One of the most efficient, least costly and, remarkably, most effective anti-spam
|
|
|
- Edwina Fletcher
- 10 years ago
- Views:
Transcription
1 Joel Snyder Opus One February 2009 Best Practices in Using One of the most efficient, least costly and, remarkably, most effective anti-spam techniques is IP reputation filtering. An incredibly inexpensive technique for the anti-spam gateway, IP reputation filtering can be used to identify 80% (or more) of spam without even looking at message content. IP reputation services have become a best practice for any anti-spam gateway. This white paper discusses the origins of IP reputation services; test results on Cisco IronPort s own reputation service, SenderBase; best practices in using reputation services; and the ROI of reputation services. IP reputation services come from the observation that you can often identify a message as spam simply by the IP address it comes from. Starting in 1997, reputation services (originally called blacklists ) have become a staple of anti-spam vendors, with nearly 200 open source and commercial reputation services available. Opus One s testing of Cisco IronPort s SenderBase reputation service has shown that, when used as recommended, an average of 88% of spam can be identified and blocked without regard to content. Opus One s testing of reputation services has shown that, when used as recommended, enterprise-class reputation services can identify and block an average of 88% of spam without regard to message content. The results of our testing also show that IP reputation services have a much lower false positive rate than content filters. TABLE OF CONTENTS Executive Summary...1 Introduction...2 What Are IP Reputation Services and Where Did They Come From?... 2 IP Reputation Service Performance... 4 Best Practices in Using IP Reputation Services... 7 SMTP-time use of IP Reputation Services... 7 Content-filter Use of Reputation Data... 8 Recommendations for SenderBase Deployment... 9 ROI for IP Reputation Services Conclusions...12 Vendor Case Study...13 The most efficient use of IP reputation services is during message receipt, sometimes called SMTP-time. When used properly, IP reputation services can dramatically reduce the amount of spam entering an enterprise, increase spam catch rates, and save considerable money and resources. Using enterprise-class reputation services a typical enterprise could see a 73% reduction in total flow, saving not only capital expenses, but operational expenses (power, rack space, cooling), administrative expenses (fewer gateways require less time to manage), and overhead such as reporting and database server costs. Opus One PAGE 1
2 Introduction The most effective anti-spam products are based on an optimized cocktail approach to spam detection. An anti-spam product using a cocktail mixes multiple tests and techniques together, both to increase the spam catch rate and to decrease the false positive rate. The idea behind using multiple approaches was best described by a researcher who paraphrased P.T. Barnum: you can fool some of the tests all of the time, and you can fool all of the tests some of the time, but you can t fool all of the tests all of the time. In other words, mixing techniques together reduces the possibility that a clever spam sender will be able to bypass protections. Opus One s side-by-side testing of anti-spam products has demonstrated the power of the cocktail approach. We have found that products using multiple complementary and even overlapping techniques fare better when confronted with the constantly shifting landscape of spam. The cocktail approach has another advantage, which is that it can reduce the load on anti-spam gateways. Not every anti-spam test takes the same amount of CPU time or memory. If early tests with lower cost can determine that a message is spam or is not spam, then the message can be released or rejected that much more quickly. This increases throughput through the gateway, reduces latency, and, ultimately, reduces costs. This white paper discusses the origins of IP reputation services; test results on both commercial and community-supported reputation services; best practices in using reputation services; and the ROI of reputation services. What Are IP Reputation Services and Where Did They Come From? IP reputation services come from the observation that you can often identify a message as spam simply from its IP address. The first IP reputation service, in the form of an IP-based block list, was started in January 1997 by Paul Vixie, already known at that time as the primary maintainer of BIND, the de-facto standard for DNS server software. Vixie envisioned a way of sharing information that he was gathering about IP addresses that were used by known spammers. At that time, anti-spam products had not advanced enough to use this information directly, and Vixie s initial strategy was to distribute the list using the BGP routing protocol. This was an efficient approach that was compatible with the routing infrastructure at ISPs, who could use the list to simply block all traffic ( and otherwise) from the known sources of spam. The first users of the Realtime Blackhole List came after a NANOG meeting in San Francisco in February, 1997, where Vixie widely publicized his thoughts in a talk Controlling Network Abuse Using BGP-4. Amusingly enough, the first retaliation for his anti-spam work came soon after, on February 17th, 1997, when a spammer forged mail Opus One PAGE 2
3 in the name of Vixie to members of the US Senate and House of Representatives in an attempt to discredit him. In September, 1998, the BGP-based RBL had spawned an organization, MAPS (the Mail Abuse Protection Service). At MAPS, Eric Ziegast and Dave Rand worked with Vixie to make the RBL available using DNS, and usable in Sendmail, the dominant SMTP MTA at that time. While DNS wasn t as efficient a mechanism for distributing the information as BGP, the simplicity of implementation and ability to target just traffic made the DNS-based RBL very popular. An estimated 3,000 mail servers were participating in the DNS-based RBL by February, 1998; only 122 networks were using the BGP feed at that time. MAPS was spun out of Vixie s consulting company as a non-profit and led by Dave Rand, originally of the ISP Abovenet and the first subscriber to the RBL. In 2004, MAPS was turned into Kelkea, which was eventually purchased by Trend Micro in June, A major innovation in reputation services came in early 2003, when IronPort introduced its SenderBase reputation service that allowed for the possibility of both positive and negative information about any individual IP address. This type of reputation service gives managers a better tool to help manage the flow of spam. Rather than only being able to say this IP address sends mostly spam, now it was possible to also say this IP address has a long history of not sending spam. SenderBase s combination positive/ negative reputation system was copied by other anti-spam vendors within 18 months, including Ciphertrust (now McAfee) Trusted Source and Brightmail (now Symantec). Vixie creates first BGP-based Reputation Service Spamhaus, Spamcop open source RBLs founded Brightmail Reputation Service Introduced Tumbleweed Recurrent Pattern Detection announced MAPS commercializes Vixie s reputation service IronPort introduces SenderBase Ciphertrust introduces TrustedSource Barracuda RBL made available Since their 1997 start, IP reputation services have established themselves as major weapons in the war on spam. Originally, the idea of reputation services was to identify the IP address space used by spammers themselves. To avoid being identified, spammers began to use open relays, servers that would accept messages from anyone and take responsibility for final delivery. This evasion technique reduced the effectiveness of IP reputation services, because now some IP addresses were sending both legitimate and spam . A back-and-forth war has emerged between spammers and the operators of reputation services. In some cases, this has resulted in wholesale change in Internet behavior. For example, no legitimate mail server operator intentionally operates as an open relay anymore. Opus One PAGE 3
4 This set of border skirmishes between spammers and mail managers has also spawned many different reputation services, each with different goals and policies. For example, Spamhaus maintains the Policy Block List (PBL), populated based on input from ISPs who identify IP addresses that should not be operating mail servers, typically broadband residential IP addresses. IP addresses are on the PBL not because they ve sent spam in the past, but because their ISP has said that they shouldn t be directly sending mail to the internet at all. SenderBase reputation service offered by IronPort Systems, a Cisco business unit, offers another innovation: a ranking system, with a score ranging from -10 to +10 assigned to every IP address in the database. Having a score, rather than a yes/no answer, gives the manager much greater flexibility in using the IP reputation service to control mail flows and traffic. The benefit of having continuous scores, as compared to separate discrete lists of certain and likely spammers, is that the decision about how much to trust the reputation service is in the hands of the manager, rather than being left to the operator of the reputation service. This provides more control to the manager and thus more confidence in the overall security of the system. In SenderBase, highly positive scores represent systems that are extremely unlikely to be sending spam, while highly negative scores are assigned to systems that are almost certainly sending spam. For example, an manager might choose to block all mail from systems with scores from -10 to -4.0, throttle mail from systems with scores from -3.9 to -1, and even bypass spam scanning for systems scores above Because SenderBase has continuous scores from -10 to +10, the manager can adjust their blocking, throttling, and bypass thresholds to match the characteristics of their organization s message flows, their own tolerance for false positives, and their desire to increase performance. IP Reputation Service Performance Users of IP reputation services must ask two key questions about any reputation service. First, how well does it block spam? Second, what is the false positive rate? We ask the first question to understand whether or not there s any benefit to using a reputation service. If the service doesn t block much spam, then there s no point in using it. We ask the second question to understand the negative impact of a reputation service. If it has a high false positive rate, then the resulting help desk calls and service interruption may outweigh the benefits. Measuring the spam block rate of a reputation service can be fairly difficult. Many anti-spam products report their spam block rate by counting refused connections and assuming some multiplier based on internal research and testing for the number of messages that would have been sent over that connection. These help the manager to understand how well reputation-based blocking is working from day to day, but only approximate actual performance. Opus One PAGE 4
5 To provide greater insight into the true behavior of reputation services, Opus One has designed a testing methodology to fully measure the ability of each reputation service to block incoming spam. By manually evaluating each message received in a real corporate stream, and comparing that message to its reputation service result, a more reliable and comprehensive picture can be constructed. (A fuller description of Opus One s testing methodology is available at whitepapers/spamtestmethodology.pdf) The graph below highlights SenderBase performance from November 2007 to November Each of these snapshots was created by looking at 10,000 incoming messages over a period of 7 to 14 days each month, selected from a real corporate mail stream. No artificial mailing list, spam trap or synthetic traffic was part of this stream. Percent of Spam Blocked at Selecte Because SenderBase has a continuous score for each IP from to +10.0, we selected four separate cutoff numbers to show how SenderBase would block incoming spam, completely independently of any other content based filtering. In other words, if you operated a spam filter which did nothing but look at the IP reputation service, here is how well it would block spam. All enterprise spam filters combine multiple tests the cocktail mentioned in the introduction to this white paper but this graph highlights the performance of just one part of the cocktail, the IP reputation service. An manager with minimum tolerance for false positives might select a range of to -4.0 for spam blocking, as shown in the blue area on the graph. An manager with more aggressive goals in blocking spam could select a range of to -1.0, as shown in the green area. IronPort s out-of-the-box settings recommend blocking senders with a reputation score in the range to -3.0, the green area. Percent of Spam Blocked at Selected Level Aggressive Blocking (-10.0 to -1.0) Recommended Blocking (-10.0 to -3.0) Score Range Average Block to Block rate (12 mo.) -10 to % -10 to % -10 to % -10 to % Conservative Blocking (-10.0 to -4.0) November 2007 November 2008 Opus One PAGE 5
6 The results show that IP reputation services can identify an enormous percentage of incoming spam without even looking at the message content. This has important implications for performance, because the IP address of the sender is known before the message is accepted, which means that spam can be blocked before it is even received. Using a recommended threshold of to -3.0 for blocking spam, an average of 88% of spam can be identified, and blocked, without regard to content. This brings us to the second key question: what is the false positive rate? When an IP reputation service is used properly, false positives have a minimum impact (compared to typical content filter false positives). Regardless, a high false positive rate is obviously undesirable. The results of our testing show that IP reputation services have a much lower false positive rate than content filters. As a typical example, in May, 2008, Opus One tested 46 different anti-spam engine scenarios. In that test, the average content-filter false positive rate was 0.21% (median 0.17%, standard deviation 0.2%). Over the past 12 months, the average false positive rate for SenderBase when blocking in a range of to -3.0 was 0.018%--about 1/10th the rate of content filters. Even with a very aggressive blocking range of to -1.0, the false positive rate for SenderBase is 0.12%, still less than the rate for content filters. 1 The graph below, scaled to show 1% as a maximum, shows the false positive rate for SenderBase at various blocking levels. The graph has to be scaled up to this level in order to discern differences in the blocking strategies. False Positive Rate % False Positive Rate % % % Agressive Blocking (-10.0 to -1.0) Recommended Blocking (-10.0 to -3.0) Conservative Blocking (-10.0 to -4.0) % June 2007 November 2008 Score Range Avg. False Pos. to Block rate (12 mo.) -10 to % -10 to % -10 to % -10 to % 1 - In Opus One s testing, we use the Positive Predictive Value (PPV), a measure of the accuracy of a test, to compute the false positive rate for content filters. We have used the same statistic for reputation filters for consistency with earlier reports. Another common measure used by researchers is specificity. In either case, the comparison between content filter and reputation service accuracy is similar. Opus One PAGE 6
7 Best Practices in Using IP Reputation Services IP reputation services can be used in many ways as part of the cocktail, but most anti-spam products have settled on one of two main techniques: either IP reputation services are used at message receipt time (at the SMTP connection time), or the reputation data is simply one more input into a single spam/not-spam decision made by the content filter s cocktail of tests. SMTP-time use of IP Reputation Services ATTRIBUTES OF A PREMIUM REPUTATION SERVICE Includes multiple diverse sources of data as part of scoring process to reduce errors and false positives Provides reputation scores beyond simply bad / notbad to give manager flexibility in deployment and determining risk tolerance Links to web service making it easy to see why an IP address scores the way it does Operates using globally distributed service for maximum uptime Builds on open policies and procedures to provide maximum transparency and give managers maximum confidence The most efficient use of IP reputation services is during message receipt, sometimes called SMTP-time. When reputation services are used this way, the reputation of a sending system is checked when the sender attempts to connect to the anti-spam gateway. Based on the reputation, the receiving anti-spam gateway could decide not to accept the TCP/IP connection at all, or it could accept the connection, but refuse to accept the message. Some products don t offer a choice of these two strategies, but for those that do the choice should be made based on logging requirements and feedback strategies. If the anti-spam gateway doesn t accept the connection at all, then very little debugging information is available to the manager only the IP address of the system trying to connect. If the connection is accepted, but the message refused, then the manager can at least see the RFC2821 envelope information: who the message is (purportedly) from, and who it was sent to. While, at first glance, it may seem like the best approach is to simply refuse the connection, since that uses the least resources, a more effective technique is to accept the connection, but refuse the message. (This is often referred to as a 5xx SMTP response, the error code that actively refuses a message.) The main reason is that this technique provides strong feedback to the sender of the message that their message will not be accepted. If the TCP/IP connection is not accepted, the sender has no idea why, or whether this is a permanent or transient error. Thus, the sender has no choice but to keep retrying the connection in the hopes that their message will get through. If the TCP/IP connection is accepted, but the message is explicitly refused, then the sender knows immediately what happened. The reason we recommend refusing the message, rather than the connection, is to eliminate undetected false positives. In the case of a false positive, the actual sender of a message will get an immediate perhaps within seconds notification that their message was not accepted. This gives legitimate senders an opportunity to communicate using some other channel, such as via telephone or a different service. By refusing the message, the impact of false positives on business-critical communications is minimized. Opus One PAGE 7
8 Compare this to choosing to refuse the TCP/IP connections of senders with bad IP reputations. In that case, the sender of a message will only receive notification of the problem after their own MTA has made multiple attempts to deliver, usually after several hours or even several days. This means that detection of false positives is delayed. Of course, either of these techniques are preferable to the false positives that come from content filters. In most anti-spam gateways, spam detected by a content filter simply disappears into a black hole, which means that neither the receiver nor the sender have any information that an important message was lost. Systems that provide quarantines ameliorate this problem somewhat. It is clear, though, that the impact on business of a false positive from a properly configured IP reputation service, is much lower and presents much less risk than improperly configured IP reputation services or most content filters. An additional benefit comes from using reputation services, which can provide a mixed reputation for a particular IP address. The mixed reputation is neutral since it contains a balance of both positive and negative information about the IP. Examples of this include Cisco s SenderBase reputation service, Commtouch IP reputation service and the Trend Micro Reputation Service. When a mixed reputation is available, managers should choose to either throttle connections or respond with temporary failure codes to senders that have bad but not too bad reputations. For example, throttling can be used to lower the likelihood of a business impact on an improperly classified sender. If a non-spamming sender has a slightly bad reputation and is then throttled, for example, to 10 messages per day, then a single user would be unlikely to be affected by the misclassification. On the other hand, if the sender is actually generating large volumes of spam, then the throttle would reduce the amount of spam accepted, and thus reduce both load on the systems and the likelihood of spam getting through. Another strategy, similar to throttling,is to return a temporary failure (sometimes called a 4xx SMTP code) in the presence of negative reputation data. This can be used with throttling, or in place of throttling. This is appropriate when reputations change quickly up and down and there is a reasonable expectation that someone who has a slightly bad reputation will either be given a clean bill of health or move to the always bad category quickly. Content-filter Use of Reputation Data Reputation data can also be used after a message is accepted and during content filter analysis of the message. This might be done for any number of reasons. The most common is that the gateway that actually received the message does not have the ability to properly use IP reputation data. Typically, such a gateway will simply receive Opus One PAGE 8
9 mail and then pass it on to the anti-spam gateway for inspection and content filtering. 2 In that case, the content filtering gateway has no choice but to accept the message because the reputation of the sender is not available during the SMTP conversation. Content filtering decisions use IP reputation services as one factor in the decision on whether to mark a message as spam or not. The IP reputation is carried with the message and when the content filter starts looking at the message, it is one component in the total score or verdict. Content filtering is significantly more expensive from a resource point of view than simply refusing to accept a message, so this approach should be avoided if at all possible. In the case of IP reputation services like SenderBase, which have a broad range of rankings possible, reputation data can be used during content filtering when the reputation data alone is not sufficient reason to reject a message or when reputation data may help to identify trusted senders and bypass anti-spam scanning. For example, SenderBase scores in the range of -0.9 to 0.0 are highly correlated with spam senders, but also have a high false positive rate. Rather than simply rejecting messages from a sender with a -0.1 score, it might be better to run additional tests on the message to see if other findings correlate with the slightly negative score. Recommendations for SenderBase Deployment Cisco has generally recommended that its customers block incoming messages with SenderBase scores in the range of to Our research confirms this recommendation as the sweet spot for SenderBase that balances out a high spam block rate with a low false positive rate. The table below combines 12-month averages for block rate and false positive rate of SenderBase. SenderBase Incoming Spam False Positive Blocking Threshold Blocked (percentage) Rate (percentage) to % % to % % to % % to % % With a spam detection setting of to -3.0, SenderBase-enabled systems will block approximately 88% of incoming spam, and have a false positive rate of %. Blocking from to -2.0 will add only 2% to the block rate, but will increase the false positive rate by 33%. Thus, to -3.0 seems to be an appropriate blocking rate for a normal organization with average risk tolerances and a desire to reduce false positive rates. 2 This can also occur when the content filtering gateway is co-resident with the receiving SMTP MTA, but the SMTP receiver is not properly integrated with the content filtering anti-spam software. This is common in open source deployments, especially those using multiple reputation services to achieve a consensus reputation for any sender. Opus One PAGE 9
10 While it is possible to have a more aggressive approach to blocking spam based on reputation services, the tradeoff between a blocking level of (for example) to -3.0 and a blocking level of to -1.0 is fairly expensive. For an additional 5% of spam blocked at the incoming gateway, the aggressive manager must tolerate a six-fold increase in the false positive rate. Our advice is that scores in the range of -2.9 to 0.0 may be more appropriately handled via throttling or at the content filtering and message analysis part of the anti-spam gateway. Choosing an aggressive scanning level is really only a good idea when message gateways are strained for capacity. For example, if you would receive 1,000,000 messages (spam and non-spam) a day, choosing a block level of to -3.0 means that you will have to receive and search for spam in 270,000 messages each day. On the other hand, selecting a block level of to -1.0 would reduce that number to 229,000, a savings of about 15%. ROI for IP Reputation Services The Return on Investment for IP reputation services comes in several ways. The simplest way to realize value is by understanding that reputation services improve the spam catch rate of message scanning content filters. In Opus One s testing, we find that adding a reputation service can raise the catch rate for a content filter by a significant percentage. For example, in a recent 2008 test of 54 different anti-spam scenarios, the average increase in catch rate we observed was 3.9% a readily discernible difference in spam volume. A second value from IP reputation services is their ability to reduce the number and size of gateways an enterprise needs. By simply refusing to accept spam , the load on message content filters is lower and quarantines can be smaller. A message that isn t received doesn t have to be logged and archived. And, for enterprises that prefer to use tag-and-deliver or special spam folders, loads on message servers (such as Microsoft Exchange or Lotus Notes) are dramatically lower. Calculating the reduction in anti-spam gateway costs is illustrative of the savings. Consider the example of an organization that has a load of 1,000,000 messages/day, including spam, moving through their anti-spam gateways. In Opus One s testing, the amount of spam varies from month to month, but 2008 s average is 83%, meaning that of the 1,000,000 messages, 830,000 will, on average, be spam. Using SenderBase s IP reputation service as an example, an enterprise blocking using the recommended range of to -3.0 will see an average block rate of spam of 88% (measured across the past 12 months). In other words, SenderBase used according to the best practices described in this white paper would have blocked about 730,000 of those messages from being received at the enterprise. Opus One PAGE 10
11 Performance Advantage of Reputation Services Using enterprise-class reputation services to refuse spam can reduce total gateway load by 63% to 73%. SenderBase Example Open Source Product Example Number of messages received a day 1,000,000 1,000,000 Percent spam for average enterprise 83% 83% (measured for last 12 months) Actual spam messages you received 830, ,000 (# messages * % spam) Reputation Service Block Rate SenderBase -10 to -3 Open Source list blocks 88% of spam blocks 76.9% of spam Number of Spam Messages Blocked 730, ,000 Before They Enter the Enterprise (Actual Spam * Block Rate%) Messages Left that your Anti-Spam 1,000, ,000 1,000, ,000 Gateway Will Have to Handle = 270,000 = 369,000 (Total Messages Blocked Spam) This blocking of 73% of the incoming mail means that the enterprise could get by with 2/3 to 3/4 fewer anti-spam gateways. They don t need to handle 1,000,000 messages a day, but only 270,000 messages a day. Even a conservative approach to this would allow the number of gateways to be reduced by half. This savings is significant, because reducing gateways saves not only capital expenses, but operational expenses (power, rack space, cooling), administrative expenses (fewer gateways require less time to manage), and overhead such as reporting and database server costs. Because the percentage of received mail that is spam is so high at typical enterprises, small changes in the amount of spam blocked will have large effects on the performance of the network as a whole. If spam were only 20% of the mail received, then a few percentage points would only add up to a small amount of difference. But because spam represents more than 80% of the in an enterprise and as much as 90% in some enterprises and at some times of the year a few percentage points difference have a disproportionate effect on the number of messages that must be handled. For example, in the reputation service example above, the two services have effectiveness rates of 76% and 88%. This 12% difference in effectiveness is magnified as the amount of mail to be handled increases from 270,000 (88% effective reputation service) to 369,000 (76% effective reputation service): a 37% increase in load! Enterprises that deal with those messages using quarantine servers or, even worse, their own enterprise mail servers, will see an even more dramatic ROI. Using the example above, a quarantine server without a reputation service would have to handle 830,000 spam a day; with a reputation service, only 100,000 spam a day: an eight-fold decrease Opus One PAGE 11
12 in capacity requirements. Enterprises that actually tag-and-deliver messages or send them onto a special spam mailbox in their main mailbox servers will see even more dramatic differences in costs, because services such as Exchange and Notes are much more expensive per message. Without reputation services, an enterprise would have to triple the capacity of their enterprise messaging system to handle the same amount of Internet-incoming . These values were calculated using an average of per-message costs published by various industry analyst firms. If your enterprise receives 1,000,000 messages a day, and quarantines spam using a dedicated spam quarantine server archives spam using an enterprise archiving product delivers spam to a per-user spam folder in Exchange or Notes Using reputation services could save you $25, each year $153, each year $511, each year Conclusions IP reputation services are a valuable tool for any anti-spam gateway. With a low rate of false positives, IP reputation services can dramatically reduce the amount of spam entering an enterprise, increase spam catch rates, and save considerable money and resources. Our testing has proven that an industry-leading reputation service such as Cisco s SenderBase can block up to 88% of the spam before it hits the network, providing significant future proofing as the volume of and spam continues to increase. When IP reputation services are used during SMTP time, the amount of spam entering an enterprise can be dramatically reduced, while spam catch rates increase saving considerable money and resources. Opus One PAGE 12
13 Vendor Case Study: Cisco and SenderBase Reputation Service Effective use of reputation services can go beyond simply refusing at SMTP time. As a case study, we looked at Cisco IronPort s mail gateways to investigate how reputation services could be leveraged to provide other services within the gateways. Since SenderBase is a scaled reputation service, rather than a go/no-go service, IronPort mail gateways can both block and throttle mail based on the reputation service. For example, scores of -3.0 might be blocked entirely, while scores up to -2.0 might be throttled to 10 messages per hour, and so on. These settings are available to the network manager who can select as granular and detailed a throttling policy as needed. Recipient throttling also helps reduce false positives in the slightly negative, suspect range by allowing the valid senders in the suspect SBRS range to continue sending while slowing down the egregious senders in the same suspect SBRS range. Given the recent prevalence of reputation hijacking, due to botnet activity and compromised webmail accounts, this can provide significant incremental savings. SenderBase reputation services is also used by IronPort as part of its directory harvest protection capabilities. A common feature on high-end mail gateways, directory harvest protection is used to keep malicious senders from walking through all possible addresses at an organization in search of valid ones. Most directory harvest protection is based on invalid recipient counts: once a sender goes past a pre-determined threshold of invalid recipients, the mail gateway assumes they are trying to harvest the directory and takes a proactive action, such as closing the connection. IronPort ties their directory harvest protection (called DHAP, Directory Harvest Attack Protection, by IronPort) to reputation. In particular, users can set DHAP thresholds in the suspect range lower than that for positive reputation ranges. As organizations are more likely to be victims of DHAs from IP s with suspect reputation, this feature provides higher protection. For senders with good reputations, such as business partners, this threshold can be much higher. This enables these business partners who may not have the most updated distribution lists to continue sending important business communications (industry newsletters, benefits information, etc.) without the risk of getting blocked by a DHAP policy. This is a representative example of both the security integration and holistic approach of SenderBase into Cisco IronPort s Security service.reputation services could be leveraged to provide other services within the gateways. Opus One PAGE 13
Solutions IT Ltd Virus and Antispam filtering solutions 01324 877183 [email protected]
Contents Reduce Spam & Viruses... 2 Start a free 14 day free trial to separate the wheat from the chaff... 2 Emails with Viruses... 2 Spam Bourne Emails... 3 Legitimate Emails... 3 Filtering Options...
Why Content Filters Can t Eradicate spam
WHITEPAPER Why Content Filters Can t Eradicate spam About Mimecast Mimecast () delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
Opus One PAGE 1 1 COMPARING INDUSTRY-LEADING ANTI-SPAM SERVICES RESULTS FROM TWELVE MONTHS OF TESTING INTRODUCTION TEST METHODOLOGY
Joel Snyder Opus One February, 2015 COMPARING RESULTS FROM TWELVE MONTHS OF TESTING INTRODUCTION The following analysis summarizes the spam catch and false positive rates of the leading anti-spam vendors.
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
Spam Testing Methodology Opus One, Inc. March, 2007
Spam Testing Methodology Opus One, Inc. March, 2007 This document describes Opus One s testing methodology for anti-spam products. This methodology has been used, largely unchanged, for four tests published
An Overview of Spam Blocking Techniques
An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
ContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering
Voyant Strategies ContentCatcher Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering tm No one can argue that E-mail has become one of the most important tools for the successful
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3
Anti Spam Best Practices
39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing
FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives
FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,
How To Block Ndr Spam
How to block NDR spam Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR
Email Reputation Metrics Troubleshooter. Share it!
Email Reputation Metrics Troubleshooter page: 1 Email Reputation Metrics Troubleshooter Written By Dale Langley Dale has been working with clients to improve their email deliverability and response rates,
Emerging Trends in Fighting Spam
An Osterman Research White Paper sponsored by Published June 2007 SPONSORED BY sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone: +1 253 630 5839 Fax: +1 866
eprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
Intercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
INBOX. How to make sure more emails reach your subscribers
INBOX How to make sure more emails reach your subscribers White Paper 2011 Contents 1. Email and delivery challenge 2 2. Delivery or deliverability? 3 3. Getting email delivered 3 4. Getting into inboxes
Spam DNA Filtering System
The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,
How To Protect Your Email From Spam On A Barracuda Spam And Virus Firewall
Comprehensive Email Filtering: Barracuda Spam & Virus Firewall Safeguards Legitimate Email Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks
Comprehensive Email Filtering. Whitepaper
Comprehensive Email Filtering Whitepaper Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email loses
IronPort C-Series Overview High performance email security appliances. Carrier-proven technology, enterprise-class management.
Overview IronPort C-Series Overview High performance email security appliances. Carrier-proven technology, enterprise-class management. The IronPort C-Series email security appliances provide advanced
Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server.
Stop Spam Now! By John Buckman John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server. Copyright 1999 Lyris Technologies, Inc. Stop Spam Now! 1 Introduction
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL
EmailDirect is an email marketing solution provider (ESP) which serves hundreds of today s top online marketers by providing all the functionality and expertise required to send and track effective email
FortiMail Email Filtering Course 221-v2.2 Course Overview
FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,
Do you need to... Do you need to...
TM Guards your Email. Kills Spam and Viruses. Do you need to... Do you need to... Scan your e-mail traffic for Viruses? Scan your e-mail traffic for Viruses? Reduce time wasted dealing with Spam? Reduce
Next Generation IPS and Reputation Services
Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become
SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2
Course Overview Securing Email with Cisco Email Security Appliance (SESA) combines Parts 1 and 2 (SESA1, SESA2) into a single three day course. Students learn to use Cisco Email Security Appliances (ESA's)
Anti Spam Best Practices
53 Anti Spam Best Practices Anti Spam LIVE Service: Zero-Hour Protection An IceWarp White Paper October 2008 www.icewarp.com 54 Background As discussed in the IceWarp white paper entitled, Anti Spam Engine:
MDaemon configuration recommendations for dealing with spam related issues
Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did
Comparing Industry-Leading Anti-Spam Services
Comparing Industry-Leading Anti-Spam Services Results from Twelve Months of Testing Joel Snyder Opus One April, 2016 INTRODUCTION The following analysis summarizes the spam catch and false positive rates
The What, Why, and How of Email Authentication
The What, Why, and How of Email Authentication by Ellen Siegel: Director of Technology and Standards, Constant Contact There has been much discussion lately in the media, in blogs, and at trade conferences
Libra Esva. Whitepaper. Glossary. How Email Really Works. Email Security Virtual Appliance. May, 2010. It's So Simple...or Is It?
Libra Esva Email Security Virtual Appliance Whitepaper May, 2010 How Email Really Works Glossary 1 2 SMTP is a protocol for sending email messages between servers. DNS (Domain Name System) is an internet
Security. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Security Antivirus Administration SmarterMail is equipped with
PineApp Anti IP Blacklisting
PineApp Anti IP Blacklisting Whitepaper 2011 Overview ISPs outbound SMTP Services Individual SMTP relay, not server based (no specific protection solutions are stated between the sender and the ISP backbone)
Fighting Spam in an ISP Environment:
White Paper Fighting Spam in an ISP Environment: Challenges, Solutions and Best Practices April, 2007 Summary An ISP presents one of the most complex environments for managing spam because of the high
Kaspersky Anti-Spam 3.0
Kaspersky Anti-Spam 3.0 Whitepaper Collecting spam samples The Linguistic Laboratory Updates to antispam databases Spam filtration servers Spam filtration is more than simply a software program. It is
No per user or mail box pricing restrictions. Bundled pricing integrated with Antispam, Antivirus, Antispyware and Antimalware
Fortinet Lowers TCO No per user or mail box pricing restrictions Bundled pricing integrated with Antispam, Antivirus, Antispyware and Antimalware Cost on average is approximately 50% less than traditional
An Advanced Reputation Management Approach to Stopping Emerging Email Threats
An Advanced Reputation Management Approach to Stopping Emerging Email Threats CONTENTS The Evolution of Reputation Management 2 Emerging Security Threats 2 Advanced Reputation Management (ARM) 3 How ARM
Ipswitch IMail Server with Integrated Technology
Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these
Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2
Technical Note ISP Protection against BlackListing FORTIMAIL Deployment for Outbound Spam Filtering Rev 2.2 April 14, 2009 Table of Contents 1 Objective IP address protection... 3 1.1 Context... 3 1.2
TECHNOLOGY BRIEF: ENTERPRISE SOLUTIONS. Symantec Premium AntiSpam Evaluation Guide
TECHNOLOGY BRIEF: ENTERPRISE SOLUTIONS Symantec Premium AntiSpam Evaluation Guide White Paper: Symantec Enterprise Solutions Symantec Premium AntiSpam Evaluation Guide Contents Executive Summary..............................................................2
Mod 08: Exchange Online FOPE
Office 365 for SMB Jump Start Mod 08: Exchange Online FOPE Chris Oakman Managing Partner Infrastructure Team Eastridge Technology Stephen Hall Owner & IT Consultant District Computers 1 Jump Start Schedule
How To Ensure Your Email Is Delivered
Everything You Need to Know About Delivering Email through Your Web Application SECTION 1 The Most Important Fact about Email: Delivery is Never Guaranteed Email is the backbone of the social web, making
Blackbaud Communication Services Overview of Email Delivery and FAQs
Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers
Comprehensive Anti-Spam Service
Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive
About this documentation
Wilkes University, Staff, and Students have a new email spam filter to protect against unwanted email messages. Barracuda SPAM Firewall will filter email for all campus email accounts before it gets to
A White Paper. VerticalResponse, Email Delivery and You A Handy Guide. VerticalResponse,Inc. 501 2nd Street, Suite 700 San Francisco, CA 94107
A White Paper VerticalResponse, Email Delivery and You Delivering email seems pretty straightforward, right? You upload a mailing list, create an email, hit send, and then mighty wizards transport that
Introduction. SonicWALL Email Security
SonicWALL Email Security Configuration Tips Introduction SonicWALL Email Security is designed to install quickly and be easy to maintain while protecting a company from email threats. The out-of-the-box
DMA s E-Mail Authentication Requirement: FAQs and Best Practices
DMA s E-Mail Authentication Requirement: FAQs and Best Practices DMA s Board of Directors approved a new guideline for ethical marketing practices in October 2005, with the new member requirement going
Purchase College Barracuda Anti-Spam Firewall User s Guide
Purchase College Barracuda Anti-Spam Firewall User s Guide What is a Barracuda Anti-Spam Firewall? Computing and Telecommunications Services (CTS) has implemented a new Barracuda Anti-Spam Firewall to
Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam
Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2
Barracuda Spam Firewall
Barracuda Spam Firewall Overview The Barracuda Spam Firewall is a network appliance that scans every piece of email our organization receives. Its main purposes are to reduce the amount of spam we receive
Enhanced Spam Defence
Enhanced Spam Defence An approach to making SMTP connect time blocking a reliable method for e-mail filtering By John Jensen, Topsec Technology Ltd. As the spam problem keeps growing and the associated
Context Adaptive Scanning Engine: Protecting Against the Broadest Range of Blended Threats
Context Adaptive Scanning Engine: Protecting Against the Broadest Range of Blended Threats W h i t e P a p e r Executive Summary The email and Web security problem can no longer be addressed by point solutions
Introduction... 2. Configuration & Spam Detection... 2. WinWare Webmail... 3. Email Accounts... 3. Email Account Notes... 4. Definitions...
Page 1 Table of Contents Introduction... 2 Configuration & Spam Detection... 2 WinWare Webmail... 3 Email Accounts... 3 Email Account Notes... 4 Definitions... 5 Sender Policy Framework (SPF)... 5 Email
Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.
PureMessage for Microsoft Exchange protects Microsoft Exchange servers and Windows gateways against email borne threats such as from spam, phishing, viruses, spyware. In addition, it controls information
Why Spamhaus is Your Best Approach to Fighting Spam
Page 1 of 10 Executive Summary The spam problem is evolving and while overall spam volumes are down, the problems are getting worse. No longer just a nuisance wasting resources and time, spam is now a
Email Migration Project Plan for Cisco Cloud Email Security
Sales Tool Email Migration Project Plan for Cisco Cloud Email Security 2014 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Conf idential. For Channel Partner use only. Not f
Trend Micro Hosted Email Security Stop Spam. Save Time.
Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading
Solution Brief FortiMail for Service Providers. Nathalie Rivat
Solution Brief FortiMail for Service Providers Nathalie Rivat Agenda FortiMail for Internet Service Providers Outbound antispam to prevent blacklisting MMS routing for Mobile Operators Inbound antispam
Email Validation. for Improved Deliverability & Marketing Results
Email Validation for Improved Deliverability & Marketing Results Table of Contents: Overview...Page 2 Mailing to bad emails reduces inbox delivery and sender reputation...page 2 Improving reputation and
IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32
IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How
Groundbreaking Technology Redefines Spam Prevention. Analysis of a New High-Accuracy Method for Catching Spam
Groundbreaking Technology Redefines Spam Prevention Analysis of a New High-Accuracy Method for Catching Spam October 2007 Introduction Today, numerous companies offer anti-spam solutions. Most techniques
WHITE PAPER. Safeguarding your Email Infrastructure INSIDE MODUS TECHNOLOGY
WHITE PAPER Safeguarding your Email Infrastructure INSIDE MODUS TECHNOLOGY Table of Contents Executive Summary............................................................. 3 Vircom s modus Technology....................................................
When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper
When Reputation is Not Enough Barracuda Email Security Gateway s Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level
Email Filter User Guide
Table of Contents Subject Page Getting Started 2 Logging into the system 2 Your Home Page 2 Manage your Account 3 Account Settings 3 Change your password 3 Junk Mail Digests 4 Digest Scheduling 4 Using
5 tips to improve your email database. An Experian Data Quality white paper
5 tips to improve your email database An Experian Data Quality white paper While many marketers spend significant time and effort optimizing content and debating the timing of each campaign, marketers
Trend Micro Web and Email Security Solutions on Crossbeam X80 Platform
Trend Micro Web and Email Security Solutions on Crossbeam X80 Platform Opus One April 2008 Opus One conducted performance tests on two Trend Micro products InterScan Messaging Security Suite and InterScan
REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS
REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS Rami Khasawneh, Acting Dean, College of Business, Lewis University, [email protected] Shamsuddin Ahmed, College of Business and Economics, United Arab
Email Best Practices A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER
Email Best Practices A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction Discussions of best practices for email marketing can be a confusing array of one- size- fits- all suggestions
SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing
EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render
Cisco IronPort X1070 Email Security System
Data Sheet Cisco IronPort X1070 Email Security System As the battle to protect the email perimeter continues, two predominant trends emerge: higher mail volumes and more resource-intensive scanning. The
