Payment-Based . Abstract. 1 Introduction
|
|
|
- Donna Malone
- 10 years ago
- Views:
Transcription
1 Payment-Based David A. Turner and Ni Deng Department of Computer Science California State University San Bernardino San Bernardino, CA December 31, 2003 Abstract Spam is a major problem facing today, and current solutions are ineffective. This paper presents our progress towards defining and implementing a payment-based delivery system that solves the problem of spam. We present an extension to the delivery protocol for specifying and collecting payments, explain its security requirements, and illustrate the use of the Lightweight Currency Protocol as an underlying currency system for payment-based . We discuss the various ways payment requirements can be presented to the end user, and explain our prototyping efforts and how they fit into the larger picture of a peer-to-peer service market based on micro-payments. Keywords: spam, payment-based , micro-payments, LCP 1 Introduction In the United States, spam is plaguing systems. Many people now receive more spam in their inboxes than legitimate . Because has become an important part of everyday communications, spam affects a large number of people. Thus, it is not surprising that the popular press provides continuing coverage of the spam problem. Solutions to the problem of spam fall into three categories: filtering, legislation and payments. In this introduction, we describe these approaches and their limitations, and we argue that the paymentbased approach is the most effective solution to the problem. Many service providers use filters to detect and block spam. However, there are a number of problems with this approach that render it ineffective. Failures in spam filters can be classified in two ways: false positives and false negatives. A false positive occurs when the filter labels good as spam, and a false negative occurs when spam is labeled as good . An aggressive filter will have fewer false negatives, and thus will block more spam. However, aggressive filters have a greater number of false positives, which is a serious problem, because users fail to receive potentially important messages. For this reason, spam filters are usually configured so that the probability of a false positive is close to zero, which allows a lot of spam to pass into user inboxes. Another serious problem with the filter-based approach is that spammers send the same message formatted in different ways in an attempt to bypass the filter. The result is that systems must process more message traffic, and users may receive multiple copies of the same message. Over recent years, national and local governments in the United States and other countries have passed laws against spam. However, these laws have not been effective for several reasons. First, there is the problem of defining spam in such a way that distinguishes it from legitimate . Second, there is the problem of enforcement, which is difficult because can originate outside of a government s jurisdiction. The benefit of filters and legislation are that spam can be reduced without requiring any new 1
2 user behavior. In Sec. 6, we explain that in certain cases, payment-based solutions add new requirements to users, increasing the decision costs associated with . However, the benefit of a payment model for is that it can reduce spam more effectively, and reduce the load spam places on network resources. Also, the payment-based approach avoids the problem of defining spam, allowing to remain an open communication channel. Some spammers are sending spam on the order of hundreds of millions of per day. If delivery charges were as little as $0.01 per , then 100 million s would cost one million dollars to deliver, a price in excess of potential profits for most spam. Thus, users can continue to send s with negligible financial impact, while spammers can no longer afford to operate. Several other researchers have proposed payment-based schemes. One idea is to require a proof of work (POW) payment [8, 2]. These payments are one-time payments that the sending domain sends to the receiving domain; they are not reusable or transferable. After the sending domain connects, the receiving domain presents a mathematical puzzle to the sender that requires a significant amount of time for the sender to solve. After the sender computes the solution to the puzzle, it sends the solution to the receiving domain. While computing the solution to the puzzle consumes significant resources, verifying that it is correct can be done relatively easily. After the receiving domain verifies the response is correct, it accepts delivery of the . The idea is that spammers will not have the resources to compute the solution to the millions of puzzles that will be presented to them. There are two essential problems with POW schemes when compared to LCP: they waste the resources of senders by requiring a meaningless computation to be performed, and compute time requirements vary too much across the range of CPU speeds. Fahlman and Wegman of IBM have proposed the use of charity stamps for controlling spam [11]. In this system, senders of purchase stamps that are required in order for delivery of , and the proceeds are given to charity. One problem with this system is the requirement of a central authority to decide on the price of stamps, and on which charities earn the proceeds. In contrast, the currency-based system we propose operates in a self-regulated, fully open market with multiple currencies. Power is distributed among participants, rather than concentrated in a central authority. Additionally, these currencies are not restricted to services, but are redeemable for services outside of . Recently, the commercial enterprise cashette has started to offer a payment-based system [1]. When a new user registers with the site, they establish an account that is initially funded with $0.25. During registration, the site displays a code in an image, and requires the human user to enter the code into the registration form. This is a precaution against agents that automatically open up one account after another. Users with cashette accounts can send mail to other users of cashette accounts. When they do this, the sender transfers a payment in an amount set by the recipient. If the recipient adds the sender to her approved list, then the sender is no longer required to make a payment. The main limitation to the cashette system is that mail originating from a mail domain other than cashette.com can not be delivered to the recipient unless the recipient has previously added the sender to her approved list. Thus, the cashette system only support mail between users who already know each other, or between cashette users. Cashette can overcome this limitation by adopting the payment protocol described in this paper, so that users from other mail domains can send to users in the cashette mail domain. 2 Overview of Payment-Based In payment-based , the service provider of the sender makes a payment to the service provider of the recipient. After payment is received, the sending system is permitted to deliver an message into the inbox of the recipient. This is the generic procedure used by sender and recipient delivery systems. How costs are passed to end users is a system-specific decision, which we discuss later in this paper. When the sending system contacts the recipient system, the following events will occur: 1. The recipient system announces that it is a 2
3 payment-based service, and enumerates the payment systems it supports. 2. The two systems establish a secure TLS session. 3. The sending system identifies the sender and recipients of an The recipient system enumerates the type of payments it will accept in order to deliver this The sender makes one of these payments, and then reports to the recipient which payment it made. 6. The recipient system verifies the payment, and replies with OK. 7. The sending system continues with the SMTP protocol in the normal manner to deliver the . There are several aspects to this scenario that are worth noting. First, the protocol is an ESMTP extension to the basic SMTP delivery protocol [9, 4]. This design decision was made in order to make it easier to construct payment-based services using the existing code base, and make it easier for system implementers to comprehend and adopt the procedure. Second, the protocol requires the use of TLS [3], so that each end authenticates to each other and transacts over a secure, reliable channel. This is required in order to avoid various attacks motivated by the potential for financial gain. Third, The system allows for the use of one or more payment systems. This is necessary, because no single electronic payment system has yet emerged as a standard. Additionally, this flexibility allows the system to converge to an effective payment system. Fourth, when the recipient system enumerates the payments it would accept, it provides the details needed by each system in order to make the payments. The sending system selects one from the list, and makes the payment. Such payment may be done out-of-band using a transfer-based payment protocol such as the Lightweight Currency Protocol (LCP) [15], or in-band using a cheque-based system such as XML-X [16], or a coin-based protocol such as PPay [17]. In this paper, we illustrate paymentbased with payments made using LCP. 3 LCP Real-world currency does not work well for micropayment-based systems, because real-world currencies have high transaction costs, and users prefer to avoid accepting the decision requirements for micro-payments. To solve this problem, the Lightweight Currency Protocol (LCP) was designed as a low-cost, low-risk alternative to realworld currencies for payment-enabled systems. LCP as defined by [15] is a simple, secure protocol that enables nodes with a network connection to issue currencies through public key identifiers. This means that entities (persons or organizations) can issue their own currencies as a medium of exchange without reliance on certificate authorities or other centralized systems. When an entity such as a mail service provider issues currency, the entity imbues value into the currency by making it redeemable for a service that it provides, such as delivery. However, entities do not need to issue currency in order to operate in the market, because they can rely on the currencies issued by other entities. The motivation to issue a currency is to profit through the collection of transaction fees. Under the LCP, each transaction processed by the currency issuer is subject to a transaction fee. A currency issuer is responsible to control its supply of currency in the marketplace. When an entity redeems currency for service provided by the issuer, the total amount of currency in circulation decreases. Likewise, when an entity transfers currency to an entity other than the issuer for the purchase of service, the issuer collects a transaction fee, which also decreases the total amount of currency in circulation. To increase the amount of currency in circulation, the issuer purchases services with newly issued currency. It is also possible for a currency issuer to issue new currency in exchange for real-world dollars. One benefit of LCP is that it is a generic currency not tied to any specific application. Thus, entities can acquire currency through the sale of a service in one market, and spend those currencies in other markets. Potential services include peer- 3
4 to-peer media delivery, storage contracts, delivery, proxy and lookup services, electronic documents, and audio and video media. See [14] for a detailed example of a P2P content distribution application that relies on LCP. LCP is ideal for payment-based , because it is easy for service providers to issue their own currencies to make delivery payments. By transacting in their own currencies, service providers can reduce the loss of value from transaction fees charged by currency issuers. In fact, they can collect transaction fees on their own currency to offset the fees paid to other issuers. 4 The PAYMENT Command RFC 1869 defines a framework for extending the SMTP delivery protocol [9]; all service extensions published by the IETF as standards comply with this framework. The payment-based delivery system advocated in this paper is an SMTP protocol extension that conforms to RFC We propose to extend SMPT through the use of an additional command called PAYMENT. The use of payments for delivery raises additional security concerns that go beyond privacy. A plain text protocol will encourage man-in-themiddle attacks designed to steal payments. To remedy this problem, transacting systems should use the STARTTLS service extension [5] to authenticate each end, and establish a secure, reliable communication channel. Justification for this requirement is given in Section 5. Fig. 1 contains an example exchange between two mail systems, illustrating the main success scenario. In this example, user Alice (with address alice@system a.com) is sending an to user Bob (with address bob@system b.com). In the example, Alice s system is represented with letter C, indicating its role as TCP client. Likewise, Bob s system is represented by the letter S, indicating its role as TCP server. In the example, C obtains the IP address for a mail transfer agent for domain system b.com by querying DNS. After establishing a TCP connection, S sends a greeting message to C. The client then sends the EHLO command to indicate that it is an ESMTP client. The server replies with the domain name it claims to accept mail for, followed by a list of Figure 1: Main Success Scenario S: <wait for connection on TCP port 25> C: <open connection to server> S: 220 system_b.net Service ready C: EHLO system_a.net S: 250-system_b.net 250-STARTTLS 250 PAYMENT C: STARTTLS S: 220 Go ahead <client and server establish a TLS session> C: EHLO system_a.net S: 250-system_b.net Service ready 250 PAYMENT C: MAIL FROM: alice@system_a.net S: 250 Address OK C: RCPT TO: bob@system_b.net S: 250-LCP/1.0 money.com LCP/1.0 system_b.net LCP/1.0 system_z.net <client makes out-of-band payment> C: PAYMENT LCP/1.0 money.com <server verifies payment> S: 250 OK C: DATA S: 354 Enter mail, end with a single "." C: Bob, C: How are you? C: Sincerely, Alice C:. S: 250 OK C: QUIT S: 221 Goodbye. service extensions it supports, namely, STARTTLS and PAYMENT. The client initiates establishment of a TLS session by sending the STARTTLS command, and then initiating a TLS handshake. After the TLS session is established, the client resends the EHLO command, to which the server replies with a restatement of the service extensions it supports (minus the STARTTLS command). Next, the client issues the MAIL command, providing the address of the sending party. The server replies with a status code of 250, indicating success. The client issues the RCPT command, 4
5 which identifies the end user to receive the . The server replies with a status code of 250 to indicate success, and uses the SMTP line continuation mechanism to enumerate the payment options for the client, which is simply a list of payment instructions. The payment instructions contain enough information for the client to determine how payment should be made, which necessarily includes the payment system to use, the currency (in case the payment system supports multiple currencies), the amount of currency, and possibly other information needed by the payment system. In the example in Fig. 1, the server provides three payment instructions. The components of a payment instruction are separated by one or more space characters (ASCII 32). The first component identifies the payment system. In the example, all payment instructions are for payments using version 1.0 of the Lightweight Currency Protocol (LCP). Each payment instructions contains a currency issuer identifier, the amount of currency required, and a transaction identifier. Because LCP relies on public keys for identifiers, the recipient of payment for all three of these instructions is given by the public key used by the server to establish the TLS session. The client executes one of the payment instructions, and then issues the PAYMENT command, which identifies which payment option was chosen. In the case of LCP, payment is made out-of-band. However, if a coin-based or cheque-based payment system is used, then the payment token is returned as an argument to the PAYMENT command. After the server verifies payment, it replies with status code 250 to indicate success. Now, the client issues the DATA command and completes delivery in the normal manner. The basic success scenario in Fig. 1 illustrates how an is sent to a single recipient. If the is intended for multiple recipients, than it can be handled in two ways. The server allows the client to issue the RCPT command repeatedly to identify each recipient to which it provides a possibly different list of payment options. After the client has identified each recipient of the , it makes one or more payments that satisfy the server s payment requirements, and then it issues one or more corresponding PAYMENT commands. The rationale for multiple payments for multiple recipients is that it is possible that the server requires different types payments for different recipients. This may be the result of a system that allows users to specify their own charges, and therefore specify the currencies they are willing to accept. Two recipients of a single may thus require payment in different currencies. However, if payments for separate recipients can be aggregated into a single payment, the protocol enables this. In this case, if payments were being made using LCP, the transaction identifiers in the separately enumerated payment instructions would need to be identical. The client would then make a single aggregated payment with the common transaction identifier. 5 Security Issues Many currency protocols, such as the Lightweight Currency Protocol, are fully secure methods of payments. However, possible security vulnerabilities emerge when payment instructions are transported in plain text over TCP, which is typically the case with delivery. Because payment is transferred from the sender to the recipient, the danger is for a man-in-themiddle to impersonate the recipient system. In this case, the attacker provides payment information that results in payments going to the attacker. This situation can arise under two circumstances: TLS is not used to establish an authenticated, secure communication channel between sender and receiver. The sender does not have or can not obtain a reliable copy of the recipient s public key. We identify three attack strategies based on a man in the middle impersonating the recipient. In the following, we describe these attacks by way examples. The first attack that we describe is called simple theft. Simple theft occurs when the attacker provides payment instructions that cause the sender to transfer currency to the attacker. After the attacker obtains payment, he may allow the to pass to him, but if he does, he either discards it or saves it for some other purpose. Under simple theft, the recipient never receives the . 5
6 The second attack we describe is called the spam attack. The spam attack occurs when an attacker replaces an with spam. The attacker accomplishes this by acting as a proxy between between sender and receiver, letting commands and replies pass through him unchanged until after DATA command is accepted. After the DATA command is accepted, the attacker accepts the senders message data, but transmits to the recipient a different message. Under the spam attack, the recipient receives payment from the sender, but receives the spam rather than the sender s ; and the attacker obtains no currency. The third attack we describe is called payment skimming. Under this attack, the attacker delivers the message, but creates a price differential between the price paid by the sender and the price required by the recipient. The sender makes an inflated payment to the attacker, and the attacker makes the required payment to the recipient, and delivers the . The result is that the deliver is accomplished, but the attacker has surreptitiously extracted (or skimmed) a profit from the transaction without being detected. The attacks described in this paper do not represent an exhaustive list, but they do illustrate the need for an end-to-end security mechanism that protects against man-in-the-middle attacks. 6 User Requirements We describe three possible approaches to user interfaces that range in complexity from the simplest to the most complex. In all three of these approaches, the underlying payment mechanism executed between mail transfer agents remains the same; only the manner in which the end user is involved in decisions varies. The simplest approach to the user interface is to completely hide the payment mechanism. We refer to this approach as the fully automated system. The advantage of this approach is that it frees users from making payment decisions. This approach could be considered ideal, because it places no additional requirements on users. It is easy to see that the fully automated approach would work well for companies or organizations, because the company s system administrators would set company-wide payment policies and acquire currency whenever necessary. However, a fully automated system would not work well for the free services, such as yahoo or hotmail. If users of the large free services were not made accountable for the s they send, then users would send from their accounts soley for the purpose of collecting revenues. Because of this likelihood, the free service providers would need to hold their users accountable for payments needed to deliver their s. The two approaches described in the following would satisfy this need. The opposite approach to hiding all payment decisions from the user is to place all payment decisions on the user. We refer to this approach as the full-control approach. In this approach, users set the payment options required for sending s into their inboxes. Additionally, when sending an to another user, they are asked to select one of the payment options provided by the recipient system. It is possible to hold users accountable for the they send without burdening them with the complexity that comes with multiple currencies. In the system we call the single currency model, users are presented prices in a single currency, and the system is responsible for translating the multiple currencies being used to the single currency presented to the user. While this approach simplifies the user s decisions, it adds complexity to the system, and may even require the presence of a currency exchange market. 7 Future Work We are currently developing a prototype web-based system that supports a minimal set of SMTP commands (as defined in [4]) in addition to the standard extension STARTTLS and the draft extension PAYMENT described in this paper. In this prototype system, we will explore the intricacies of the single currency model user interface described in the previous section. Other projects we are working on investigate the possibility of using LCP currencies as a basis for a peer-to-peer resource market. We are also investigating derivative services, such as banks and currency exchanges. These projects will test our conjecture that LCP or another Internet currency pro- 6
7 tocol will enable the development of various electronic marketplaces comprised of low-value transactions, such as the payment-based system presented in this paper. References [1] Cachette, inc. Payment-based service. [2] A. Back. Hashcash: A denial of service counter-measure. Tech Report, August hashcash.pdf. [3] T. Dierks and C. Allen. The TLS protocol version 1.0. RFC 2246, January [4] J. Klensin Ed. Simple mail transfer protocol. RFC 2821, April [5] P. Hoffman. SMTP service extension for secure SMTP over Transport Layer Security. RFC 3207, February [6] Paul Hoffman and Dave Crocker. Unsolicited bulk Mechanisms for control. Technical report. [7] Gary Howland. Development of an open and flexible payment system, overview.html. [8] M. Jakobsson and A. Juels. Proofs of work and bread pudding protocols. In Proceedings of the IFIP TC6 and TC11 Joint Working Conference on Communications and Multimedia Security, [9] J. Klensin, N. Freed, M. Rose, E. Stefferud, and D. Crocker. SMTP service extensions. RFC 1869, November [10] R. Rivest and A. Shamir. Payworld and MicroMint: Two Simple Micropayment Schemes. In Proceedings of Security Protocols Workshop, [11] A. Robbins. You spam, you pay. PC Magazine, April [12] Brad Templeton. E-Stamps. estamps.html. [13] David A. Turner and Daniel M. Havey. Controlling spam through lightweight currency. In Proceedings of the Hawaii International Conference on Computer Sciences, January [14] David A. Turner and Keith W. Ross. A lightweight currency paradigm for the P2P resource market, Submitted. [15] David A. Turner and Keith W. Ross. The Lightweight Currency Protocol (LCP). IETF Internet draft (a work in progress), September draft-turner-lcp-00.txt. [16] Erwin van der Koogh and Ian Grigg. The XML-X project. RFC 2246, January [17] B. Yang and H. Garcia-Molina. PPay: Micropayments for Peer-to-Peer Systems. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), October
Controlling Spam through Lightweight Currency
Controlling Spam through Lightweight Currency David A. Turner and Daniel M. Havey Department of Computer Science California State University San Bernadino San Bernardino, CA 92407 ([email protected], [email protected])
An Exchange Protocol for Alternative Currencies
An Exchange Protocol for Alternative Currencies Yiyao Hao, Daniel M. Havey and David A. Turner Department of Computer Science California State University, San Bernardino San Bernardino, CA 92407 ([email protected],
The basic groups of components are described below. Fig X- 1 shows the relationship between components on a network.
Elements of Email Email Components There are a number of software components used to produce, send and transfer email. These components can be broken down as clients or servers, although some components
Emails and anti-spam Page 1
Emails and anti-spam Page 1 As the spammers become increasing aggressive more and more legit emails get banned as spam. When you send emails from your webcrm system, we use the webcrm servers to send emails
An Overview of Spam Blocking Techniques
An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now
Email. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Email Daniel Zappala CS 460 Computer Networking Brigham Young University How Email Works 3/25 Major Components user agents POP, IMAP, or HTTP to exchange mail mail transfer agents (MTAs) mailbox to hold
A New Approach to Enhance E-mail Performance Through SMTP Protocol
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.4, April 2008 299 A New Approach to Enhance E-mail Performance Through SMTP Protocol Hussein A.Al bazar,sureswaran Ramadass,
Email Marketing Glossary of Terms
Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
Prevention of Spam over IP Telephony (SPIT)
General Papers Prevention of Spam over IP Telephony (SPIT) Juergen QUITTEK, Saverio NICCOLINI, Sandra TARTARELLI, Roman SCHLEGEL Abstract Spam over IP Telephony (SPIT) is expected to become a serious problem
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Books and Beyond. Erhan J Kartaltepe, Paul Parker, and Shouhuai Xu Department of Computer Science University of Texas at San Antonio
How to Secure Your Email Address Books and Beyond Erhan J Kartaltepe, Paul Parker, and Shouhuai Xu p Department of Computer Science University of Texas at San Antonio Outline Email: A Brief Overview The
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application. Author: Fung, King Pong
Dissertation Title: SOCKS5-based Firewall Support For UDP-based Application Author: Fung, King Pong MSc in Information Technology The Hong Kong Polytechnic University June 1999 i Abstract Abstract of dissertation
Articles Fighting SPAM in Lotus Domino
Page 1 of 5 Articles Fighting SPAM in Lotus Domino For many e-mail administrators these days, the number one complaint from the users and managers is unsolicited emails flooding the system, commonly called
SIP and VoIP 1 / 44. SIP and VoIP
What is SIP? What s a Control Channel? History of Signaling Channels Signaling and VoIP Complexity Basic SIP Architecture Simple SIP Calling Alice Calls Bob Firewalls and NATs SIP URIs Multiple Proxies
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
Internet Security [1] VU 184.216. Engin Kirda [email protected]
Internet Security [1] VU 184.216 Engin Kirda [email protected] Christopher Kruegel [email protected] Administration Challenge 2 deadline is tomorrow 177 correct solutions Challenge 4 will
Spam, Spam and More Spam. Spammers: Cost to send
Spam, Spam and More Spam cs5480/cs6480 Matthew J. Probst *with some slides/graphics adapted from J.F Kurose and K.W. Ross Spammers: Cost to send Assuming a $10/mo dialup account: 13.4 million messages
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
Configuring Security for SMTP Traffic
4 Configuring Security for SMTP Traffic Securing SMTP traffic Creating a security profile for SMTP traffic Configuring a local traffic SMTP profile Assigning an SMTP security profile to a local traffic
Email Correlation and Phishing
A Trend Micro Research Paper Email Correlation and Phishing How Big Data Analytics Identifies Malicious Messages RungChi Chen Contents Introduction... 3 Phishing in 2013... 3 The State of Email Authentication...
Chapter 2 Application Layer. Lecture 5 FTP, Mail. Computer Networking: A Top Down Approach
Chapter 2 Application Layer Lecture 5 FTP, Mail Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Application Layer 2-1 Chapter 2: outline 2.1 principles
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
How To Block Ndr Spam
How to block NDR spam Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR
Implementing MDaemon as an Email Security Gateway to Exchange Server
Implementing MDaemon as an Email Security Gateway to Exchange Server Introduction MDaemon is widely deployed as a very effective antispam/antivirus gateway to Exchange. For optimum performance, we recommend
eprism Email Security Appliance 6.0 Release Notes What's New in 6.0
eprism Email Security Appliance 6.0 Release Notes St. Bernard is pleased to announce the release of version 6.0 of the eprism Email Security Appliance. This release adds several new features while considerably
Email Encryption. Administrator Guide
Email Encryption Administrator Guide Email Encryption Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo,
DKIM Enabled Two Factor Authenticated Secure Mail Client
DKIM Enabled Two Factor Authenticated Secure Mail Client Saritha P, Nitty Sarah Alex M.Tech Student[Software Engineering], New Horizon College of Engineering, Bangalore, India Sr. Asst Prof, Department
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Redirecting and modifying SMTP mail with TLS session renegotiation attacks
Business Unit or Product Name Redirecting and modifying SMTP mail with TLS session renegotiation attacks Wietse Venema Postfix mail server project www.postfix.org November 8, 2009 2003 IBM Corporation
A Lightweight Secure SIP Model for End-to-End Communication
A Lightweight Secure SIP Model for End-to-End Communication Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China [email protected] Abstract
DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices. Technical White Paper. April 2014
DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices Technical White Paper April 2014 DDL Systems, Inc. PO Box 1262 Valparaiso, IN 46384 Phone: 866 559-0800 Introduction
IM: How Instant Messaging Systems Work
Peer-to-Peer Networking IM: How Instant Messaging Systems Work Mohammad iqbal Thanks to : Xinran Wu, Clement Yuen Instant Messaging Systems ICQ (Mirabilis 1996, Bought by AOL in 1998, $300M) AIM (1997),
Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT)
Voice Printing And Reachability Code (VPARC) Mechanism for prevention of Spam over IP Telephony (SPIT) Vijay Radhakrishnan & Ranjith Mukundan Wipro Technologies, Bangalore, India Email:{radhakrishnan.vijay,
Examining Proxies to Mitigate Pervasive Surveillance
Examining Proxies to Mitigate Pervasive Surveillance Eliot Lear Barbara Fraser Abstract The notion of pervasive surveillance assumes that it is possible for an attacker to have access to all links and
How to Build an Effective Mail Server Defense
How to Build an Effective Mail Server Defense A multi-stage approach to securing your email communication August, 21 2006 Author: Alin Dobre, Head of Customer Support, AXIGEN GECAD Technologies 10A Dimitrie
Email Electronic Mail
Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing
Email, SNMP, Securing the Web: SSL
Email, SNMP, Securing the Web: SSL 4 January 2015 Lecture 12 4 Jan 2015 SE 428: Advanced Computer Networks 1 Topics for Today Email (SMTP, POP) Network Management (SNMP) ASN.1 Secure Sockets Layer 4 Jan
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)
2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file
Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper
Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges
Setting up Microsoft Office 365
Integration Guide Revision G McAfee SaaS Email Protection Securing Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper
When Reputation is Not Enough Barracuda Email Security Gateway s Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level
A Call Conference Room Interception Attack and its Detection
A Call Conference Room Interception Attack and its Detection Nikos Vrakas 1, Dimitris Geneiatakis 2 and Costas Lambrinoudakis 1 1 Department of Digital Systems, University of Piraeus 150 Androutsou St,
FTP and email. Computer Networks. FTP: the file transfer protocol
Computer Networks and email Based on Computer Networking, 4 th Edition by Kurose and Ross : the file transfer protocol transfer file to/from remote host client/ model client: side that initiates transfer
Blackbaud Communication Services Overview of Email Delivery and FAQs
Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers
SMTP Servers. Determine if an email message should be sent to another machine and automatically send it to that machine using SMTP.
SMTP Servers SMTP: Simple Mail Transfer Protocol (TCP Port 25) The Simple Mail Transfer Protocol (SMTP) is an Internet standard for transferring electronic mail between computers. UNIX systems implement
VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division
VIDEO Intypedia013en LESSON 13: DNS SECURITY AUTHOR: Javier Osuna García-Malo de Molina GMV Head of Security and Process Consulting Division Welcome to Intypedia. In this lesson we will study the DNS domain
Advanced Settings. Help Documentation
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Advanced Settings Abuse Detection SmarterMail has several methods
CS43: Computer Networks Email. Kevin Webb Swarthmore College September 24, 2015
CS43: Computer Networks Email Kevin Webb Swarthmore College September 24, 2015 Three major components: mail (MUA) mail transfer (MTA) simple mail transfer protocol: SMTP User Agent a.k.a. mail reader composing,
Anti Spamming Techniques
Anti Spamming Techniques Written by Sumit Siddharth In this article will we first look at some of the existing methods to identify an email as a spam? We look at the pros and cons of the existing methods
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
CipherMail Gateway Quick Setup Guide
CIPHERMAIL EMAIL ENCRYPTION CipherMail Gateway Quick Setup Guide October 10, 2015, Rev: 9537 Copyright 2015, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Typical setups 4 2.1 Direct delivery............................
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
Anti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.
A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money
isecuremail User Guide for iphone
isecuremail User Guide for iphone Page 1 CONTENTS Chapter 1: Welcome... 4 Chapter 2: Getting Started... 5 Compatability... 5 Preliminary Steps... 5 Setting up a POP3 / IMAP4/ Exchange Email Account...
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Setting up Microsoft Office 365
Setup Guide Revision F Using McAfee SaaS Email Protection to Secure Exchange Online in Microsoft Office 365 Setting up Microsoft Office 365 Use this guide to configure Microsoft Office 365 and Microsoft
Aloaha Mail and Archive
Aloaha Mail and Archive Aloaha Mail and Archive is an email archiving solution that can archive inbound-, internal and outbound emails directly and transparently into a central mailstore. Additionally
Application Firewalls
Application Moving Up the Stack Advantages Disadvantages Example: Protecting Email Email Threats Inbound Email Different Sublayers Combining Firewall Types Firewalling Email Enforcement Application Distributed
COSC 472 Network Security
COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html
Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2
Technical Note ISP Protection against BlackListing FORTIMAIL Deployment for Outbound Spam Filtering Rev 2.2 April 14, 2009 Table of Contents 1 Objective IP address protection... 3 1.1 Context... 3 1.2
Email Services Deployment. Administrator Guide
Email Services Deployment Administrator Guide Email Services Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the
Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.
Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform
Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address : 69.43.165.11
Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: rsync.net ASV Company: Comodo CA Limited 06-02-2015 Scan expiration date: 08-31-2015 Part 2. Component
Introduction to Computer Networks
Introduction to Computer Networks Chen Yu Indiana University Basic Building Blocks for Computer Networks Nodes PC, server, special-purpose hardware, sensors Switches Links: Twisted pair, coaxial cable,
Why Content Filters Can t Eradicate spam
WHITEPAPER Why Content Filters Can t Eradicate spam About Mimecast Mimecast () delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate
How To Configure Forefront Threat Management Gateway (Forefront) For An Email Server
Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Configuring and using the E-Mail protection feature in Microsoft Forefront Threat Management
About the Junk E-mail Filter
1 of 5 16/04/2007 11:28 AM Help and How-to Home > Help and How-to About the Junk E-mail Filter Applies to: Microsoft Office Outlook 2003 Hide All The Junk E-mail Filter in Outlook is turned on by default,
FTP: the file transfer protocol
File Transfer: FTP FTP: the file transfer protocol at host FTP interface FTP client local file system file transfer FTP remote file system transfer file to/from remote host client/ model client: side that
OCS Training Workshop LAB14. Email Setup
OCS Training Workshop LAB14 Email Setup Introduction The objective of this lab is to provide the skills to develop and trouble shoot email messaging. Overview Electronic mail (email) is a method of exchanging
XGENPLUS SECURITY FEATURES...
Security Features Table of Contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. XGENPLUS SECURITY FEATURES... 3 3. SERVER LEVEL FEATURES... 5 4. DOMAIN LEVEL FEATURES... 8 5. USER LEVEL FEATURES...
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
Junk Email Filtering System. User Manual. Copyright Corvigo, Inc. 2002-03. All Rights Reserved. 509-8282-00 Rev. C
Junk Email Filtering System User Manual Copyright Corvigo, Inc. 2002-03. All Rights Reserved 509-8282-00 Rev. C The Corvigo MailGate User Manual This user manual will assist you in initial configuration
E-Mail Security. Raj Jain. Washington University in St. Louis
E-Mail Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/
Introduction to Computer Security Benoit Donnet Academic Year 2015-2016
Introduction to Computer Security Benoit Donnet Academic Year 2015-2016 1 Agenda Networking Chapter 1: Firewalls Chapter 2: Proxy Chapter 3: Intrusion Detection System Chapter 4: Network Attacks Chapter
TLS and SRTP for Skype Connect. Technical Datasheet
TLS and SRTP for Skype Connect Technical Datasheet Copyright Skype Limited 2011 Introducing TLS and SRTP Protocols help protect enterprise communications Skype Connect now provides Transport Layer Security
Introduction. -- some basic concepts and terminology -- examples for attacks on protocols -- main network security services
Introduction -- some basic concepts and terminology -- examples for attacks on protocols -- main network security services (c) Levente Buttyán ([email protected]) Attack, threat, and vulnerability security
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
SESA Securing Email with Cisco Email Security Appliance Parts 1 and 2
Course Overview Securing Email with Cisco Email Security Appliance (SESA) combines Parts 1 and 2 (SESA1, SESA2) into a single three day course. Students learn to use Cisco Email Security Appliances (ESA's)
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
TNote125 Student Locator Framework Email Notification Diagnostics
Technical Note 125 September 25, 2006 TNote125 Student Locator Framework Email Notification Diagnostics The Student Locator Agent uses standard Internet email to notify designated administrators when a
DATA COMMUNICATOIN NETWORKING
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach By: Kurose, Ross Introduction Course Overview Basics of Computer Networks Internet
SPAMfighter SMTP Anti Spam Server
SPAMfighter SMTP Anti Spam Server Users Manual Copyright SPAMfighter ApS 2005 Revised 4/27/2006 1 Table of Contents 2 Terminology...3 3 Technology...4 3.1 Tunneling and Interception...4 3.2 Content Classification...5
9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
Use Domain Name System and IP Version 6
Use Domain Name System and IP Version 6 What You Will Learn The introduction of IP Version 6 (IPv6) into an enterprise environment requires some changes both in the provisioned Domain Name System (DNS)
