A Collaborative Approach to Anti-Spam



Similar documents
Managing Junk Mail. About the Junk Mail Filter

eprism Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

About this documentation

Savita Teli 1, Santoshkumar Biradar 2

ModusMail Software Instructions.

Intercept Anti-Spam Quick Start Guide

Webmail Friends & Exceptions Guide

Barracuda Security Service User Guide

Introduction. How does filtering work? What is the Quarantine? What is an End User Digest?

Managing Junk Folder in Outlook This document contains instructions for users on how to manage spam filters in Microsoft Outlook 2010.

A Content based Spam Filtering Using Optical Back Propagation Technique

Purchase College Barracuda Anti-Spam Firewall User s Guide

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Security

PROOFPOINT - SPAM FILTER

MXSweep Hosted Protection

Setting up Junk Filters By Louise Ryan, NW District IT Expert

Botnet Detection by Abnormal IRC Traffic Analysis

Why Content Filters Can t Eradicate spam

SPAM FILTER Service Data Sheet

Quarantine Central for end users: FAQs

How To Filter From A Spam Filter

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

Powerful and reliable virus and spam protection for your GMS installation

Microsoft Outlook 2010 contains a Junk Filter designed to reduce unwanted messages in your

. Electronic mail, or , is the most frequently used service on the Internet. Seema Sirpal Delhi University Computer Centre

How to Add HealthCentral to Your Safe Senders List

Handling Unsolicited Commercial (UCE) or spam using Microsoft Outlook at Staffordshire University

Barracuda Spam Firewall User s Guide

Software Engineering 4C03 SPAM

AntiSpam QuickStart Guide

SECURITY S INSIDER SECRETS

How to keep spam off your network

Spam Filtering using Naïve Bayesian Classification

Anti Spamming Techniques

Quick Start Policy Patrol Mail Security 10

A MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM FILTERING 1 2

The Guardian Digital Control and Policy Enforcement Center

USER S MANUAL Cloud Firewall Cloud & Web Security

Spam Detection Using Customized SimHash Function

Commtouch RPD Technology. Network Based Protection Against -Borne Threats

How to Use Red Condor Spam Filtering

Content Filters A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008

What makes Panda Cloud Protection different? Is it secure? How messages are classified... 5

REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS

GUIDEWIRE. Introduction to Using WebMail. macrobatix. Learn how to: august 2008

Panda Cloud Protection

Setting up Microsoft Outlook to reject unsolicited (UCE or Spam )

Sender and Receiver Addresses as Cues for Anti-Spam Filtering Chih-Chien Wang

Anti-Phishing Best Practices for ISPs and Mailbox Providers

Who will win the battle - Spammers or Service Providers?

Visendo Suite a reliable solution for SMBs

Preventing your Network from Being Abused by Spammers

Scan Sequence and Action in Microsoft Forefront Protection 2010 for Exchange Server

How To Report Spam On An Ipo For A County

Ipswitch IMail Server with Integrated Technology

Bayesian Spam Filtering

Early 1990s Steve Case and AOL

Chapter 6: ScanMail emanager

Oakland County Webmail Anti-Spam Setup

Recurrent Patterns Detection Technology. White Paper


Spam Filtering Sophos

Trend Micro Hosted Security Stop Spam. Save Time.

An Efficient Spam Filtering Techniques for Account

COAT : Collaborative Outgoing Anti-Spam Technique

How To Send From A Netbook To A Spam Box On A Pc Or Mac Or Mac (For A Mac) On A Mac Or Ipo (For An Ipo) On An Ipot Or Ipot (For Mac) (For

Anglia IT Solutions Managed Anti-SPAM

GFI Mail Essentials for Exchange/SMTP

A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering

SPAM-What To Do SUMMERSET COMPUTER CLUB

Thexyz Premium Webmail

Mod 08: Exchange Online FOPE

A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior

Typical spam characteristics

BULLGUARD SPAMFILTER

GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall

Junk Filtering System. User Manual. Copyright Corvigo, Inc All Rights Reserved Rev. C

Solutions IT Ltd Virus and Antispam filtering solutions

Using Your New Webmail

Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002

Spam filtering. Peter Likarish Based on slides by EJ Jung 11/03/10

Understanding Junk filtering & Anti-Spam controls

Quick Start Policy Patrol Spam Filter 9

Anti-Spam Filter Based on Naïve Bayes, SVM, and KNN model

Filtering for Spam: Macintosh

Antispam Evaluation Guide. White Paper

Spam Filter Message Center. User Guide

ITS Spam Filtering Service Quick Guide 2: Using the Quarantine

Pattern-based Messaging Security for Hosting Providers

Achieve more with less

How to keep spam off your network

Proofpoint Anti-SPAM Quarantine System

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

Network Services. SMTP, Internet Message Format. Johann Oberleitner SS 2006

WEB QUARANTINE USER GUIDE VERSION 4.3

What browsers can I use to view my mail?

How to Manage Spam and Junk

EnterGroup offers multiple spam fighting technologies so that you can pick and choose one or more that are right for you.

Transcription:

A Collaborative Approach to Anti-Spam Chia-Mei Chen National Sun Yat-Sen University TWCERT/CC, Taiwan Agenda Introduction Proposed Approach System Demonstration Experiments Conclusion 1

Problems of Spam Mail Commercial Spam Reduce productivity waste network bandwidth and increase processing load of mail servers Spam mail may include pornography messages Problems of Spam Mail (2) Malicious Spam Virus Spam Worm Spam Rootkit Spam Backdoor Spam Botnet Phishing 2

Spam Filter Most Spam filter is standalone Filtering out spam mails based on mail header and keywords The most important problem of standalone spam filter is the content of unsolicited messages evolve and may change time by time a standalone mail filter might not be able to fast enough to catch up all new types of spam mails Collaborative Anti-spam Framework 3

Proposed System Spam rule generation Spam rule exchange Spam rule evolution System Architecture 4

Spam Rule Generation Using machine learning or statistic approach to generate exchangeable spam rules Decision tree Rough set Bayesian a Using header information, keyword frequency and format information as feature Selected Attributes Attributes Description From The sender'ss name and email address. Reply to If this mail specifies an address for replies to go to CC If this mail has carbon copy Received It means where the message originated and what route it took to get to you. Subject The subject of this mail. Body The content of this mail. Length The length (byte) of this mail Domain The domain name of sender s mail server Multi part Does this mail be multi part? Text/Html The format of the content of mail. Hasform Does this mail have form? Table Does the content of mail have tables Rec_number The number of keyword in the mail Encoding The encoding of this mail 5

Rule Exchange Spam Rule Evolution R ii :the reward S i :the strength of rule i S i can be viewed as rule quality Si + Rii Si = β Si, 0 < β < 1 R ii Rii = R ii if rule i is used if rule i is not used if classify correctly if classify incorrectly 6

System Demonstration User Interface (mail client) Open web mail Rule Generate Rosetta Mail Pre-Process and Filter Procmail Rule Exchange XML Files Mail and Rule Repository MySQL Database User Interface (Inbox) Legitimate mail Feedback 7

User Interface (Spam folder ) Feedback Spam mail Rule Generation (Rosetta) 8

Mail Repository Performance Evaluation Performance Metrics Training and testing data source Experiment results 9

Performance Metrics Spam precision spam recall accuracy Miss rate Data Source TWCERT/CC MIS Department NSYSU University Spam mails 3,483 3,115 17,948 Legitimate mails 809 531 991 Totals 4,294 3,646 18,939 Data are gathered from 2006/5/10 to 2006/5/30 10

Experiment Result- Spam Precision 100.0% 99.5% 99.0% 98.5% 98.0% 97.5% 10 May 20 May 30 May Rule A Rule A Rule B Rule A Rule B Rule C 10-May 20-May 30-May Rule A 99.8947368% 98.7804878% 99.2448759% Rule A Rule B 98.7538491% 98.7912088% 99.3690852% Rule A Rule B Rule C 98.7551867% 98.7978142% 99.4780793% Experiment Result- Spam Recall 100.0% 99.5% 99.0% 98.5% 98.0% 97.5% 97.0% 96.5% 96.0% 10 May 20 May 30 May Rule A Rule A Rule B Rule A Rule B Rule C 10-May 20-May 30-May Rule A 99.1640535% 96.8478261% 96.1423221% Rule A Rule B 99.3730408% 97.7173913% 98.4831461% Rule A Rule B Rule C 99.4775340% 98.2608696% 99.2322097% 11

Experiment Result- Miss Rate 16.00% 14.00% 12.00% 10.00% 8.00% 6.00% 4.00% 2.00% 0.00% 10 May 20 May 30 May Rule A Rule A Rule B Rule A Rule B Rule C 10-May 20-May 30-May Rule A 0.7656757% 12.7906977% 9.3333333% Rule A Rule B 8.1081081% 12.7906977% 8.0000000% Rule A Rule B Rule C 8.1081081% 12.7906977% 6.6666667% Experiment Result- Accuracy 99.5% 99.0% 98.5% 98.0% 97.5% 97.0% 96.5% 96.0% 95.5% 95.0% 10 May 20 May 30 May Rule A Rule A Rule B Rule A Rule B Rule C 10-May 20-May 30-May Rule A 99.1855204% 96.0238569% 96.4391951% Rule A Rule B 98.3710407% 96.8190855% 98.8713911% Rule A Rule B Rule C 98.4615385% 97.3161034% 99.5013123% 12

Conclusion Due to rule exchange and evolution, collaborative approach is better than standalone server Collaborative approach can extend to hierarchical architecture Some powerful server generate and exchange spam rules and spam rules can be transmitted to other powerless server In future study, spam rules can be generated by different rule-based approach and an integrated scheme will be developed Q&A Thank You!! 13