Fighting Spam on the Sender Side: A Lightweight Approach
|
|
|
- Lionel Long
- 10 years ago
- Views:
Transcription
1 Fighting Spam on the Sender Side: A Lightweight Approach Wouter Willem de Vries, Giovane Cesar Moreira Moura, and Aiko Pras University of Twente Centre for Telematics and Information Technology Faculty of Electrical Engineering, Mathematics and Computer Science Design and Analysis of Communications Systems (DACS) Enschede, The Netherlands [email protected], {g.c.m.moura,a.pras}@utwente.nl Abstract. Spam comprises approximately 90 to 95 percent of all traffic on the Internet nowadays, and it is a problem far from being solved. The losses caused by spam are estimated to reach up to $87 billion yearly. When fighting spam, most of the proposals focus on the receiver-side and are usually resource-intensive in terms of processing requirements. In this paper we present an approach to address these shortcomings: we propose to i) filter outgoing on the sender side and (ii) use lightweight techniques to check whether a message is spam or not. Moreover, we have evaluated the accuracy of these techniques in detecting spam on the sender side with two different data sets, obtained at a Dutch hosting provider. The results obtained with this approach suggest we can significantly reduce the amount of spam on the Internet by performing simple checks at the sender-side. 1 Introduction Spam comprises approximately 90 to 95 percent of all traffic on the Internet nowadays [1,2]. To deal with all this unsolicited , companies have to spend computer and network resources, and human labour hours, which causes economic losses. It is estimated that worldwide spam causes losses from $10 billion to $87 billion [3] yearly. Among the reasons why there is so much spam on the Internet is the cost of sending it: it costs virtually nothing. It is estimated that the transmission of a spam message is 10,000 times cheaper than receiving it [4]. Moreover, protocols do not impose any security restrictions on how is sent, which turns any machine on the Internet into a potential spam server. To fight this massive number of spam, recipients rely on receiver-side techniques, such as automatic filtering employed by clients or mail server filters (such as SpamAssassin). Despite being to a certain degree efficient, these techniques present a major drawback: they are very resource-intensive [5]. Due to that, very often Internet Service Providers (ISP s) are forced to be more aggressive in rejecting messages upfront if they do not comply to very F.A. Aagesen and S.J. Knapskog (Eds.): EUNICE 2010, LNCS 6164, pp , c IFIP International Federation for Information Processing 2010
2 Fighting Spam on the Sender Side: A Lightweight Approach 189 rigorous requirements [6], to prevent the filtering mail servers from overloading [6]. In turn, this method may lead to false positives, causing legitimate to be rejected. As a consequence, such aggressive techniques may compromise the reliability of communication while still not being able to filter all spam. In face of these problems associated with sending and filtering spam, in this paper we present a new approach to fight spam, that focuses on filtering spam on the sender-side and is not as resource-intensive as traditional solutions. If it is so cheap to send spam messages, and so resource intensive to detect on the receiver side, why not tackle the problem by avoiding spam from being sent instead, at the sender side? If we could significantly restrain the transmission of spam, the amount of incoming s would be much lower. In order to detect spam on the sender-side,weproposetheemploymentoffour non-resource intensive techniques in terms of CPU cycles. These techniques focus on detecting spam based on message s core attributes, such as advertised URLs. In order to evaluate the effectiveness of these techniques, we have conducted a series of tests on a production network of a large Dutch hosting provider. The rest of this paper is organized as follows: in section 2 we introduce the background and current solutions employed by ISPs to fight spam, and the shortcomings associated with each solution. Next, in Section 3 we present our proposal for fighting spam on the sender-side using low resource-intensive techniques. After that, in Section 4 we present an evaluation of the effectiveness of these techniques. To do that, we have used data from real-life networks from a Dutch hosting provider. Finally, in Section 5 we present the conclusions and future work 1. 2 Background and Current Solutions to Fight Spam In this section we present a study on the techniques used by spammers to conduct their campaigns. Moreover, we provide a review of related work and existing solutions employed to fight spam. 2.1 Background Currently, three main approaches are employed by spammers to easily send vast amounts of spam at low cost while maintaining most or all anonymity: direct spamming, open mail relay, and botnets [8,9]. Direct spammers are those that use their own mail servers to send larges amounts of spam. Key characteristic of direct spammers is that they do not try to hide their activities and identity, they send large amounts of spam from a limited amount of IP addresses. Some of those people are publicly listed in the Register of Known Spam Operations (ROKSO) [10], so ISPs can recognize and reject them, should they request connectivity. Occasionally direct spammers even resort to hijacking entire IP prefixes [11]. 1 It should be noted that an initial version of this paper has been presented at the twelfth Twente Student Conference on Information Technology [7]. However, that was an internal event of the University of Twente, of which the proceedings have not officially been published by any publisher.
3 190 W.W. de Vries, G.C.M. Moura, and A. Pras On the other hand, open mail relay is when mail servers are configured in a way that allows any user, authorized or not, to send through it. This allows spammers to send their spam almost anonymously, only the operator of the misconfigured server could find out about the identity of the spammer. For example, Sendmail version 5 was an open relay by default [8]. Many inexperienced administrators make this configuration mistake, so spammers actively scan the internet for open relays. server software is fortunately increasingly configured to be secure by default, so this issue is becoming less severe. Finally, the last and more effective approach to send spam is using botnets. A botnet consists of many compromised hosts (named bots) [12], connected to a central control server maintained by a spammer. Those bots are typically Windows computers infected by a virus and owned by unaware end-users [13,14]. From the control server, the spammer commands the bots to transmit his spam campaigns. This method is rapidly advancing: it provides for a cheap, distributed and completely anonymous way to transmit spam. In the literature, spamming host are classified according to the number of spam they generate. Pathak et al. [15] conducted a research on spammers behavior by setting up an open relay and generating statistics on the spam they collected in a period of three months. They have observed the prevalence of two sets of spamming hosts: high-volume spammers (HVS) and low-volume spammers (LVS). The LVS is a set containing a high number of hosts, each sending a low volume of spam (like bots in a botnet). In contrast, The HVS is a set containing a low number of hosts, each sending a high volume of spam (like direct spammers). 2.2 Solutions Employed by ISPs to Fight Spam ISPs are increasingly interested in preventing spam transmissions from their network, mainly due to technical and legal reasons. For instance, bad managed networks eventually results in a bad network reputation. By this ISPs are risking entire IP ranges being blacklisted, making it impossible for them to transmit the legitimate of their clients. In addition, IP blacklisting as a defensive method is expected to be much less efficient (much higher chance on false positives) in the next few years for ISPs on the receiver s side due to the rise of IPv6 [16]. In regards to legal reasons, several governments implemented legislation that requires the possibility to detect, restrain and penalize spammers. Examples include the American CAN-SPAM act of 2003 [17] and the Australian SPAM ACT 2003 [18]. In practice, the following solutions are used by ISPs to fight spam: Blocking SMTP port for end-users; Rate limiting (e.g., a maximum number of messages per hour); Filtering out using tools like SpamAssassin. The simplest and most radical approach to fight spam is to block the SMTP port for end-users, and allowing connections only to the mail servers of the ISP.
4 Fighting Spam on the Sender Side: A Lightweight Approach 191 Since SMTP does not impose security restrictions when sending messages, any computer on the Internet can be used as a mail server [19]. Blocking SMTP port 25 for connections outside the ISP s network block spams to other mail servers, but do not prevent spam from reaching the ISP s own mail severs. The drawback of this approach is that it severely limits the end-user in using different mail servers for different purposes. Another approach consists in limiting the amount of allowed s per hour that a client can send and the maximum number of recipients. It is a very basic measure and not effective against LVS, since each LVS only sends small amounts of over a long period of time [20]. In addition, legitimate activities (such as a newsletter) would also trigger this kind of measure. The most used approach by ISPs is to filter incoming using mail filters like SpamAssassin. SpamAssassin performs a series of tests on the header and content of the messages to classify whether they are not spam [21]. It employs Bayesian filtering, DNS blacklist checks, among other techniques. The main disadvantage of this approach is that it is resource-intensive in terms of CPU cycles [22]. In addition, it is usually used on the receiver side, so it is not employed to filter out outgoing messages. In summary, the main disadvantages of existing solutions are (i) being obtrusive to the end-user, (ii) being ineffective to modern spam methods, and (iii) being expensive. To fill this gap, in this work we propose a lightweight approach to filter out outgoing . 3 Proposed Solution After identifying the shortcomings of existing solutions, we now present our proposal, that is based on two pillars: (i) on filtering outgoing on the sender side and (ii) using lightweight techniques to check whether a message is spam or not. The main advantage is that we can detect and block spam before it reaches the final destination at a low cost. Figure 1 presents the architecture of our solution. In this figure, an ISP has a certain number of mail servers that are responsible for handling the traffic. When they receive the from their clients, instead of sending the directly to the other mail servers, they forward it to another host in the same network (the smarthost in the figure). This smarthost is responsible for classifying the outgoing message as spam or not, and filter out the spam ones. To perform this message classification, we propose the use of lightweight techniques. The idea is to have very quick checks on each message that still allow good filtering results. To do that, we propose to filter based on the message s core attributes, since its requirements in terms of CPU cycles are low. Core attributes are described as elements of an which can not be easily modified or varied, such as advertised URL s. These elements can be used to develop decisive criteria, while ensuring the criteria are light on server resources [22]. For example, checking if an advertised URL is used in spam campaigns can be performed with a DNS lookup, which requires virtually no server processing power.
5 192 W.W. de Vries, G.C.M. Moura, and A. Pras Fig. 1. Overview of new architecture In this paper we propose the employment of the following techniques to classify a message: Sender Policy Framework check (SPF): An ISP s mail server should only transmit from domains which are actually hosted by the ISP. If an message is supposed to be sent through ISP mail servers but it does not come from a domain hosted by the ISP, it should be automatically discarded. To proceed with this verification, the filter must only check a DNS text file that contains all domains hosted by the ISP. URL blacklist check: The smarthost machine should check the URLs in the messages against several real-time blacklists. These blacklists contains URLs that are used by spammers in their campaigns. Example of these blacklists include: URIBL, SURBL, Day Old Bread, Spamhaus, Outblaze, and AbuseButler. The main advantage of this is that with one DNS lookup the filter can determine if an advertised URL is used for spam or not. Google Safe Browsing (GSB) [23]: In addition to the URL lists provided by the blacklists, the filter should check the URLs against Google Safe Browsing service. This service allows us to check the advertised URLs in real time with Google s own list of malicious hosts. Fullfrom-address check: For each message, the filter should check the from-address field, to verify whether it exists or not. This can be quickly performed by connecting to the mail server listed in the MX record of the domain name and issuing a SMTP s RCPT TO command. To this command, the mail server will reply with a SMTP 250 or 550 code [19], which reveals whether the address exist. However, since this so-called sender callout can be quite abusive [24], we advise to only perform this check if the previous two checks suggest the is ham. This way the check will only be performed on servers owned by the user of this filter. Messages containing non-valid addresses should be discarded.
6 Fighting Spam on the Sender Side: A Lightweight Approach 193 These four techniques employed by our smarthost are cheap in terms of CPU requirements, especially in comparison with the bayesian techniques. The idea is to use them all in combination to obtain a better classification, thus allowing us to have an scalable mail filter. In the next section we present an evaluation of the effectiveness of the presented techniques. 4 Evaluation the Accuracy of the Filtering Techniques To gain insight on the effectiveness of the proposed filter, we performed analysis within the infrastructure of a large Dutch hosting provider. Due to privacy concerns, we were unable to test a proof-of-concept implementation because that would mean to inspect user s outgoing (which requires pre-authorization). To overcome this, we have conducted two different tests on real-life servers that could also give us the effectiveness of the proposed techniques. The tests were conducted on two different data sets: Dataset A SpamAssassin log files: These logs were obtained by analyzing the incoming to the mail servers. We have aggregated one week of log files. Dataset B - Feedback Reports received from America Online: America Online offers a service to ISP s which enables ISP s to gain insight in the spam which is being sent from their network [25]. For each which is reported as spam by an America Online user, America Online sends an Feedback Report to the originating ISP; these reports contain the headers and content of the reported spam . We aggregated these reports for one month, which means we have a set of outgoing spam to analyze. The set contains 324 EFR reports; however, it should be noted that this number of reports constitutes a far larger number of actual spam s. In the next subsections we present the results obtained for each technique. 4.1 On the Accuracy of SPF to Detect Spam The Sender Policy Framework (SPF) check has been performed on the AOL EFR data set. For each received report, we took the domain part of the from-address of the spam , and we checked if this domain contained a SPF record pointing to a mail server of the hosting provider. If the domain had no SPF record or the SPF record allowed any mail server to send , we used the proposed fallback mechanism; we resolved the A record of and checked if this IP address was hosted in the network of the hosting provider. Table 1 present the results for the accuracy of the Sender Policy Framework approach. As one can see, for the reporting period we received 324 EFR reports for AOL. Out of these, 125 could have been avoided if SPF was employed by the servers.thisallowedustohave an accuracy of 38.6%. However, we
7 194 W.W. de Vries, G.C.M. Moura, and A. Pras Table 1. Results extracted from Feedback Reports received in December 2009 AOL EFR Reports SPF hit from-address hit GSB hit (38.6%) 324 (100%) 165 (50.9%) should stress that it does not mean that the approach is not good. In this case it means that 38.6% of spam was sent from non-authorized domains. To achieve even better results, this technique should be combined with all four presented techniques in this paper. 4.2 On the Accuracy of Blacklists to Detect Spam To evaluate the accuracy of the URL blacklist check, we have used the Dataset A (SpamAssassin log files for incoming ). With this log, we could obtain the accuracy of employing blacklist for detecting spam simply by comparing the total number of incoming spam (obtained used several techniques by SpamAssassin) and the number of s that were in fact classified as spam only because of the real-time blacklist. Even though we have conduced this test on incoming , we can expect similar results for outgoing , since this method is independent from source/destination. The results obtained for the accuracy of blacklists for spam classification can be observed in Table 2. For example, on January 5th SpamAssassin has classified s messages as spam. Out of this total, were correctly classified as spam using only one technique: the real-time blacklists. This gives an accuracy of 73.6% when detecting spam using only this technique. Analyzing the results over the 8 consecutive days we have collected the data, we could observe that messages were classified as spam only by employing real-time blacklists. With these results, the overall accuracy was 74.4%. Even though it is not as high as we expected, this number can be improved when combining the next techniques together. Table 2. Results extracted from SpamAssassin logs of 8 days in January 2010 Day Spam s URLBL hits Accuracy 2010/1/2 5,149 3, % 2010/1/3 5,493 4, % 2010/1/4 5,132 3, % 2010/1/5 6,601 4, % 2010/1/6 6,600 4, % 2010/1/7 7,125 5, % 2010/1/8 7,016 5, % 2010/1/9 5,331 3, % Total 48,447 36, %
8 Fighting Spam on the Sender Side: A Lightweight Approach On the Accuracy of Checking Full from-address to Detect Spam The full from-address check was performed on the dataset B, the AOL EFR. For each received report, we connected to the mail server listed in the MX record of the from-address domain name and issued a SMTP s RCPT TO command. To this command, the mail server either replied with a SMTP 250 or 550 code, which reveals whether the address existed or not. A hit of this check constitutes anon-existingfrom-address. Table 1 present the results for the accuracy of from-address approach. As one can observe, all the messages (324) reported by AOL contained fake addresses. This result was better than expected. We could guess that these addresses could have been randomly generated by bots while conducting their spam campaigns. These results suggest that maybe this technique might be enough to process EFR reports from AOL, for example. 4.4 On the Accuracy of the GSB Blacklist to Detect Spam In order to access the accuracy of the GSB to detecting spam we employed the dataset B. For each received report, we checked each advertised URL against GSB. Due to the manual processing of the reports, and the time between the actual spamming activities and arrival of EFRs, there was a delay of approximately hours between the transmission of the spam and our manual processing of the EFRs. Even though, we observed that the accuracy of using GSB we could classify 50.9% of the messages as spam, as can be observed in Table On the Overall Accuracy of Combined Techniques In order to obtain better spam classification results, all the four mentioned techniques should be somehow combined. In this research we could not perform this, since our datasets were generated based on different sources (dataset A was obtained by analyzing outgoing while dataset B was obtained by analyzing incoming messages). However, while deploying our techniques, all the four techniques should be employed to analyze the outgoing traffic so they can be used in combination. However, the most suitable way to combine them should be tested experimentally, which is left as future work. Despite this, we expected much better results when combining these techniques. 5 Conclusions and Future Work In this paper we have proposed a new solution enabling ISP s and hosting providers to significantly restrain spam transmissions from their network at low cost. Our proposal is based on (i) filtering outgoing on the sender side and (ii) using four lightweight techniques to check whether a message is spam or not. The main advantage is that we can detect and block spam before it reaches
9 196 W.W. de Vries, G.C.M. Moura, and A. Pras the final destination at a low cost. Moreover, this solution can be easily deployed at ISPs and hosting providers, requiring only a few modifications. By analysis within the infrastructure of a large Dutch hosting provider, we evaluated the accuracy of the four different techniques we presented for filtering spam based on core attributes. The two best performing individual checks achieved an effectiveness of 74.4% and 100% respectively. Despite the fact that these results were obtained on relatively small data sets, they are very encouraging: for example, just by checking blacklist, we can potentially reduce more than 70% of spam generated on the sender-side. If ISPs and hosting providers start to use such approach (for several reasons, including law enforcement, good reputation, etc.), we could virtually block at the source most of spam generated nowadays. By doing that, we could reduce the spend on people, hardware and network resources to deal with spam, since most of the messages would not be forwarded to other networks. As future work, we intend to implement and deploy a prototype to investigate real-time performance and effectiveness of the presented approach. Moreover, we intend to conduct this analysis on a much larger data set, and determine the most suitable way to combine the four detection techniques to detect spam. Next, we compare the detection rate of a setup combining the four detection techniques with the performance of a more traditional approach such as using SpamAssassin solely. We intend to achieve this by letting both setups evaluate the same set of labeled data containing spam and ham messages. Finally, we will monitor and analyze the used system resources. References 1. Sophos. Only one in 28 s legitimate (June 2008), dirtydozjul08.html 2. Spamhaus. Effective spam filtering (January 2010), 3. Soma, J., Singer, P., Hurd, J.: SPAM Still Pays: The Failure of the CAN-SPAM Act of 2003 and Proposed Legal Solutions. Harv. J. on Legis. 45, (2008) 4. Lieb, R.: Make spammers pay before you do (July 2002), 5. McGregor, C.: Controlling spam with SpamAssassin. Linux J. 153, 9 (2007) 6. Mori, T., Esquivel, H., Akella, A., Mao, Z.M., Xie, Y., Yu, F.: On the effectiveness of pre-acceptance spam filtering. University of Wisconsin Madison, Tech. Report TR1650 (2009) 7. de Vries, W.W.: Restraining transmission of unsolicited bulk . In: Proceedings of the twelth Twente Student Conference on Information Technology (2010) 8. Stern, H.: A survey of modern spam tools. In: Proc. of the fifth conf. on and anti-spam (2008) 9. Sperotto, A., Vliek, G., Sadre, R., Pras, A.: Detecting Spam at the Network Level. In: Oliver, M., Sallent, S. (eds.) EUNICE LNCS, vol. 5733, pp Springer, Heidelberg (2009) 10. Spamhaus. The register of known spam operations (January 2010),
10 Fighting Spam on the Sender Side: A Lightweight Approach Ballani, H., Francis, P., Zhang, X.: A study of prefix hijacking and interception in the Internet. ACM SIGCOMM Computer Communication Review 37(4), 276 (2007) 12. Fabian, M.A.R.J.Z., Terzis, M.A.: My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging. In: Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding Botnets, Cambridge, USA (2007) 13. Chiang, K., Lloyd, L.: A case study of the rustock rootkit and spam bot. In: The First Workshop in Understanding Botnets (2007) 14. Mendyk-Krajewska, T., Mazur, Z.: Software Flaws as the Problem of Network Security. In: Internet-Technical Development and Applications, p. 233 (2009) 15. Pathak, A., Hu, Y.C., Mao, Z.M.: Peeking into spammer behavior from a unique vantage point. In: LEET 2008: Proceedings of the 1st Usenix Workshop on Large- Scale Exploits and Emergent Threats, pp USENIX Association, Berkeley (2008) 16. RIPE Labs. Spam over ipv6 (March 2010), United States of America. Can-spam act of 2003 (2003), Australasian Legal Information Institute. Australian spam act 2003 (2003), Klensin, J.: Simple mail transfer protocol (April 2001), Pathak, A., Qian, F., Hu, Y.C., Mao, Z.M., Ranjan, S.: Botnet spam campaigns can be long lasting: evidence, implications, and analysis. In: Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems, pp ACM, New York (2009) 21. OBrien, C., Vogel, C.: Comparing SpamAssassin with CBDF filtering. In: Proceedings of the 7th Annual CLUK Research Colloquium (2004) 22. Pras, A., Wanrooij, W.: Filtering Spam from Bad Neighborhoods (under review). International Journal of Network Management (2009) 23. Google. Google safe browsing (January 2010), UCEProtect. Sender callouts - why it is abusive (January 2010), AOL. feedback reports for isp s (January 2010),
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development
Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Author André Tschentscher Address Fachhochschule Erfurt - University of Applied Sciences Applied Computer Science
An Overview of Spam Blocking Techniques
An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now
Intercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
Detecting Spam at the Network Level
Detecting Spam at the Network Level Anna Sperotto, Gert Vliek, Ramin Sadre, and Aiko Pras University of Twente Centre for Telematics and Information Technology Faculty of Electrical Engineering, Mathematics
Collateral Damage. Consequences of Spam and Virus Filtering for the E-Mail System. Peter Eisentraut 22C3. credativ GmbH.
Consequences of Spam and Virus Filtering for the E-Mail System 22C3 Introduction 12 years of spam... 24 years of SMTP... Things have changed: SMTP is no longer enough. Spam filters, virus filters are part
SPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
Guardian Digital Secure Mail Suite Quick Start Guide
Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................
COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
Detecting spam machines, a Netflow-data based approach
Detecting spam machines, a Netflow-data based approach Gert Vliek February 24, 2009 Chair for Design and Analysis of Communication Systems (DACS) Faculty of Electrical Engineering, Mathematics and Computer
Do you need to... Do you need to...
TM Guards your Email. Kills Spam and Viruses. Do you need to... Do you need to... Scan your e-mail traffic for Viruses? Scan your e-mail traffic for Viruses? Reduce time wasted dealing with Spam? Reduce
Emails and anti-spam Page 1
Emails and anti-spam Page 1 As the spammers become increasing aggressive more and more legit emails get banned as spam. When you send emails from your webcrm system, we use the webcrm servers to send emails
The Network Box Anti-Spam Solution
NETWORK BOX TECHNICAL WHITE PAPER The Network Box Anti-Spam Solution Background More than 2,000 years ago, Sun Tzu wrote if you know yourself but not the enemy, for every victory gained you will also suffer
Email. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Email Daniel Zappala CS 460 Computer Networking Brigham Young University How Email Works 3/25 Major Components user agents POP, IMAP, or HTTP to exchange mail mail transfer agents (MTAs) mailbox to hold
FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives
FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,
Anti Spam Best Practices
39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing
Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats
Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in
Blackbaud Communication Services Overview of Email Delivery and FAQs
Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers
Comprehensive Email Filtering. Whitepaper
Comprehensive Email Filtering Whitepaper Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email loses
PineApp Anti IP Blacklisting
PineApp Anti IP Blacklisting Whitepaper 2011 Overview ISPs outbound SMTP Services Individual SMTP relay, not server based (no specific protection solutions are stated between the sender and the ISP backbone)
MDaemon configuration recommendations for dealing with spam related issues
Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
Symantec Hosted Mail Security Getting Started Guide
Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration
2014-10-07. Email security
Email security Simple Mail Transfer Protocol First defined in RFC821 (1982), later updated in RFC 2821 (2001) and most recently in RFC5321 (Oct 2008) Communication involves two hosts SMTP Client SMTP Server
How To Protect Your Email From Spam On A Barracuda Spam And Virus Firewall
Comprehensive Email Filtering: Barracuda Spam & Virus Firewall Safeguards Legitimate Email Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks
How To Block Ndr Spam
How to block NDR spam Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR
How To Filter Email From A Spam Filter
Spam Filtering A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction Spam filtering is a catch- all term that describes the steps that happen to an email between a sender and a receiver
Configuring Security for SMTP Traffic
4 Configuring Security for SMTP Traffic Securing SMTP traffic Creating a security profile for SMTP traffic Configuring a local traffic SMTP profile Assigning an SMTP security profile to a local traffic
Deploying Layered Email Security. What is Layered Email Security?
Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review
Email Reputation Metrics Troubleshooter. Share it!
Email Reputation Metrics Troubleshooter page: 1 Email Reputation Metrics Troubleshooter Written By Dale Langley Dale has been working with clients to improve their email deliverability and response rates,
Email Migration Project Plan for Cisco Cloud Email Security
Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f
Technical Note. FORTIMAIL Configuration For Enterprise Deployment. Rev 2.1
Technical Note FORTIMAIL Configuration For Enterprise Deployment Rev 2.1 April 7, 2009 Table of Contents 1 Introduction... 3 1.1 Objective... 3 1.2 Network deployment... 3 1.3 Convention... 3 2 System
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011
Hosted CanIt Roaring Penguin Software Inc. 26 April 2011 1 1 Introduction Thank you for selecting Hosted CanIt. This document explains how Hosted CanIt works and how you should configure your network to
Security. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Security Antivirus Administration SmarterMail is equipped with
Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education
White Paper Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education Online criminals are constantly looking for new ways to reach their targets
Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam
Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2
AntiSpam QuickStart Guide
IceWarp Server AntiSpam QuickStart Guide Version 10 Printed on 28 September, 2009 i Contents IceWarp Server AntiSpam Quick Start 3 Introduction... 3 How it works... 3 AntiSpam Templates... 4 General...
Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2
Technical Note ISP Protection against BlackListing FORTIMAIL Deployment for Outbound Spam Filtering Rev 2.2 April 14, 2009 Table of Contents 1 Objective IP address protection... 3 1.1 Context... 3 1.2
Solutions IT Ltd Virus and Antispam filtering solutions 01324 877183 [email protected]
Contents Reduce Spam & Viruses... 2 Start a free 14 day free trial to separate the wheat from the chaff... 2 Emails with Viruses... 2 Spam Bourne Emails... 3 Legitimate Emails... 3 Filtering Options...
Greylisting has been around since 2003 when Evan Harris wrote the original whitepaper on it as a spam filtering mechanism.
Greylisting... revisited By Steve Freegard Our BarricadeMX products have supported greylisting since they were first released. From the beginning, our greylisting used custom modifications to make it more
FireEye Email Threat Prevention Cloud Evaluation
Evaluation Prepared for FireEye June 9, 2015 Tested by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com Table of Contents Executive Summary... 1 Introduction... 1 About
A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior
A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior Danilo Michalczuk Taveira and Otto Carlos Muniz Bandeira Duarte UFRJ - PEE/COPPE/GTA - DEL/POLI P.O. Box 6854-2945-97, Rio de Janeiro, RJ,
GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall
GFI Product Comparison GFI MailEssentials vs Barracuda Spam Firewall GFI MailEssentials Barracuda Spam Firewall Integrates closely with Microsoft Exchange Server 2003/2007/2010 Integrates closely with
Internet Security [1] VU 184.216. Engin Kirda [email protected]
Internet Security [1] VU 184.216 Engin Kirda [email protected] Christopher Kruegel [email protected] Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will
Enhanced Spam Defence
Enhanced Spam Defence An approach to making SMTP connect time blocking a reliable method for e-mail filtering By John Jensen, Topsec Technology Ltd. As the spam problem keeps growing and the associated
The Difficulties of Tracing Spam Email
The Difficulties of Tracing Spam Email Dan Boneh [email protected] Department of Computer Science Stanford University September 9, 2004 1 Introduction At the FTC staff s request, I prepared this report
What is a Mail Gateway?... 1 Mail Gateway Setup... 2. Peering... 3 Domain Forwarding... 4 External Address Verification... 4
Contents CHAPTER 1 IMail Secure Server as a Mail Gateway What is a Mail Gateway?... 1 Mail Gateway Setup... 2 CHAPTER 2 Possible Mail Gateway Configurations Peering... 3 Domain Forwarding... 4 External
Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.
Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform
Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the e-mail beast. Microsoft's online safety strategy
Overview An Evolution Improving Trust, Confidence & Safety working together to fight the e-mail beast Holistic strategy Prescriptive guidance and user education, collaboration & technology Evolution of
FortiMail Email Filtering Course 221-v2.2 Course Overview
FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
Tightening the Net: A Review of Current and Next Generation Spam Filtering Tools
Tightening the Net: A Review of Current and Next Generation Spam Filtering Tools Spam Track Wednesday 1 March, 2006 APRICOT Perth, Australia James Carpinter & Ray Hunt Dept. of Computer Science and Software
Email Services Deployment. Administrator Guide
Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the
Exim4U. Email Server Solution For Unix And Linux Systems
Email Server Solution For Unix And Linux Systems General Overview, Feature Comparison and Screen Shots Exim4U Email Server Solution For Unix And Linux Systems Version 2.x.x October 12, 2012 Copyright 2009
Prevention of Spam over IP Telephony (SPIT)
General Papers Prevention of Spam over IP Telephony (SPIT) Juergen QUITTEK, Saverio NICCOLINI, Sandra TARTARELLI, Roman SCHLEGEL Abstract Spam over IP Telephony (SPIT) is expected to become a serious problem
Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server.
Stop Spam Now! By John Buckman John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server. Copyright 1999 Lyris Technologies, Inc. Stop Spam Now! 1 Introduction
Email Marketing Glossary of Terms
Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to
Handling Unsolicited Commercial Email (UCE) or spam using Microsoft Outlook at Staffordshire University
Reference : USER 190 Issue date : January 2004 Revised : November 2007 Classification : Staff Originator : Richard Rogers Handling Unsolicited Commercial Email (UCE) or spam using Microsoft Outlook at
Advanced Settings. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Advanced Settings Abuse Detection SmarterMail has several methods
A D M I N I S T R A T O R V 1. 0
A D M I N I S T R A T O R F A Q V 1. 0 2011 Fastnet SA, St-Sulpice, Switzerland. All rights reserved. Reproduction in whole or in part in any form of this manual without written permission of Fastnet SA
eprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
Avira Managed Email Security AMES FAQ. www.avira.com
Avira Managed Email Security AMES FAQ www.avira.com Can AMES be used immediately after an account for our organization has been set up in the MyAccount user portal? Using your account requires a change
SPAMfighter SMTP Anti Spam Server
SPAMfighter SMTP Anti Spam Server Users Manual Copyright SPAMfighter ApS 2005 Revised 4/27/2006 1 Table of Contents 2 Terminology...3 3 Technology...4 3.1 Tunneling and Interception...4 3.2 Content Classification...5
How To Ensure Your Email Is Delivered
Everything You Need to Know About Delivering Email through Your Web Application SECTION 1 The Most Important Fact about Email: Delivery is Never Guaranteed Email is the backbone of the social web, making
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
Why Content Filters Can t Eradicate spam
WHITEPAPER Why Content Filters Can t Eradicate spam About Mimecast Mimecast () delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate
Ipswitch IMail Server with Integrated Technology
Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these
Articles Fighting SPAM in Lotus Domino
Page 1 of 5 Articles Fighting SPAM in Lotus Domino For many e-mail administrators these days, the number one complaint from the users and managers is unsolicited emails flooding the system, commonly called
Network Service, Systems and Data Communications Monitoring Policy
Network Service, Systems and Data Communications Monitoring Policy Purpose This Policy defines the environment and circumstances under which Network Service, Systems and Data Communications Monitoring
Spam, Spam and More Spam. Spammers: Cost to send
Spam, Spam and More Spam cs5480/cs6480 Matthew J. Probst *with some slides/graphics adapted from J.F Kurose and K.W. Ross Spammers: Cost to send Assuming a $10/mo dialup account: 13.4 million messages
Introduction... 2. Configuration & Spam Detection... 2. WinWare Webmail... 3. Email Accounts... 3. Email Account Notes... 4. Definitions...
Page 1 Table of Contents Introduction... 2 Configuration & Spam Detection... 2 WinWare Webmail... 3 Email Accounts... 3 Email Account Notes... 4 Definitions... 5 Sender Policy Framework (SPF)... 5 Email
English Translation of SecurityGateway for Exchange/SMTP Servers
Testing: Alt N Technologies SecurityGateway by Sandra Lucifora Administrators spend a considerable amount of their time on the job on eliminating unwanted messages. Viruses, Phishing, and Spoofing pose
An Efficient Methodology for Detecting Spam Using Spot System
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
Web. Anti- Spam. Disk. Mail DNS. Server. Backup
Email Server Appliance N ew generation of Server Appliance, AirLive, is designed for the SMB or enterprise that needs to install an easy maintained and fully functional mail server. It not only preserves
Stop Spam. Save Time.
Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution
SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel
SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel Table of Contents Domains... 1 Add Domain... 2 MX verification Tool... 4 Overview... 5 Incoming... 6 Incoming Bandwidth Overview...
ContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering
Voyant Strategies ContentCatcher Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering tm No one can argue that E-mail has become one of the most important tools for the successful
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109
K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS v.109 1 The Exchange environment is an important entry point by which a threat or security risk can enter into a network. K7 Mail Security is a complete
SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing
EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render
