Proof of Work can Work
|
|
|
- Stephany Parker
- 9 years ago
- Views:
Transcription
1 Proof of Work can Work Debin Liu L Jean Camp School of Informatics Indiana University March 23, 2006 <[email protected], [email protected]> Abstract and Overview Proof of work has been proposed as a mechanism to increase the cost of so that spamming is no longer economically attractive. However, the first economic examination of proof of work argued that POW would not, in fact, work because of the difference of cost to spammers and senders of legitimate . We illustrate that this shift in the production frontier enabled by zombies does not remove the efficacy of proof of work if work requirements are weighted by a reputation function. We illustrate that proof of work can worked when combined with the currently used reputation systems in commercial anti-spam technologies.
2 1. Introduction The current volume of sent worldwide is now more than 50 billion messages per day. Research indicates that as much as 85% of all messages are unwanted spam, viruses, denial-of-service attacks, Trojans and other malicious threats. [1] The core problem with spam is that the sender bears almost no cost to send spam. The cost is borne by the network service providers and the recipients. In order to solve this problem, proof of work has been proposed to alter the economics of spam, [2] by requiring that the sender commit to a per- cost. However Laurie and Clayton illustrated that proof of work, on its own, it is not a solution to the problem of spam. [3] In this paper we will illustrate that proof of work (POW) systems can work if combined with a reputation system. We will start it by describing POW. We then identify the sources of cost assumptions with POW, which follow the derivation of parameters by Laurie and Clayton. Note that these were the parameters used to determine that POW is indeed unworkable. In the next section we provide an overview of the current state of the art of deployed anti-spam reputation systems. Finally combining both POW scheme and reputation mechanism, we will propose our POW model. We argue that combine POW with currently deployed reputation systems creates a POW system that works. We show that the system would work reasonably for all legitimate users. 2. What is Proof of Work The core enabling factor of spam is that spam is cheap to send. Proof of work comprises a set of proposals, in which senders would be required to pay money, perform a resource-intensive computation, [4], perform a series of memory operations [2], or post a bond, [3] for each message sent. The intention is to deter spam by making it uneconomic to send a large number of messages, while enabling legitimate users to send small numbers of messages. Despite observation about high variance in processing ability of devices, the model was the original and is the most examined. Therefore, this paper
3 concerns itself with costs of performing some moderately expensive computation as POW. In 1992, the first computational technique for combating junk mail was presented by Cynthia Dwork and Moni Naor. Their fundamental intellectual contribution was to require an sender to compute some moderately hard, but not intractable, function of the message and some additional information in order to gain access to the resource, thus preventing frivolous use. [4] In other word, the basic idea of POW is if I don t know you and you want to send me an , then you must prove your is worth receiving by spending some time calculating a function on your computer. Such a function is cane be modeled as a market which is designed to have the unusual property that production is more expensive than consumption. That is, for the calculation performed the recipient s confirmation of the work done is far less expensive than the work itself. Therefore the key property of the POW functions is that they are very expensive for sender to solve, but it is comparatively cheap for recipient to verify. The current most popular POW system is the hashcash system. [5] Hashcash was originally proposed as a mechanism to throttle systematic abuse of un-metered internet resources such as , and anonymous r ers, in which the sender is required to compute a cost function and produce a string which can be used as a POW. [5] It s necessary to note that the amount of time needed in computing a pricing function or a cost function in POW mechanism in different computers can vary enormously. Work that might take 20 seconds on a Pentium IV could take several minutes or more on a Pentium II. To address this problem, pricing functions that rely on accessing large amounts of random access memory was proposed by Cynthia Dwork, Andrew Goldberg, and Moni Naor. Since memory speeds vary much less across machines than CPU speeds, memorybound functions should be more equitable than CPU-bound functions. A factor of four between fastest and slowest is claimed. [2]
4 The combination of reputation and POW proposed in this paper would work with any of the proposed POW systems. 3. Laurie & Clayton s Requirements for Proof of Work to Work Proof of work as a concept appears powerful enough to solve the junk problem by changing the underlying economics which enable spam. Yet Ben Laurie and Richard Clayton showed that it is not possible to simultaneously discourage spammers by means of a POW system and have an unacceptable impact on legitimate senders of [3]. We use the parameters in their work to set up the problem of a feasible POW system. Obviously simply altering those parameters would resolve the conflict between spammers and legitimate users; however, their numbers identify a critical issue in POW that must be resolved for the system to be feasible. In the following paragraphs, we review and discuss the parameters as calculated in [3]. By illustrating that POW can work for those parameters we solve the specific case. By providing the shape of the reputation curve, we illustrate that POW solutions can in general work if augmented by a reputation system. To begin, recall on Radicati s estimation [6] that as of November 2003, in a average, s are sent per day by users on the Internet using accounts, Brightmail s estimation [7] that 56% of all s are spam, and the Internet Domain Survey s estimation [8] that there are totally Laurie and Richard considered that there are junk s and hosts, legitimate s, and each machine would send 125 s per day assuming the sending legitimate is equally distributed. From their examination in the UK, Laurie and Richard further assumed that the proportion of legitimate non-list s being sent by each machine is about 60%, thus a final average of about 75 legitimate non- s being sent is determined. We accept these estimates
5 Then in economic terms, a $1.75 each machine per day cost of spamming operations is estimated. Considering spammers used to charge as much as 0.1 cents per , one spammer must send at least s per day to cover his cost. Therefore a POW calculation time has to be at least 50 seconds. Effectively for any POW system, spammers and legitimate senders of have different production frontiers. Senders of legitimate e mail purchase equipment and services on a free and open market. Spammers use botnets, which consist of highly parallel theft of electronic services including processing and communication services through subversion of end user machines. In security terms, spammers can access insecure end-user machines and use their resources, Laurie and Clayton first estimated that 1.1 million machines might be owned by spammers. Then a pool of a million machines would have to send junk s each per day. Consequently to make only 1% spam among all legitimate s, which is 250 s each machine per day, a POW calculation time must be at least 346 seconds. In economic terms, the availability of zombie machines shifts the production frontier for spammers. Spammers have ea far lower cost of production than legitimate users. With the proposal here to reputation system addresses this difference in cost. In fact, if this difference in the production frontier is 10 or 20 times a decrease in cast, instead of simply 7x, the reputation-enhanced POW system proposed here would still work. At last Laurie and Clayton examined logging data from the large UK ISP. They found that although 93.5% of machines sent less than 75 s per day, a POW mechanism would prevent legitimate activity by 1% or 13%. And considering the spammers will select fast machines and real senders may only have relatively slow machines, the impact on legitimate senders can be worse. 4. Current Anti-spam Reputation Mechanisms
6 Today both commercial firms and volunteers run subscriber services dedicated to blocking or filtering spam, such as AppRiver, Brightmail, CipherTrust.. This section describes the reputation element of these various anti-spam entities. In general, a reputation system is designed to keep track and examine sender history. Once the sender is identified by the sets of servers that cooperate to defeat spam, then reputation systems are used to measure the behavior of senders over time. Different mechanisms are used to track and rate sender behavior over time. Behavior is classified in these systems as good (i.e., sending legitimate ) or bad (sending spam or malicious mail. Malicious mail includes phishing attacks and mail containing a virus malicious code, such as a virus or worm. Reputation systems may also create profiles, so that deviations from known historical behavior can be identified. For example, a previously trusted account sending out malicious mail may indicate a user who is trustworthy in moral terms (e.g., not a spammer) but has been subverted and can no longer be trusted because of a technical failure. The first generation reputation systems using simple blacklists and whitelists began as a response to the annoying s that began to fill inboxes around the world. Blacklists contain the IP addresses of known spammers and virus senders, and whitelists contain the IP addresses of senders known to be legitimate [9]. Obviously the first generation simple reputation systems have some painful shortcomings, such as a sender s reputation could be affected by the behavior of all senders with whom the sender shares network resources, and the sender s reputation could be affected by malicious code that is sent out spam or virus via [10]. Second generation reputation systems included significant improvements over first generation reputation systems: dynamically updated lists which allowed reputation systems to adjust to rapidly changing conditions; automatic updates which removed the burden from administrators who had previously been required to manually upload their lists to central hosts; more granular message scoring which assigned each incoming with a score based on its likelihood of being a legitimate . [9] The result has been something of an arms war in reputation systems, with the spammers even more devious and the reputation systems ever more complex.
7 The corresponding academic activities in analysis of reputation systems have created sets of requirements for reputation systems. We use a subset of Dingledine [11] as a foundation to evaluate the various anti-spam reputation systems on the market. An effective reputation system must be dynamic, comprehensive and precise, and based on actual enterprise mail traffic in order to keep the spammers from gaining any advantage. [9] Today the latest reputation systems take the persistence testing approach to reputation scoring, and also consider the social network of the sender to determine reputation scores. Both CipherTrust and gmail have significant information about the social network of recipients who subscribe to their services. Despite the existing commercial differentiation of systems, there is a common core to the anti-spam reputation systems. Most of the existing reputation mechanisms use the average of past feedback reports to assess the reputation of one agent. [12] Different reputation system providers have different characteristics and therefore different cost functions, and different efficient quality levels. We will use this shared core as the basis for our examination of the feasibility of POW as a part of an integrated anti-spam solution to propose both a general shape of a reputation system, and a specific instantiation of the reputation system that would solve the problem as defined by Laurie and Clayton. 5. Proof of Work with a Continuous Reputation Function Many of the details of reputation systems in anti-spam technologies are protected secrets. Therefore we cannot simply assert that a given reputation system would correspond with POW. However, we can make a proposal for a reputation system based on publicly available information.
8 We propose a reputation system that distrusts new senders initially but allows senders to increase their capacity by exhibiting good behavior over time. The following paragraphs describe our proposed system. Recall the parameters in Laurie and Clayton s work. Their examination showed that although 93.5% of machines sent less than the global average of 75 s per day, the distribution has a very long tail. (Fig. 1) [3] Therefore their conclusion presented that examining the variations of sending by some real users showed that significant numbers of them would be unable to provide POW for all the legitimate that they currently send Cumulative Percentage Amount of Sending s per day Fig. 1 Senders of x s per day To make POW working for the other 6.5% senders, legitimate individuals who usually send numerous s per day, we propose to combine a reputation mechanism and POW scheme. In this proposal the cost of POW could be variable based on his reputation score. So that R () s = C, where the R is the reputation function, s is the reputation score and C is the cost of POW.
9 Newcomers are overwhelming malevolent in the world of SMTP servers. The research done by CipherTrust [9] identified that approximately 50 million IP addresses which send approximately 70% of all on a daily or nearly daily basis. The other 30% comes from IP addresses which have not been previously encountered. More than 95% of that 30% of s from new or unknown IP addresses is spam, viruses, or other malicious messages. Based on this analysis, it can be concluded that an IP address which is encountered for the first time is ~95% likely be a zombie machine. Building on the success of commercial spam protection, we would propose giving each one new IP address an initial reputation score, which should be low enough to prevent this new machine being a profitable zombie if it is indeed infected. In other words, variable POW restricts new IP addresses to prevent them from sending more than 1% spam among all legitimate s per day by demanding a heavy burden in terms of POW. Based on the CPU analysis in Laurie and Clayton s calculation [11], to make at most 1% spam among all legitimate s, which is 250 s each machine per day, a POW calculation time must be at least 346 seconds. That is R ( s 1 ) = C1, where C 1 could be around C 1 = 346. This constant could be increased even further if the number of zombies is far greater than even this estimate suggests. The reputation of this new IP address will not be fixed at the initial score s 1 forever. Newcomers can overcome initial distrust by performing the POW required and sending only legitimate s. For a legitimate user, the reputation score will increase over time and the corresponding work requirement will decrease. Notice that the reputation mechanisms described above works in conjunction with other mechanisms that have a probabilistic ability to recognize spam on a per- basis. The specific reputation mechanisms shown in this paper is designed so that by sending the first 50 s in one week, assuming none of these are flagged as spam, this new IP address builds up a history and reaches its maximal reputation score s 2, which makes R ( s 2 ) = C2, where the
10 C 2 = 50. Again the POW C 2 = 50 is from the economic analysis in Laurie and Clayton. [11] This new IP address can keep sending new messages with the same reputation score s 3 = s 2 at the same POW cost C 3 = C2 until the total amount of sent in one day reaches 75, the global averages for usage. After that, more s will lower a reputation score and increase the requirements for POW. Another important threshold is when the sender has sent the 7 75 = 525 th in one week. As we mentioned previously, to prevent this IP address being a zombie machine and sending more than 1% spam, we have to apply a POW cost C 4 = 346 = C1 onto it. ( ) 4 That is R s 4 = C =C1. Assume that machines move in and out of zombie status. The assumption is that a zombie machine can be detected and cleaned in a week. Then this new IP address has to bear the POW cost C = 346 for sending s from the 526 th until the = 1750 th. After that this IP address has successfully built up its history, passed its test and proved that it is no longer malevolent. However, the machine stays a zombie its efficacy is decreased after the initial 525 s so that we have effectively limited the production of the specific zombie for one week. Recall that the goal is to decrease spam by making it less profitable. The effect of POW combined with a reputation system is to decrease the productivity and increase the cost of spam. 6. Results for POW and Reputation In this model, we let the reputation score s 1 = 0 and s 2 = 100, and the POW costc = C 346 seconds and C = C 50 seconds. We give the cost function 1 4 = () ] 2 3 = as C = R s = [ 3 s + 50, in units of seconds. (Fig. 2)
11 Cost of Proof of Work (second) Reputation Score Amount of Sending s 1750 Fig. 2 Reputation Curve The expected cost for an sender over one week to send s will be C per . Once an is indicated as a spam, the reputation score of this IP address will drop and the IP address will be flag. After some number of spam s, the IP is placed on a black list and all s are refused. At first, we give the rules how the reputation drops in case of only one spam indicated. Between the 1 st and 49 th , once the n th is detected as spam, its reputation score s n = f (n) where the f is the reputation score function of the number of sending n. And the reputation score of (n+1) th would be s n + 1 = f ( n' ) where the n = max( n, n ) + T, in which the ' 1 2 f ( n1 ) f ( n2 ) = f ( n) = and T is the shift which actually makes reputation score drop. Between the 50 th and 525 th , once the n th is detected as spam, the (n+1) th will have a score as s n + 1 = f ( n + T '), where the T is the shift drops reputation score. And we assume in this calculation, T = 20 and T '= 50.
12 Finally in order to be simplified we assume that each IP address has only one chance to be indicated as spam. Once it is flagged twice, it will go to black list. Therefore if the 1 st is indicated as spam, the total cost of staying a whole week is: C = g(1) + g( h + t) t= 0, where the g is the reputation cost function of the number of sending and h is calculated according to out score dropping rules. If the 2 nd is indicated as spam, the total cost of staying a whole week is: C = g( t) + g( h + t) t= 1 t= 0, where the g is the reputation cost function of the number of sending and h is calculated according to out score dropping rules. Therefore the n th is indicated as spam, the total cost of staying a whole week is: C n = n t= n g( t) + g( h + t), where the g is the reputation cost function of the number of t= 0 sending and h is calculated according to out score dropping rules. There is 1749 possibility where the first spam will be detected. Hence the expected cost of each sending is: C n 1 n 1749 = 1749 [ 1, ] n t= 1 g( t) t= 0 n g( h + t) The result shows that the expected cost of POW of each sending for having one spam flag and staying for a week is around 317 seconds. This cost is close to 346 which based on Laurie and Clayton s analysis is enough to discourage spammers to send spasm. Also we calculate the expected cost of POW of each sending for the first 525 is around 13 seconds. This mean for 93.5% senders who send 75 s per day
13 525 and s per week on average, the cost is acceptable for the vast majority of users. At this cost it would be possible to send hundreds of s a day. In this example we have assumed that spam and legitimate is identified correctly and during a week only one is allowed to be flag as spam. In the following section we provide a simpler reputation mechanism (based on step functions) and include the probability that spam is not detected or that legitimate is detected. 7. Proof of Work with a Step Reputation Function The result of calculation on the first model shows that POW combined with reputation mechanism is able to discourage spammers economically under an assumption that one zombie machine can be detected during one week. However that model assumes a detailed cost that depends upon order of as well as type. It also assumes that all is correctly identified. To expand upon this work we illustrate that a simpler reputation system, combined with a probability of incorrect identification of spam. This second model also combines POW and reputation mechanism. In this case the reputation mechanism is a step function, one cost with and one cost without spam. It is assumed that spam is detected on a per basis, and that sometimes is incorrectly identified. Consider the probabilities of false identification of legitimate as spam, and correct detection of false as correct. Based on public reports of anti-spam vendors we assert that there exists software that can detect one spam with P 1 accuracy and may indicate a legitimate as spam mistakenly with probability P 2. P 1 is much greater than P 2. According to current vendors, P 1 is around 98%~99% and P 2 is around 1%. Vendors vary between their tolerances of error types: some vendors never throw our legitimate but detect less spam, while others detect more spam but lose the occasional .
14 Initially a POW cost of 350 seconds per is assigned to a new IP address. After bearing this cost for 14 s the POW cost drops to 10 at once, assuming no spam is detected. However, once one is indicated as spam, the per- cost to this IP address will jump back to 350 immediately. After a single spam, regardless of the nature of the following 14 s, all of them have to bear this high cost as punishment until the 15 th after the spam. The reputation system follows a tit-for-tat model with forgiveness. Defection, in this case sending spam, results in immediate punishment in the form of increased work. If the participant then behaves well for the next s, then there is (in game theoretic terms) forgiveness. Therefore a user who is wrongfully identified as a spammer will not pay an indefinite price. Of course, in this simple model we do not address the existence of blacklists. Clearly, once an address has been repeatedly identified as a spambot, no would be accepted. We developed a Matlab simulation to develop the average POW cost to end users who are ill or well-behaved. The simulation allows us to test the probability of each , with various s detected from spammers and legitimate senders. In this simulation, each sending is an event under and is associated with some probability P. This P decides the cost of each - for spam the cost is 350 seconds and for legitimate the cost is 10 seconds as described above. that is rejected for inadequate POW is bounced to the sender. For spammers with a P 1 = 99%, the expected cost of each sending will be aroundc = 349 seconds. This is close to Laurie and Clayton s estimation which is proved to be enough to discourage spammers. Also for legitimate users, P 2 = 1%, the expected cost of each sending is aroundc = 52 seconds. Again this meets the requirement that end users who send legitimate are in fact able to do so.
15 These results of cost show that our second model of POW combined with reputation mechanism works well to discourage spammers and will not overload high volume legitimate users. 8. Conclusions Proof of work reverses the cost model of by charging the sender instead of the user. However, a uniform POW mechanism will not work because if it is expensive enough to stop spammers it must be so expensive that it will also stop legitimate users. In fact, the cost to a spammer must be an order of magnitude higher than the cost to a legitimate user because spammers face very different production costs due to spambots. This work examines POW as part of a larger anti-spam effort. Current anti-spam efforts commonly use reputation systems and per- spam identification mechanisms. These efforts suffer from penalizing new IP addresses and discarding incorrectly identified . The types of error are difficult to balance. Either new entrants are not allowed to send , or each new IP address is allowed to send enough that spam remains profitable. POW can be combined with per- spam identification and source reputation to create more effective anti-spam technologies. POW can work, using the economic conditions derived as necessary from previous work. We have proposed the combination of POW combined with reputation mechanisms with two configurations and illustrated that these are workable configurations. In one configuration, spam is identified on a per- basis with a continuous reputation. In the other workable configuration, the stepwise reputation mechanism has to indicate a spam with 99% accuracy and has only 1% rate of false positives. For legitimate users, the cost is acceptable. For spammers, the costs are prohibitive. In summary we have examined POW as an element of anti-spam technologies as combined with source identification or per- evaluation. As such, Proof of Work works.
16 References: [1] CipherTrust Inc., The Next-Generation Reputation System, 2005 [2] C. Dwork, A. Goldberg, and M. Naor, On Memory-Bound Functions for Fighting Spam, 2004 [3] B. Laurie and R. Clayton, Proof of Work Proves Not to Work, 2004 [4] C. Dwork and M. Naor, Pricing via Processing or Combating Junk Mail, 1992 [5] A. Back, Hashcash- A Denial of Service Counter-Measure, 2002 [6] Radicati Group Inc., Market Numbers Quarterly Update, Q4, 2003 [7] Brightmail Inc., Spam Percentages and Spam Categories, 2004 [8] Internet Systems Consortium, Internet Domain Survey, 2004 [9] V. V. Prakash and A O Donnell, Cloudmark, Fighting Spam with Reputation Systems, 2005 [10] A. Oram, ed. Peer-to-Peer Harnessing the Power of Disruptive Technologies, Chapter 16, O'Reilly and Associates, Cambridge, MA, 2001 [11] R. Jurca and B. Faltings, Reputation-based Pricing of P2P Services, 2005
When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper
When Reputation is Not Enough Barracuda Email Security Gateway s Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
Groundbreaking Technology Redefines Spam Prevention. Analysis of a New High-Accuracy Method for Catching Spam
Groundbreaking Technology Redefines Spam Prevention Analysis of a New High-Accuracy Method for Catching Spam October 2007 Introduction Today, numerous companies offer anti-spam solutions. Most techniques
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
The Growing Problem of Outbound Spam
y The Growing Problem of Outbound Spam An Osterman Research Survey Report Published June 2010 SPONSORED BY! #$!#%&'()*(!!!!"#$!#%&'()*( Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058
Why Spamhaus is Your Best Approach to Fighting Spam
Page 1 of 10 Executive Summary The spam problem is evolving and while overall spam volumes are down, the problems are getting worse. No longer just a nuisance wasting resources and time, spam is now a
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
Solutions IT Ltd Virus and Antispam filtering solutions 01324 877183 [email protected]
Contents Reduce Spam & Viruses... 2 Start a free 14 day free trial to separate the wheat from the chaff... 2 Emails with Viruses... 2 Spam Bourne Emails... 3 Legitimate Emails... 3 Filtering Options...
Intercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
Emerging Trends in Fighting Spam
An Osterman Research White Paper sponsored by Published June 2007 SPONSORED BY sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone: +1 253 630 5839 Fax: +1 866
How To Filter Email From A Spam Filter
Spam Filtering A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction Spam filtering is a catch- all term that describes the steps that happen to an email between a sender and a receiver
Anti Spam Best Practices
39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing
ContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering
Voyant Strategies ContentCatcher Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering tm No one can argue that E-mail has become one of the most important tools for the successful
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
Panda Cloud Email Protection
Panda Cloud Email Protection 1. Introduction a) What is spam? Spam is the term used to describe unsolicited messages or messages sent from unknown senders. They are usually sent in large (even massive)
An Overview of Spam Blocking Techniques
An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now
Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats
Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in
Why Content Filters Can t Eradicate spam
WHITEPAPER Why Content Filters Can t Eradicate spam About Mimecast Mimecast () delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate
eprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
PineApp Anti IP Blacklisting
PineApp Anti IP Blacklisting Whitepaper 2011 Overview ISPs outbound SMTP Services Individual SMTP relay, not server based (no specific protection solutions are stated between the sender and the ISP backbone)
Blackbaud Communication Services Overview of Email Delivery and FAQs
Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers
PROTECTING YOUR MAILBOXES. Features SECURITY OF INFORMATION TECHNOLOGIES
PROTECTING YOUR MAILBOXES Features SECURITY OF INFORMATION TECHNOLOGIES In 2013, 50% of businesses would have experienced a virus infection by e-mail. Electronic mail remains one of the preferred vectors
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
Ipswitch IMail Server with Integrated Technology
Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these
Deliverability Counts
Deliverability Counts 10 Factors That Impact Email Deliverability Deliverability Counts 2015 Harland Clarke Digital www.hcdigital.com 1 20% of legitimate commercial email is not being delivered to inboxes.
COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
Comprehensive Email Filtering: Barracuda Spam Firewall Safeguards Legitimate Email
: Barracuda Firewall Safeguards Legitimate Email Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
Anti Spam Best Practices
53 Anti Spam Best Practices Anti Spam LIVE Service: Zero-Hour Protection An IceWarp White Paper October 2008 www.icewarp.com 54 Background As discussed in the IceWarp white paper entitled, Anti Spam Engine:
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS
REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS Rami Khasawneh, Acting Dean, College of Business, Lewis University, [email protected] Shamsuddin Ahmed, College of Business and Economics, United Arab
Enhanced Spam Defence
Enhanced Spam Defence An approach to making SMTP connect time blocking a reliable method for e-mail filtering By John Jensen, Topsec Technology Ltd. As the spam problem keeps growing and the associated
Proof-of-Work Proves Not to Work version 0.1
Proof-of-Work Proves Not to Work version 0.1 Ben Laurie 1 and Richard Clayton 2 1 ALD Ltd, The Stores, 2 Bath Road, London W4 1LT, United Kingdom 2 University of Cambridge, Computer Laboratory, William
The Latest Internet Threats to Affect Your Organisation. Tom Gillis SVP Worldwide Marketing IronPort Systems, Inc.
The Latest Internet Threats to Affect Your Organisation Tom Gillis SVP Worldwide Marketing IronPort Systems, Inc. Agenda Spam Trends Staying Ahead Blended Threats Spam Trends What Do Dick Cheney & Bill
How ISP ihouseweb Inc eradicated spam with SpamTitan
How ISP ihouseweb Inc eradicated spam with SpamTitan we over are now blocking 90% of email as spam. SpamTitan has helped save the organization tens of thousands of dollars per month in unnecessary service
CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products. www.cyberoam.com
CYBEROAM UTM s Outbound Spam Protection Subscription for Service Providers Our Products Unified Threat Management Agenda of Presentation What is Outbound Spam? Consequences of Outbound Spam Why current
Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5
Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed
E-MAIL FILTERING FAQ
V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:
ExchangeDefender. Understanding the tool that can save and secure your business
ExchangeDefender Understanding the tool that can save and secure your business OVERVIEW The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting.
STPIC/Admin/002/2009-2010/ Date: 18.06.09. Sub: Quotation for purchase/renewal of Anti Virus Software Reg.
STPIC/Admin/002/2009-2010/ Date: 18.06.09 Sub: Quotation for purchase/renewal of Anti Virus Software Reg. Software Technology Parks of India (STPI), an autonomous Society under Ministry of Communication
October Is National Cyber Security Awareness Month!
(0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life
About this documentation
Wilkes University, Staff, and Students have a new email spam filter to protect against unwanted email messages. Barracuda SPAM Firewall will filter email for all campus email accounts before it gets to
INBOX. How to make sure more emails reach your subscribers
INBOX How to make sure more emails reach your subscribers White Paper 2011 Contents 1. Email and delivery challenge 2 2. Delivery or deliverability? 3 3. Getting email delivered 3 4. Getting into inboxes
USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security
USER S MANUAL Cloud Email Firewall 4.3.2.4 1 Contents 1. INTRODUCTION TO CLOUD EMAIL FIREWALL... 4 1.1. WHAT IS CLOUD EMAIL FIREWALL?... 4 1.1.1. What makes Cloud Email Firewall different?... 4 1.1.2.
SPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
A White Paper. VerticalResponse, Email Delivery and You A Handy Guide. VerticalResponse,Inc. 501 2nd Street, Suite 700 San Francisco, CA 94107
A White Paper VerticalResponse, Email Delivery and You Delivering email seems pretty straightforward, right? You upload a mailing list, create an email, hit send, and then mighty wizards transport that
Deployment Guides. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Deployment Guides SmarterMail in Individual and Micro-business
Email. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Email Daniel Zappala CS 460 Computer Networking Brigham Young University How Email Works 3/25 Major Components user agents POP, IMAP, or HTTP to exchange mail mail transfer agents (MTAs) mailbox to hold
SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing
EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render
Deploying Layered Email Security. What is Layered Email Security?
Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review
The Network Box Anti-Spam Solution
NETWORK BOX TECHNICAL WHITE PAPER The Network Box Anti-Spam Solution Background More than 2,000 years ago, Sun Tzu wrote if you know yourself but not the enemy, for every victory gained you will also suffer
Symantec Advanced Threat Protection: Network
Symantec Advanced Threat Protection: Network DR150218C April 2015 Miercom www.miercom.com Contents 1.0 Executive Summary... 3 2.0 Overview... 4 2.1 Products Tested... 4 2.2. Malware Samples... 5 3.0 How
1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5
Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. What makes Panda Cloud Email Protection different?... 4 1.1.2. Is it secure?... 4 1.2.
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
The Role of Country-based email Filtering In Spam Reduction
The Role of Country-based email Filtering In Spam Reduction Using Country-of-Origin Technique to Counter Spam email By Updated November 1, 2007 Executive Summary The relocation of spamming mail servers,
Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam
Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2
Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest?
Introduction The purpose of this memo is to explain how the email that originates from outside this organization is processed, and to describe the tools that you can use to manage your personal spam quarantine.
How does the Excalibur Technology SPAM & Virus Protection System work?
How does the Excalibur Technology SPAM & Virus Protection System work? All e-mail messages sent to your e-mail address are analyzed by the Excalibur Technology SPAM & Virus Protection System before being
PreciseMail Overview - The Email Threat
PreciseMail Overview - The Email Threat Spam, viruses, and other malware are a converging email threat that produce more sophisticated attacks which can result in significant damage to an organization
Email Filter User Guide
Table of Contents Subject Page Getting Started 2 Logging into the system 2 Your Home Page 2 Manage your Account 3 Account Settings 3 Change your password 3 Junk Mail Digests 4 Digest Scheduling 4 Using
How To Ensure Your Email Is Delivered
Everything You Need to Know About Delivering Email through Your Web Application SECTION 1 The Most Important Fact about Email: Delivery is Never Guaranteed Email is the backbone of the social web, making
Thexyz Premium Webmail
Webmail Access all the benefits of a desktop program without being tied to the desktop. Log into Thexyz Email from your desktop, laptop, or mobile phone, and get instant access to email, calendars, contacts,
An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL
EmailDirect is an email marketing solution provider (ESP) which serves hundreds of today s top online marketers by providing all the functionality and expertise required to send and track effective email
Attachment spam the latest trend
the latest trend Spammers using common file formats as attachments for pumpand-dump scams This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily
The Radicati Group, Inc. ...
. The Radicati Group, Inc. 1900 Embarcadero Rd., Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com The Radicati Group, Inc. An Analyst Review of Hotmail Anti-Spam
1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered...
1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered...4 2.4. Bounces....4 2.5. Email unsubscribe requests....5
Smart E-Marketer s Guide
30 insider tips to maximise your email deliverability rate 30 insider tips Step 1. Ensure the domain you use for sending emails is configured to enable authentication (SPF / Sender ID/ DomainKeys). Step
Configuring Your Gateman Email Server
Configuring Your Gateman Email Server Your Gateman Lifestyle Server includes an Email Server that provides users access to email via an email client and via your web browser using your laptop and mobile
Recurrent Patterns Detection Technology. White Paper
SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware
Do you need to... Do you need to...
TM Guards your Email. Kills Spam and Viruses. Do you need to... Do you need to... Scan your e-mail traffic for Viruses? Scan your e-mail traffic for Viruses? Reduce time wasted dealing with Spam? Reduce
AntiSpam QuickStart Guide
IceWarp Server AntiSpam QuickStart Guide Version 10 Printed on 28 September, 2009 i Contents IceWarp Server AntiSpam Quick Start 3 Introduction... 3 How it works... 3 AntiSpam Templates... 4 General...
Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered
