Anti-Spam Initiatives in China

Similar documents
China s Anti-Spam Works

The Japanese Experience Countering Spam ITU TELECOM WORLD 2006

Draft WGIG Issues Paper on Spam

Software Engineering 4C03 SPAM

Policies and Practices on Network Security of MIIT

Before the House Committee on the Judiciary Subcommittee on Crime, Terrorism, and Homeland Security United States House of Representatives

Why Spamhaus is Your Best Approach to Fighting Spam

Lith Networking and Network Marketing Safety

ITU WSIS Thematic Meeting on Countering Spam: The Scope of the problem. Mark Sunner, Chief Technical Officer MessageLabs

The global challenge

How To Stop Spam

The Growing Problem of Outbound Spam

Security and control: The smarter approach to malware and compliance

Pacific Islands Telecommunications Association

Welcome! Best Current Practices on spam prevention

SPAM: 101 Cause and Effect

Information Security Summit 2005

Protecting your business from spam

ITU Cybersecurity Work Programme to Assist Developing Countries

Advisory on Utilization of Whois Data For Phishing Site Take Down March 2008

OIS. Update on the anti spam system at CERN. Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010

Before the Congressional-Executive Commission on China Hearing on Google and Internet Control in China: A Nexus Between Human Rights and Trade?

Top tips for improved network security

Monitoring the Abuse of Open Proxies for Sending Spam

BoxSentry. Secure your with no false positives. RealMail. Patent Pending

How To Run A Realtime Blackhole List (Rbl) In Hkong Kong Ken Kong

Use of Honeypots for Network Monitoring and Situational Awareness

Who will win the battle - Spammers or Service Providers?

Ipswitch IMail Server with Integrated Technology

Japan s Countermeasures against Spam

PineApp Anti IP Blacklisting

How CNCERT/CC fighting to Botnets. Dr.Mingqi CHEN CNCERT/CC March 31, Beijing

Cyber Security Threats and Countermeasures

The FBI and the Internet

eprism Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

Using big data analytics to identify malicious content: a case study on spam s

The Role of Country-based Filtering In Spam Reduction

Domain Name Abuse Detection. Liming Wang

M 3 AAWG: Hosting Past, Present & Future

Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server.

The spam economy: the convergent spam and virus threats

SPAM AND PRIVACY ISSUES. Spam for Breakfast, Lunch and Dinner: What will the Unsolicited Electronic Messages Bill do for Privacy?

A Multistakeholder Effort to Reduce Spam The Case of Brazil

How to Stop Spam s and Bounces

Emerging Trends in Fighting Spam

White Paper X-Spam for Exchange Server

Global Network Pandemic The Silent Threat Darren Grabowski, Manager NTT America Global IP Network Security & Abuse Team

Fighting spam in Australia. A consumer guide

GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

Anti Spam Best Practices

GFI Product Comparison. GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange

Promoting Network Security (A Service Provider Perspective)

Cybersecurity and Incident Response Initiatives: Brazil and Americas

Top 40 Marketing Terms You Should Know

Recurrent Patterns Detection Technology. White Paper

Executive Director Centre for Cyber Victim Counselling /

Fraud and Abuse Policy

CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12. CentralNic. Version 1.0. July 31,

Transactional Behaviour Based Spam Detection

Law Enforcement Recommendations Regarding Amendments to the Registrar Accreditation Agreement

CYBERSECURITY INESTIGATION AND ANALYSIS

Attachment spam the latest trend

Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity

GFI Product Comparison. GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.0

NETWORK RESOURCE THEFT PREVENTION Destroying the Economics of Spam

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Panda Cloud Protection

SpamPots Project: Using Honeypots to Measure the Abuse of End-User Machines to Send Spam

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007

Anti-Spam Technical Alliance Technology and Policy Proposal

100% Malware-Free A Guaranteed Approach

Preventing your Network from Being Abused by Spammers

Spam and the Ethics of An3spam measures

Phoenix Information Technology Services. Julio Cardenas

Cisco Security Intelligence Operations

Overview of Mexico s Legislation to Combating Spam

Information Gathering Using Domain Name Registration Records. David M Piscitello

STOPPING SPAM CREATING A STRONGER, SAFER INTERNET

SCORECARD MARKETING. Find Out How Much You Are Really Getting Out of Your Marketing

Anti-SPAM Policy v

white paper Glossary of Spam Terms The jargon of the spam industry

Spampots Project Mapping the Abuse of Internet Infrastructure by Spammers

MEMORANDUM. Characterisation of actions to combat spam. Analysis of responses to questionnaire

Address-based Content Blocking: An Introduction

Dealing with spam mail

ICANN- INTERNET CORPORATION OF ASSIGNED NAMES & NUMBERS

2016 OCR AUDIT E-BOOK

Public-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA

ANTI-SPAM FRAMEWORK OF BEST PRACTICES AND TECHNICAL GUIDELINES

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

Australia s proposed accession to the Council of Europe Convention on Cybercrime

GFI Product Manual. Administration and Configuration Manual

CSC Essay 5: Outline

Internet investment scams in China

Spampots Project First Results of the International Phase and its Regional Utilization

WHITE PAPER Uncovering the Hidden Costs of Spam in the Enterprise: Traffic Shaping Joins the Fight Against Spam

GET THE MESSAGE? Best Practices in Marketing

This policy has been prepared to assist the reporting process and does not modify and/or amend our Terms of Service.

Transcription:

Anti-Spam Initiatives in China ITU WSIS Thematic Meeting on Cybersecurity Geneva,Switzerland 28 June-2 July 2005 Liang Liu Anti-Spam Coordination Team Internet Society of China

Spam evolution in China Internet users reached 100 million, with 45 million broadband users. More than 85% Chinese Internet users use e-mail service frequently. Mailboxes with frequent use have exceeded 300 million. The percentage of spam received by Chinese users has decreased from 65.7% to 60.9% (Aug 2004 ~ Apr 2005). Spam received each week the first half year has reduced from 27.8 to 16.8 on same period 2004. Among spam received 22.8% is e-mail phishing attacks.

Spam complaints Computer and network security issues: Hacker attack Viruses Zombie army and Botnet Open relays and open proxies Offshore hosting of spammers with collaboration of local spammers. Insufficiently trained support staff. Beneficiary s e-mail accounts. Absence of reverse DNS. Inaccurate Whois records.

Blocklists paint a worsening situation? China is lack of IP resource, so many businesses and consumers have to share limited availability of IP space. Large-scale block is a much more serious problem: Block huge chunks of Chinese IP space, or even block entire Chinese ISPs. One IP block might be blocked due to only a single IP address sending spam. Only Nov 2004 to Apr 2005, 751 Chinese IP blocks were listed in SBL. Extremist block causes: The detriment of the free and open flow of e-mail messaging and internet communications. Lots of innocent Chinese businesses and consumers to be the real victims of blocklist.

Bridge Blocklist Gap Blocklist providers fail to get responses from Chinese ISPs. Lack of capacity and resource to handle complaints, such as standard operating procedure, trained support staff. Difficult to respond spam complaints in English promptly for non- English countries. Unfamiliar with Internet protocol standards and conventions. Chinese ISPs sent removal requests to blocklist providers, but Contact information is difficult to find or unavailable. Blocklist database is kept updated slowly or never. No responses to any requests. Discuss the formulation of effective, efficient and fair international protocol standard on blocklist to avoid innocent block and promote responses to complaints promptly.

Legislation and Regulation Support the adoption of legislation against spam: Pay close attention to best efforts of anti-spam legislation and enforcement in other counties. Improve the existing legal framework. Establish anti-spam legislation. An anti-spam regulation drafted by Ministry of Information Industry (MII) is being discussed currently. Prohibits sending e-mail with false or materially misleading information. Prohibits relaying e-mail without authorization. Prohibits gathering e-mail addresses illegally. MII has implemented anti-spam legislation recently.

About the ASCT Anti-Spam Coordination Team (ASCT) of Internet Society of China (ISC) is a collaborative effort among 51leading ISPs, network providers, and technology providers to work together: Promote technology and non-technology solutions to protect Internet users from spam. Coordinate the operation of e-mail messaging and Internet communications. Composed of 4 sectors:technology development sector, standardization sector, legislation and regulation sector and international cooperation sector. Founded in 2002, it is a specialized agency of ISC.

ASCT activities Formulate Standards for Web-based Public e-mail Service. Promote Chinese ISPs to close open relays and open proxies. Educate the public on how to fight spam and on-line fraud. Launch 4th Anti-Spam Online Survey based on survey responses from 50,000 Internet users. Organize International communicating activities for best practices. Train system and network administrators in security and spam handling. Establish blocklist and whitelist mechanisms. Work with government entities and consumer protection groups to promote a public policy environment against spam and on-line fraud.

International Cooperation ASCT is in favor of setting up International coordination and cooperation. International response:itu,oecd,apcause,ftc,iia,iak,iaj,lap. MoUs on International cooperation developed. ebay, Microsoft, TimeWarner and Yahoo!. Internet Industry Association (Australia). Seoul-Melbourne multilateral MoU on cooperation in countering spam. Continue to champion international framework: Discuss the development of effective technology solutions. Build up communicating and coordinating mechanism. Facilitate free and open e-mail messaging and Internet communications between Chinese ISPs and their peers in other countries.

Chinese ISPs focus on efforts Integrate resources of local branches for higher efficiency and better coordinated policies to combat spam. Adopt best practices around the world. Set up Abuse Desk Staff and standard operating procedure. Update Whois records. Implement reverse DNS. Train system and network administrators. Improve consumer education and awareness. Promote contacts and communications with blocklist providers.

Conclusion Facilitate the development of best practices in developing countries. Formulate effective, efficient and fair of international protocol standards focusing on public e-mail service and blocklist. Establish a worldwide monitoring and reporting systems for spam and network abuse. Strengthen international cooperation and coordination to crack down offshore hosting of spammers, network abusers and phishing attacks. Put countering spam in international framework on Internet governance promptly.