mail Gateway?... 1 Mail Gateway Setup... 2 CHAPTER 2 Possible Mail Gateway Configurations Peering... 3 Domain Forwarding... 4 External
A New Approach to Enhance E-mail Performance Through SMTP Protocol
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.4, April 2008 299 A New Approach to Enhance E-mail Performance Through SMTP Protocol Hussein A.Al bazar,sureswaran Ramadass,
Firewalls and Intrusion Detection
Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall
How does the Excalibur Technology SPAM & Virus Protection System work?
How does the Excalibur Technology SPAM & Virus Protection System work? All e-mail messages sent to your e-mail address are analyzed by the Excalibur Technology SPAM & Virus Protection System before being
VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division
VIDEO Intypedia013en LESSON 13: DNS SECURITY AUTHOR: Javier Osuna García-Malo de Molina GMV Head of Security and Process Consulting Division Welcome to Intypedia. In this lesson we will study the DNS domain
ZyWALL USG ZLD 3.0 Support Notes
2012 ZyWALL USG ZLD 3.0 Support Notes CSO ZyXEL 2/1/2012 Scenario 1 - Reserving Highest Bandwidth Management Priority for VoIP Traffic 1.1 Application scenario In an enterprise network, there are various
Comprehensive Email Filtering: Barracuda Spam Firewall Safeguards Legitimate Email
: Barracuda Firewall Safeguards Legitimate Email Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email
Spam Filtering Methods for Email Filtering
Spam Filtering Methods for Email Filtering Akshay P. Gulhane Final year B.E. (CSE) E-mail: [email protected] Sakshi Gudadhe Third year B.E. (CSE) E-mail: [email protected] Shraddha A.
Panda Cloud Email Protection
Panda Cloud Email Protection 1. Introduction a) What is spam? Spam is the term used to describe unsolicited messages or messages sent from unknown senders. They are usually sent in large (even massive)
SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide
SaaS Email Encryption Enablement for Customers, Domains and Users Quick Start Guide Email Encryption Customers who are provisioned for SaaS Email Encryption can easily configure their Content Policies
IMF Tune Opens Exchange to Any Anti-Spam Filter
Page 1 of 8 IMF Tune Opens Exchange to Any Anti-Spam Filter September 23, 2005 10 th July 2007 Update Include updates for configuration steps in IMF Tune v3.0. IMF Tune enables any anti-spam filter to
Libra Esva. Whitepaper. Glossary. How Email Really Works. Email Security Virtual Appliance. May, 2010. It's So Simple...or Is It?
Libra Esva Email Security Virtual Appliance Whitepaper May, 2010 How Email Really Works Glossary 1 2 SMTP is a protocol for sending email messages between servers. DNS (Domain Name System) is an internet
Bayesian Spam Filtering
Bayesian Spam Filtering Ahmed Obied Department of Computer Science University of Calgary [email protected] http://www.cpsc.ucalgary.ca/~amaobied Abstract. With the enormous amount of spam messages propagating
User guide Business Internet e-mail features
User guide Business Internet e-mail features Page 1 de 1 Table of content Page Introduction 3 1. How do I access my web based e-mail? 3 2. How do I access/alter these enhancements? 3 A. Basic Features
Symantec Hosted Mail Security Getting Started Guide
Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration
