Design and Evalua.on of a Real- Time URL Spam Filtering Service
|
|
|
- Charity Fisher
- 9 years ago
- Views:
Transcription
1 Design and Evalua.on of a Real- Time URL Spam Filtering Service Kurt Thomas, Chris Grier, Jus.n Ma, Vern Paxson, Dawn Song University of California, Berkeley Interna.onal Computer Science Ins.tute
2 Mo.va.on Social Networks (Facebook, TwiMer) Spam Blogs, Services (Blogger, Yelp) Web Mail (Gmail, Live Mail)
3 Mo.va.on Exis.ng solu.ons: Blacklists Service- specific, account heuris.cs Develop new spam filter service: Filter spam: scams, phishing, malware Real-.me, fine- grained, generalizable
4 Overview Our system Monarch: Accepts millions of URLs from web service Crawls, labels each URL in real-.me Spam Classifica.on Decision based on URL content, page behavior, hos.ng Large- scale; distributed collec.on, classifica.on Implemented as a cloud service
5 Monarch in Ac.on URL Spam Account Social Network
6 Monarch in Ac.on URL Monarch Spam Account Social Network
7 3. Fetch Content Monarch in Ac.on URL Monarch Spam Account Social Network Spam URL Content
8 3. Fetch Content Monarch in Ac.on URL Monarch Spam Account Social Network Spam URL Content
9 3. Fetch Content Monarch in Ac.on URL Monarch Spam Account Social Network Message Recipients Spam URL Content
10 Challenges Accuracy Real- Time Scalability Tolerant to Feature Evolu.on
11 Outline Architecture Results & Performance Limita.ons Conclusion
12 System Architecture
13 System Architecture
14 System Architecture
15 System Architecture
16 URL Aggrega.on Source Spam URLs Blacklisted TwiMer URLs Non- spam TwiMer URLs Sample Size 1.25 million 567,000 9 million Collec.on period: 9/8/ /29/2010
17 Feature Collec.on High Fidelity Browser NavigaGon Lexical features of URLs (length, subdomains) Obfusca.on (directory opera.ons, nested encoding) HosGng IP/ASN A, NS, MX records Country, city if available
18 Feature Collec.on Content Common HTML templates, keywords Search engine op.miza.on Content of request, response headers Behavior Prevent naviga.ng away Pop- up windows Plugin, JavaScript redirects
19 Classifica.on Distributed LogisGc Regression Data overload for single machine
20 Classifica.on Distributed LogisGc Regression Data overload for single machine L1- regularizagon Reduces feature space, over- figng 50 million features - > 100,000 features
21 Implementa.on System implemented as a cloud service on Amazon EC2 AggregaGon: 1 machine Feature CollecGon: 20 machines Firefox, extension + modified source ClassificaGon & Feature ExtracGon: 50 machines Hadoop - Spark, Mesos Straighjorward to scale the architecture
22 Result Overview High- level summary: Performance Overall accuracy Highlight important features Feature evolu.on Spam independence between services
23 Performance Rate: 638,000 URLs/day Cost: $1,600/mo Process.me: 5.54 sec Network delay: 5.46 sec Can scale to 15 million URLs/day Es.mated $22,000/mo
24 Measuring Accuracy Dataset: 12 million URLs (<2 million spam) Sample 500K spam (half tweets, half ) Sample 500K non- spam Training, Tes.ng 5- fold valida.on Vary training folds non- spam:spam ra.o Test fold equal parts spam, non- spam
25 Overall Accuracy Training RaGo Accuracy False PosiGve Rate False NegaGve Rate 1:1 94% 4.23% 7.5% 4:1 91% 0.87% 17.6% 10:1 87% 0.29% 26.5% Correctly labeled samples Non- spam labeled as spam Spam labeled as non- spam
26 Overall Accuracy Training RaGo Accuracy False PosiGve Rate False NegaGve Rate 1:1 94% 4.23% 7.5% 4:1 91% 0.87% 17.6% 10:1 87% 0.29% 26.5% Correctly labeled samples Non- spam labeled as spam Spam labeled as non- spam
27 Error by Feature Error (%) Error False Posi.ve Rate Error = 1 - Accuracy
28 Error by Feature Error (%) Error False Posi.ve Rate Error = 1 - Accuracy
29 Error by Feature Error (%) Error False Posi.ve Rate Error = 1 - Accuracy
30 Feature Evolu.on Retraining Required Accuracy (%) Sep 16- Sep 20- Sep 24- Sep With Retraining Without Retraining
31 Spam Independence Unexpected result: TwiMer, spam qualita.vely different Training Set TesGng Set Accuracy False NegaGves TwiRer TwiRer 94% 22% TwiMer 81% 88% TwiMer 80% 99% 99% 4%
32 Spam Independence Unexpected result: TwiMer, spam qualita.vely different Training Set TesGng Set Accuracy False NegaGves TwiMer TwiMer 94% 22% TwiRer 81% 88% TwiRer 80% 99% 99% 4%
33 Dis.nct , TwiMer Features
34 Features Shorter Lived
35 Limita.ons Adversarial Machine Learning We provide oracle to spammers Can adversaries tweak content un.l passing? Time- based Evasion Change content aser URL submimed for verifica.on Crawler Fingerprin.ng Iden.fy IP space of Monarch, fingerprint Monarch browser client Dual- personality DNS, page behavior
36 Related Work C. WhiMaker, B. Ryner, and M. Nazif, Large- Scale Automa1c Classifica1on of Phishing Pages J. Ma, L. Saul, S. Savage, and G. Voelker, Iden1fying suspicious URLs: an applica1on of large- scale online learning Y. Zhang, J. Hong, and L. Cranor, Can1na: a content- based approach to detec1ng phishing web sites M. Cova, C. Kruegel, and G. Vigna, Detec1on and analysis of drive- by- download afacks and malicious JavaScript code
37 Conclusion Monarch provides: Real-.me scam, phishing, malware detec.on Experiments show 91% accuracy, 0.87% false posi.ves Readily scalable cloud service Applicable to all URL- based spam Spam not guaranteed to overlap between web services TwiMer, qualita.vely different Despite overlap, can s.ll provide generalizable filtering Require training data from each service
How To Create A Spam Detector On A Web Browser
Design and Evaluation of a Real-Time URL Spam Filtering Service Geraldo Franciscani 15 de Maio de 2012 Teacher: Ponnurangam K (PK) Introduction Initial Presentation Monarch is a real-time system for filtering
Detection of Malicious URLs by Correlating the Chains of Redirection in an Online Social Network (Twitter)
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 3, July 2014, PP 33-38 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Detection
Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons
Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Yeongjin Jang*, Simon P. Chung*, Bryan D. Payne, and Wenke Lee* *Georgia Ins=tute of Technology Nebula, Inc 1 Tradi=onal
LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
Design and Evaluation of a Real-Time URL Spam Filtering Service
Design and Evaluation of a Real-Time URL Spam Filtering Service Kurt Thomas *, Chris Grier *, Justin Ma *, Vern Paxson *, Dawn Song * {kthomas, grier, jtma, vern, dawnsong}@cs.berkeley.edu * University
Design and Evaluation of a Real-Time URL Spam Filtering Service
2011 IEEE Symposium on Security and Privacy Design and Evaluation of a Real-Time URL Spam Filtering Service Kurt Thomas *, Chris Grier *, Justin Ma *, Vern Paxson *, Dawn Song * {kthomas, grier, jtma,
Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons
Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Yeongjin Jang*, Simon P. Chung*, Bryan D. Payne, and Wenke Lee* *Georgia Ins=tute of Technology Nebula, Inc 1 Tradi=onal
Understanding and Detec.ng Real- World Performance Bugs
Understanding and Detec.ng Real- World Performance Bugs Gouliang Jin, Linhai Song, Xiaoming Shi, Joel Scherpelz, and Shan Lu Presented by Cindy Rubio- González Feb 10 th, 2015 Mo.va.on Performance bugs
Domain Name System Security
Domain Name System Security Guevara Noubir Network Security Northeastern University 1 Domain Name System DNS is a fundamental applica=on layer protocol Not visible but invoked every =me a remote site is
So#ware quality assurance - introduc4on. Dr Ana Magazinius
So#ware quality assurance - introduc4on Dr Ana Magazinius 1 What is quality? 2 What is a good quality car? 2 and 2 2 minutes 3 characteris4cs 3 What is quality? 4 What is quality? How good or bad something
ECBDL 14: Evolu/onary Computa/on for Big Data and Big Learning Workshop July 13 th, 2014 Big Data Compe//on
ECBDL 14: Evolu/onary Computa/on for Big Data and Big Learning Workshop July 13 th, 2014 Big Data Compe//on Jaume Bacardit [email protected] The Interdisciplinary Compu/ng and Complex BioSystems
Introduc8on to Apache Spark
Introduc8on to Apache Spark Jordan Volz, Systems Engineer @ Cloudera 1 Analyzing Data on Large Data Sets Python, R, etc. are popular tools among data scien8sts/analysts, sta8s8cians, etc. Why are these
CS 558 Internet Systems and Technologies
CS 558 Internet Systems and Technologies Dimitris Deyannis [email protected] 881 Heat seeking Honeypots: Design and Experience Abstract Compromised Web servers are used to perform many malicious activities.
New DNS Traffic Analysis Techniques to Identify Global Internet Threats. Dhia Mahjoub and Thomas Mathew January 12 th, 2016
New DNS Traffic Analysis Techniques to Identify Global Internet Threats Dhia Mahjoub and Thomas Mathew January 12 th, 2016 1 Dhia Mahjoub Technical Leader at OpenDNS PhD Graph Theory Applied on Sensor
Phishing Scams Security Update Best Practices for General User
Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to
Email/Endpoint Security and More Rondi Jamison
Email/Endpoint Security and More Rondi Jamison Sr. Marke)ng Manager - Enterprise Security Strategy Agenda 1 Why Symantec? 2 Partnership 3 APS2 Packages 4 What s next Copyright 2014 Symantec Corpora)on
Who will win the battle - Spammers or Service Providers?
Who will win the battle - Spammers or Service Providers? Pranaya Krishna. E* Spam Analyst and Digital Evidence Analyst, TATA Consultancy Services Ltd. ([email protected]) Abstract Spam is abuse
Business Con*nuity with Docker
CloudOpen Japan 2015 Business Con*nuity with Docker 2015/06/04 Yoshitaka Kuwata Muroran Ins*tute of Technology Overview of Talk 1. Who is Talking 2. Mo*va*on of Disaster Recovery 3. Exis*ng Solu*ons 4.
A Practical Attack to De Anonymize Social Network Users
A Practical Attack to De Anonymize Social Network Users Gilbert Wondracek () Thorsten Holz () Engin Kirda (Institute Eurecom) Christopher Kruegel (UC Santa Barbara) http://iseclab.org 1 Attack Overview
Recurrent Patterns Detection Technology. White Paper
SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware
80 % Section I: Web Page Analysis TOP 5 WORDS URL DESCRIPTION TAG TITLE TAG SPEED COPY. ocean19.com
Section I: Web Page Analysis This section analyzes the specific web page at the URL you entered within your website or competitor's website, and determines how optimized it is for the keyword(s): chicago
Cloud Based Tes,ng & Capacity Planning (CloudPerf)
Cloud Based Tes,ng & Capacity Planning (CloudPerf) Joan A. Smith Emory University Libraries [email protected] Frank Owen Owenworks Inc. [email protected] Full presenta,on materials and CloudPerf screencast
SPAM, VIRUSES AND PHISHING, OH MY! Michael Starks, CISSP, CISA ISSA Fellow 10/08/2015
SPAM, VIRUSES AND PHISHING, OH MY! Michael Starks, CISSP, CISA ISSA Fellow 10/08/2015 The Usual Players Indebtedness for driving on toll road Transaction receipts Notice to appear Major and Emerging Trends
Connec(ng to the NC Educa(on Cloud
NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are
benefit of virtualiza/on? Virtualiza/on An interpreter may not work! Requirements for Virtualiza/on 1/06/15 Which of the following is not a poten/al
1/06/15 Benefits of virtualiza/on Virtualiza/on Which of the following is not a poten/al benefit of virtualiza/on? A. cost effec/ve B. applica/on migra/on is easy C. improve applica/on performance D. run
Adventures in Bouncerland. Nicholas J. Percoco Sean Schulte Trustwave SpiderLabs
Adventures in Bouncerland Nicholas J. Percoco Sean Schulte Trustwave SpiderLabs Agenda Introduc5ons Our Mo5va5ons What We Knew About Bouncer Research Approach & Process Phase 0 Phase 1 7 Final Test What
Ipswitch IMail Server with Integrated Technology
Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these
NGFW is yesterdays news what is next in scope for the firewall in the threat intelligence age
NGFW is yesterdays news what is next in scope for the firewall in the threat intelligence age Dynamic Threat Protection for Enterprise Edge and Data Center Rasmus Andersen Lead Security Sales Specialist
Main Research Gaps in Cyber Security
Comprehensive Approach to cyber roadmap coordina5on and development Main Research Gaps in Cyber Security María Pilar Torres Bruna everis Aerospace and Defence Index CAMINO WP2: Iden8fica8on and Analysis
Prophiler: A Fast Filter for the Large-Scale Detection of Malicious Web Pages
Prophiler: A Fast Filter for the Large-Scale Detection of Malicious Web Pages Davide Canali Marco Cova Giovanni Vigna Christopher Kruegel Institute Eurecom, France University of Birmingham, UK University
Panda Cloud Email Protection
Panda Cloud Email Protection 1. Introduction a) What is spam? Spam is the term used to describe unsolicited messages or messages sent from unknown senders. They are usually sent in large (even massive)
Service description for SUNET mailfilter
Service description for SUNET mailfilter Table of Contents Table of Contents... 2 Introduction... 3 Glossary... 4 Service description for SUNET mailfilter... 5 Introduction... 5 Service architecture...
Collax Mail Server. Howto. This howto describes the setup of a Collax server as mail server.
Collax Mail Server Howto This howto describes the setup of a Collax server as mail server. Requirements Collax Business Server Collax Groupware Suite Collax Platform Server including Collax Communication
Exchange of experience from a SuccessFactors LMS Implementa9on
Exchange of experience from a SuccessFactors LMS Implementa9on Seen from a user perspective Hanne Vasshus Ask Competency Management Cau9onary Statement The following presenta9on includes forward- looking
Corporate Account Takeover & Information Security Awareness
Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is for information purposes
Three Step Redirect API
Inspire Commerce &.pay Three Step Redirect API Inspire Commerce 800-261-3173 [email protected] Contents Overview... 3 Methodology... 3 XML Communica:on... 5 Transac:on Opera:ons... 6 Customer
Cloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
Blue Medora VMware vcenter Opera3ons Manager Management Pack for Oracle Enterprise Manager
Blue Medora VMware vcenter Opera3ons Manager Management Pack for Oracle Enterprise Manager Oracle WebLogic J2EE on VMware Monitoring 203 Blue Medora LLC All rights reserved WebLogic on VMware Management
User Guide to the Content Analysis Tool
User Guide to the Content Analysis Tool User Guide To The Content Analysis Tool 1 Contents Introduction... 3 Setting Up a New Job... 3 The Dashboard... 7 Job Queue... 8 Completed Jobs List... 8 Job Details
Protec'ng Communica'on Networks, Devices, and their Users: Technology and Psychology
Protec'ng Communica'on Networks, Devices, and their Users: Technology and Psychology Alexey Kirichenko, F- Secure Corpora7on ICT SHOK, Future Internet program 30.5.2012 Outline 1. Security WP (WP6) overview
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko
Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning MIS5206 Week 8 In the News Readings In Class Case Study BCP/DRP Test Taking Tip Quiz In the News Discuss items
DNS Traffic Monitoring. Dave Piscitello VP Security and ICT Coordina;on, ICANN
DNS Traffic Monitoring Dave Piscitello VP Security and ICT Coordina;on, ICANN Domain Names ICANN coordinates the administra2on of global iden2fier systems Domain names provide user friendly identification
Mining DNS for Malicious Domain Registrations
Mining DNS for Malicious Domain Registrations Yuanchen He, Zhenyu Zhong, Sven Krasser, Yuchun Tang McAfee, Inc. 451 North Point Parkway, Suite 3 Alpharetta, GA 322, USA {yhe, ezhong, skrasser, ytang}@mcafee.com
Data Management in the Cloud: Limitations and Opportunities. Annies Ductan
Data Management in the Cloud: Limitations and Opportunities Annies Ductan Discussion Outline: Introduc)on Overview Vision of Cloud Compu8ng Managing Data in The Cloud Cloud Characteris8cs Data Management
anomaly, thus reported to our central servers.
Cloud Email Firewall Maximum email availability and protection against phishing and advanced threats. If the company email is not protected then the information is not safe Cloud Email Firewall is a solution
WatchGuard QMS End User Guide
WatchGuard QMS End User Guide WatchGuard QMS Overview The WatchGuard QMS device enables spam messages from the WatchGuard XCS to be directed to a local quarantine area that provides spam storage for each
India s Integrated Taxpayer Data Management System (ITDMS) - A data mining tool for non-intrusive anti-tax evasion work
India s Integrated Taxpayer Data Management System (ITDMS) - A data mining tool for non-intrusive anti-tax evasion work Winner of Prime Minister Award For Excellence In Public Administration April 2010
This is a picture of a kiqen
Who am I? 11 years in InfoSec with 5 years of hobby work prior to that Primary interests: penetra;on tes;ng, intrusion detec;on, and log correla;on Currently employed as an InfoSec generalist at a cloud
Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats
Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
Additional information >>> HERE <<< Getting Instant Access free web hosting with cpanel and mysql Real User Experience
Additional information >>> HERE http://f-ebook.esy.es/lewigault/pdx/fph1 Tags: Get
Peering Through the iframe
Peering Through the iframe Brett Stone-Gross, Marco Cova, Christopher Kruegel, and Giovanni Vigna University of California, Santa Barbara University of Birmingham, United Kingdom {bstone,chris,vigna}@cs.ucsb.edu
IT Change Management Process Training
IT Change Management Process Training Before you begin: This course was prepared for all IT professionals with the goal of promo9ng awareness of the process. Those taking this course will have varied knowledge
Member Municipality Security Awareness Training. End- User Informa/on Security Awareness Training
End- User Informa/on Security Awareness Training 1 Why Awareness Training? NCLM sanc:oned mul:ple Security Risk Assessments for a broad spectrum of member municipali:es The assessments iden:fied areas
Anti Spam Best Practices
53 Anti Spam Best Practices Anti Spam LIVE Service: Zero-Hour Protection An IceWarp White Paper October 2008 www.icewarp.com 54 Background As discussed in the IceWarp white paper entitled, Anti Spam Engine:
Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty
Offensive & Defensive & Forensic Techniques for Determining Web User Iden
POP3 Connector for Exchange - Configuration
Eclarsys PopGrabber POP3 Connector for Exchange - Configuration PopGrabber is an excellent replacement for the POP3 connector included in Windows SBS 2000 and 2003. It also works, of course, with Exchange
Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS
Copyright 2014 Splunk Inc. Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS Dritan Bi=ncka BD Solu=ons Architecture Disclaimer During the course of this presenta=on, we may make forward looking statements
Applying Machine Learning to Network Security Monitoring. Alex Pinto Chief Data Scien2st MLSec Project @alexcpsec @MLSecProject!
Applying Machine Learning to Network Security Monitoring Alex Pinto Chief Data Scien2st MLSec Project @alexcpsec @MLSecProject! whoami Almost 15 years in Informa2on Security, done a licle bit of everything.
Website Report: http://voxleaf.com/sitemap.xml. To-Do Tasks: 0. Speed SEO SCORE: 73 / 100. Load time: 0.268s Kilobytes: 1 HTTP Requests: 0
Page 1 of 6 Website Report: http://voxleaf.com/sitemap.xml Keyword: None entered Date: January 10, 2015 SEO SCORE: 73 / 100 To-Do Tasks: 0 Speed Load time: 0.268s Kilobytes: 1 HTTP Requests: 0 This page
Parallel Data Mining. Team 2 Flash Coders Team Research Investigation Presentation 2. Foundations of Parallel Computing Oct 2014
Parallel Data Mining Team 2 Flash Coders Team Research Investigation Presentation 2 Foundations of Parallel Computing Oct 2014 Agenda Overview of topic Analysis of research papers Software design Overview
Cyan Networks Secure Web vs. Websense Security Gateway Battle card
URL Filtering CYAN Secure Web Database - over 30 million web sites organized into 31 categories updated daily, periodically refreshing the data and removing expired domains Updates of the URL database
Google Apps Sync for Microsoft Outlook
Sync for Microsoft Sync for Microsoft is a plug-in for 2003, 2007, or 2010 that lets you use your familiar interface to manage your mail, calendar, and contacts It also lets you import data from to your
1 Introduction 11 1.1 About this manual 11 1.2 Terms and conventions used in this manual 12
Administrator Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express or implied, including but
Financial Fraud Threats & Preven3on. Mark Frank EVP, Senior Opera3ons Officer Colorado Business Bank
Financial Fraud Threats & Preven3on Mark Frank EVP, Senior Opera3ons Officer Colorado Business Bank Why Pay ACen3on to Fraud Risks? Fraud occurs everywhere, and NO organiza3on is immune Changing business
Project Overview. Collabora'on Mee'ng with Op'mis, 20-21 Sept. 2011, Rome
Project Overview Collabora'on Mee'ng with Op'mis, 20-21 Sept. 2011, Rome Cloud-TM at a glance "#$%&'$()!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"#$%&!"'!()*+!!!!!!!!!!!!!!!!!!!,-./01234156!("*+!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!&7"7#7"7!("*+!!!!!!!!!!!!!!!!!!!89:!;62!("$+!
Splunk and Big Data for Insider Threats
Copyright 2014 Splunk Inc. Splunk and Big Data for Insider Threats Mark Seward Sr. Director, Public Sector Company Company (NASDAQ: SPLK)! Founded 2004, first sohware release in 2006! HQ: San Francisco
Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011
Hosted CanIt Roaring Penguin Software Inc. 26 April 2011 1 1 Introduction Thank you for selecting Hosted CanIt. This document explains how Hosted CanIt works and how you should configure your network to
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
Op#mizing NAT and Firewall Keepalives using PCP
Op#mizing NAT and Firewall Keepalives using PCP dra:- reddy- pcp- op#mize- keepalives- 01 IETF 86- Orlando, March 2013 T.Reddy, M.Isomaki, D.Wing, P.Pa#l 1 Keep- alive Op=miza=on Applica#on Client PCP
Cisco Cloud Email Security Interoperability with Microsoft Office 365
White Paper Cisco Cloud Email Security Interoperability with Microsoft Office 365 We ve all been witness to the cloud evolution and the technologies that have been driven by moving operations and resources
Kaspersky Anti-Spam 3.0
Kaspersky Anti-Spam 3.0 Whitepaper Collecting spam samples The Linguistic Laboratory Updates to antispam databases Spam filtration servers Spam filtration is more than simply a software program. It is
