IP Reputation Exchange e-mail security research



Similar documents
Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

Serial Deployment Quick Start Guide

eprism Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

How To Configure Forefront Threat Management Gateway (Forefront) For An Server

Overview An Evolution. Improving Trust, Confidence & Safety working together to fight the beast. Microsoft's online safety strategy

Symantec Hosted Mail Security Getting Started Guide

CipherMail Gateway Quick Setup Guide

FortiMail Filtering Course 221-v2.2 Course Overview

Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development

How To Integrate Hosted Security With Office 365 And Microsoft Mail Flow Security With Microsoft Security (Hes)

eprism Security Appliance 6.0 Release Notes What's New in 6.0

Intercept Anti-Spam Quick Start Guide

Eiteasy s Enterprise Filter

SESA Securing with Cisco Security Appliance Parts 1 and 2

Enhanced Spam Defence

Basic Funneling MX Verify and Redundancy. Why Sorting Solutions? Why Vircom?

Comprehensive Anti-Spam Service

MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network

Xerox Multifunction Devices. Network Configuration. Domain 2. Domino Server 2. Notes. MIME to Notes. Port. Domino. Server 1.

Trend Micro Hosted Security Stop Spam. Save Time.

SPAM FILTER Service Data Sheet

ZyWALL USG ZLD 3.0 Support Notes

SPAMINA Service Firewall / Administrator s Manual / 1

Empirical research on IP blacklisting

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

IronPort X1000 Security System

one million mails a day: open source software to deal with it Charly Kühnast Municipal Datacenter for the Lower Rhine Area Moers, Germany

Technical Note. FORTIMAIL Configuration For Enterprise Deployment. Rev 2.1

Migration Project Plan for Cisco Cloud Security

Installing GFI MailEssentials

Technical Note. ISP Protection against BlackListing. FORTIMAIL Deployment for Outbound Spam Filtering. Rev 2.2

PineApp Anti IP Blacklisting

Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011

SonicWALL Security Quick Start Guide. Version 4.6

Antispam Security Best Practices

Configuration Example

FortiMail Filtering Course 221-v2.0. Course Overview. Course Objectives

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam .

ETH Zürich - Mail Filtering Service

Implementing MDaemon as an Security Gateway to Exchange Server

Emergic. A Complete Messaging & Security Suite A COMPLETE MESSAGING AND SECURITY SUITE

The Leading Security Suites

Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server.

Deployment Guide. For the latest version of this document please go to:

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

Anti-Phishing Best Practices for ISPs and Mailbox Providers

Why Spamhaus is Your Best Approach to Fighting Spam

Anti Spam Best Practices

Overview. Accessing the User Interface. Logging In. Resetting your Password

Guardian Digital Secure Mail Suite Quick Start Guide

FILTERING FAQ

Installing Policy Patrol with Lotus Domino

TREND MICRO. InterScan VirusWall 6. SMTP Configuration Guide. Integrated virus and spam protection for your Internet gateway.

Trend Micro, Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Using WinGate 6 . Concepts, Features, and Configurations.

SonicWALL Security Appliance Administrator Guide

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

The Growing Problem of Outbound Spam

Panda Cloud Protection

Solutions IT Ltd Virus and Antispam filtering solutions

From SPAMfighter SMTP Anti Spam Server to SPAMfighter Mail Gateway

English Translation of SecurityGateway for Exchange/SMTP Servers

Collateral Damage. Consequences of Spam and Virus Filtering for the System. Peter Eisentraut 22C3. credativ GmbH.

Trend Micro Hosted Security. Best Practice Guide

No filter is perfect. But with your help, MailCleaner may aim at perfection. Case Description Solution

Reputation Monitor User Guide

An Overview of Spam Blocking Techniques

Feature Comparison Guide

Core Protection Suite


Service Launch Guide (US Customer) SEG Filtering

Copyright 2011 Sophos Ltd. Copyright strictly reserved. These materials are not to be reproduced, either in whole or in part, without permissions.

The Network Box Anti-Spam Solution

Solution Brief FortiMail for Service Providers. Nathalie Rivat

Groundbreaking Technology Redefines Spam Prevention. Analysis of a New High-Accuracy Method for Catching Spam

Frequently Asked Questions

Websense Security Transition Guide

ContentCatcher. Voyant Strategies. Best Practice for Gateway Security and Enterprise-class Spam Filtering

Articles Fighting SPAM in Lotus Domino

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007

Application Firewalls

AVG AntiVirus. How does this benefit you?

Installing GFI MailEssentials

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Premium Filtering MX Verify, Redundancy, Virus & Spam. Why Sorting Solutions? Why Vircom?

Symantec Protection Suite Add-On for Hosted and Web Security

Chapter 3 LAN Configuration

Transcription:

IP Reputation Exchange e-mail security research Prof. Dr. Norbert Pohlmann Institute for Internet Security if(is) University of Applied Sciences Gelsenkirchen http://www.internet-sicherheit.de

Content IP Reputation (general Idea) Current best practice IP Reputation Exchange (Idea, Approach, Results) Summary 2

Anti Spam Technology Model of different levels e-mail e-mail gateway / e-mail proxy Network level (IP-Address) Black lists Reverse MX Frequency analysis SMTP level Check HELO Check sender e-mail address (black-/white-/grey list) Check recipient e-mail address (DB, LDAP) Spam filter Check of header and content level Heuristically e-mail header and content analysis Statistical methods Checksum comparison Virus scan Check e-mail for virus Internal e-mail server 1 2 3 use of resources 3

IP Reputation Idea Combining black und white listing is one of the most efficient anti spam mechanisms However High dependency on black/white list providers Aggregation of the most important black lists => only 19% of advertised IPv4 addresses can be judged concerning e-mail reputation! More IP reputation attributes and IP space are needed! Less dependency on single Provider is also important. 4

IP Reputation The IP map (possible attributes/space) Unknown IPs 0.0.0.0 255.255.255.255? the whole IPv4 address space suspicious IPs (i.e. ( servers hacked Unassigned IPs IPs of known dialup space IPs of all known, legitimate e-mail servers ( MTAs ) 5

IP-Reputation The IP map (attributes/space ( today Unknown IPs 0.0.0.0 255.255.255.255 suspicious IPs (i.e. hacked ( servers Unassigned IPs? IPs of known dialup space IPs of all known, legitimate e-mail servers ( MTAs ) 6

E-mail infrastructure Some figures ( incoming ) Port 25 state analysis German research ISP - DFN (Deutsches Forschungsnetz) 0.08% of all IP addresses respond to a connection attempt on port 25 Every 1250 th IP address is a mail server (open port 25) Challenges (every) open port 25 = SMTP How many different IP addresses belong to one host? (timing measurement problems, honeypots/honeynets, ) 7

E-mail infrastructure Some thoughts Fact: 1.752 billion IPv4 addresses advertised (as of 2007-08) Assumption: 0.08% of all IPv4 addresses speak SMTP (incoming) Result: ~1.4 million IPv4 addresses that speak SMTP (incoming) ~1.4 million legitimate e-mail e servers 8

The main source of spam Dialup IPs Over 90% of all spam originates come from dialup IP addresses (bots) Bots send spam on a large scale to the inbound e-mail servers (MX) of e-mail service providers Smart hosts are omitted PCs get a (dynamic) dialup IP address when connecting to the internet Conclusion Dialup-IPs never send legitimate e-mail to inbound e-mail servers (MX) Blocking dialup IP addresses has no major drawback! 9

Spam from dialup IPs Spam sent directly to MX inbound mail server (MX) ISP 1 incoming e-mail Compromised PC outbound mail server SMTP server (smarthost) Client-PC with dialup IP usual flow of e-mail outbound e-mail inbound mail server (MX) spam sent directly to MX outbound mail server SMTP server (smarthost) Client-PC with dialup IP ISP 2 10

Content IP Reputation (general Idea) Current best practice IP Reputation Exchange (Idea, Approach, Results) Summary 11

Current best practice (1/4) Black & white list E-mail service providers categorize IP addresses (Mail-Gateways) into black and white lists Black list: - Dialup IPs (blocks) - suspicious IPs - SMTP-Reject White list: - IPs of known legitimate MTAs - Unknown IPs Immediate delivery 12

Current best practice (2/4) IP maps of Mail-Gateways Known e-mail gateways IP addresses are based on experience or observation of the ISP landscape Connections from unknown or non-suspicious IP addresses are allowed (e-mails are accepted) An entry on the black list depends on monitored spam activity (user complaints, amount of e-mails, frequency analysis, valid e-mail addresses, etc.) 13

Current best practice (3/4) Combining multiple (black) lists One black list alone blocked 75% Others block less than 75% What is the gain in terms of blocking spam by using multiple lists? 14

Current best practice (4/4) Combining multiple (black) lists Gain in blocking spam using multiple black lists Using a second list blocks +6.5%, a third +6%, a fourth +4.8% Result: Combining multiple black lists makes sense! 15

Potential of IP maps The rate of detected spam mails must be enhanced Spamming IP addresses should be identified much quicker than today A European or even international IP map should be established in order to fight spam in general and for long term Action Exchange of IP maps between ISPs world-wide 16

Content IP Reputation (general Idea) Current best practice IP Reputation Exchange (Idea, Approach, Results) Summary 17

Distributed IP reputation system Idea The distributed IP reputation system consists of a network of participants (Trusted Peer Network), which helps to get describing attributes of IP addresses. Therefore it is based on participants sharing their view on the whole internet, expressed in categorizing IP addresses. The idea of the distributed IP reputation system is to share information held by many different providers (Trusted Peer Partner TPP). Sharing in detail means to pool single IP lists of the participants between other participants and to achieve a most detailed and complete IP list by aggregating this information. The working time of providers would be shared and suspicions about spam sources could be amplified or weakened by other parties. 18

Distributed IP reputation system Self-declaration data / observation ISPs exchange self-declaration information as well as observation regularly. In fact, these are lists of IP addresses with describing attributes (IP reputation). Self-declaration data - IPs of outbound mail servers - Dialup-IPs (blocks) in addition maybe: - Static IPs, Observation - suspicious IPs - IPs of non-maintained mail servers - The self-declaration data may be checked against routing information. What are the advantages to exchange this kind of information? 19

Distributed IP reputation system Interpretation of IP maps (1/2) A B C confirmation Assessing the IP maps results in a confirmation of possible spam sources or reduce own observations (false positives) Shows new potential spam sources news 20

Distributed IP reputation system Interpretation of IP maps (2/2) Incoming self-declaration information as well as observations are aggregated into a composite IP map, with a better reputation of IP addresses. The higher the participation, the better for all users! Aim: (nearly) complete IP map for the whole IP address space. > 95% 21

Types of information Describing attributes Black list - attribute Describes IP addresses to be blocked permanently (i.e. > 1 week) White list - attribute Describes legitimate outbound e-mail servers Valid until withdrawn Spam activity - attribute Short-dated (i.e. less than 1 week) Reasons: unexpected high traffic, high bounce rate Many spam activity statements from several nodes of the network may lead to blocking the IP address in question Dialup - attribute IP address blocks used for dialup Neutralization / Withdrawal Statements can be corrected/withdrawn 22

Example: Distributed IP reputation 3 partner with different trust level 23

Distributed IP reputation system Benefits As a Semi-Closed User Group the IP map is open to all ISPs Even with a small number of participants, a high amount of suspicious IP addresses are detected and thus a quick and effective identification of spam sources is in place. Self-declaration information mitigates the risk of false positives. Every participant is free concerning the use of data (not only to block spam, but also spam over internet telephony (spit)?) Distributed IP reputation system: no central point of failure prevent from misuse by single participants enhances availability of the distributed IP reputation system 24

Content IP Reputation (general Idea) Current best practice IP Reputation Exchange (Idea, Approach, Results) Summary 25

Summary Spam mail is a complex problem of the global internet. The new concept of distributed IP reputation system makes black and white listing robust, trustworthy and manageable will help to reduce the spam problem and prevent from damage What is needed International cooperation will be very effective More Analysis of communication behavior of e-mail senders helps to detect and optimize reputation of IP addresses concerning e-mail Only together we can solve the spam problem! So let us work together Further information: www.if-is.net, www.internet-sicherheit.de (German) 26

IP Reputation Exchange e-mail security research Thank you for your attention! Questions? Prof. Dr. Norbert Pohlmann Institute for Internet Security if(is) University of Applied Sciences Gelsenkirchen http://www.internet-sicherheit.de

Institute for Internet Security e-mail security research topics E-mail security in the context of internet security Survey (German Government, ENISA) Focus on anti spam Current research activities IP reputation system IP black list analysis for e-mail (RBLDNS) Spamtraps Hamtraps Harvesting E-mail infrastructure throughout the internet Applied Antispam next generation research MTA Visualization tools for IPv4 address space 28

Institute for Internet Security Other research topics Internet Early Warning System Internet Analysis System (IAS) Internet Availability System (IVS) Internet Research Log-Data-Analysis, Intrusion Detection, for real time analysis Trusted Computing Turaya (Security Platform based on TPM) Trusted Network Connect (TNC) Other actual topics: VoIP QoS/Security, Mobile Security, 29