Presentation is loading. Please wait.

Presentation is loading. Please wait.

Random Driver Corporate Spam Defense Gilles Bouyer Oleg Kipnis Hang Li Samar Patel Ashwin Shanmugasundaram.

Similar presentations

Presentation on theme: "Random Driver Corporate Spam Defense Gilles Bouyer Oleg Kipnis Hang Li Samar Patel Ashwin Shanmugasundaram."— Presentation transcript:

1 Random Driver Corporate Spam Defense Gilles Bouyer Oleg Kipnis Hang Li Samar Patel Ashwin Shanmugasundaram

2 Random Driver 2 Agenda Solutions Appliances – Server Side Software  Pros and Cons Cloud Based Solution  Pros and Cons End User Software  Pros and Cons Methods used Legal and Other Solutions  Pros and Cons Proposed solution Strength/ Weaknesses Cost / Implementation Conclusion - Questions

3 Random Driver 3 Problem Statement Most enterprise users are exposed to spam, which means they are exposed to more threats. Spam is an issue affecting all industrial sectors, government and education. While missing an due to a false positive when it comes to personal use might not seem like a big deal, it is important for the enterprise to be cautious on optimizing communication to reach better business results. SPAM is an attack on authenticity with the following characteristics: 70.7% of all traffic is Spam 2.3% of all s contain malicious attachments 1.8% – 3% of spam makes it through spam filters Only 1 in 25,000 spam needs to be opened to be profitable for spammers Costs 20 billion dollars annually We will review the defense mechanisms and recommend a solution to this problem.

4 Random Driver 4 Anti Spam Appliances Anti-spam appliances are hardware-based solutions integrated with on-board anti-spam software and are normally driven by an operating system optimized for spam filtering They are deployed at the gateway or in front of the mail server Appliances provide a solution that does not require configuration of the existing mail server, and can be more effective and of higher performance than a software solution installed on the mail server Examples: Barracuda, SpamTitan, Fortinet, Cisco Ironport How does Barracuda work? 1.All incoming mail is screened according to the rules of the Barracuda device and by the rules that are manually created 2.Non spam messages will go directly to inbox folder 3.Messages that are suspected as being spam are informed by a Spam Quarantine

5 Random Driver 5 Server Side Software Anti-spam software is either installed on the mail server itself or in front of mail server. The purpose of this software is to remove the burden of filtering from the server. Examples: Bogofilter- Used by a MTA to classify messages as they are received from the sending SMTP server. Bogofilter examines tokens in the message body and header to calculate a probability score that a new message is spam SpamAssassin- It can be run as a standalone application on server or as a subprogram of another application MailwasherEnterprise- It works as a proxy, sits in front of mail server blocking and denying spam from getting to mail server and users POPFile- Typically it is used to filter spam mail. It can also be used to sort mail into other user defined "buckets" or categories

6 Random Driver 6 PROs and CONs High reliability that works out of the box Operating system and application software is pre-loaded and configured Stable OS guarantees less downtime Updates itself automatically with no user intervention PROs CONs Antispam Appliances Upfront costs If the hardware fails, it requires a warranty or an upfront cost to fix/replace Server Side Software Customized filters which can be personalized according to individual user requirement Whitelisting capabilities Quarantines spam mails which are kept for a certain duration PROs CONs Difficult to install Software updates can cause compatibility issues with other software on the system Requires updating the server OS with the latest patches

7 Random Driver 7 Cloud based Solutions Anti Spam Cloud based solutions enable to filter on content and authenticity outside the LAN and provide only legitimate s to the organization. Sample of Providers: eluna $49/year McAffee SaaS and Web security Message Labs Sophos Untangle Google Apps Example of incoming mail:

8 Random Driver 8 PROs and CONs Does not slow down or interfere with program on workstation No need to update virus definition Temporary store mail if LAN issues Built in white / gray / black lists Subscription based (# $30/user/year) Security of the cloud PROs CONs

9 Random Driver 9 End User Software Clients – Most Clients have built in basic spam filter Outlook uses Whitelists/Blacklists and Word Blocking Add-ons to Clients – Add more powerful spam filtering to Clients Spam Reader - Uses Bayesian filtering and Whitelist/Blacklist Vircom - Uses Bayesian filtering Stand Alone Software – Works with clients and web mail Spamhilataor– Uses combination of Word Blocking, Bayesian filtering and user defined lists Mailwasher – Uses combination of Word Blocking, Bayesian filtering and user defined lists

10 Random Driver 10 Pros and Cons Filters can easily be customized for individual user Fewer false positives Blocked and filtered still reaches the mail server Difficult for admins to configure for each user Scalability Pros Cons

11 Random Driver 11 Methods Outbound filters using Transparent SMTP proxy SMTP Proxies are inserted between sending mail servers on a local network, and the receiving servers on the Internet in order to filter outgoing spam DNS based Blacklists Servers maintain a list of IP addresses of via the DNS to reject from those sources Checksum based filtering Spam messages sent in bulk are identical except for few changes in content. Checksum based filters determine checksum and compare with database which stores checksum values of spam messages Statistical content filtering (Bayesian Filtering) Users mark messages as spam or non-spam and the filter learns from user judgments Pattern Detection Monitors a large database of messages worldwide to detect spam patterns

12 Random Driver 12 Methods Honey Pots MTA which gives the appearance of being an open mail relay, or a TCP/IP proxy server which gives the appearance of being an open proxy is setup to detect spammers who probe systems for open relays/proxies Authentication and reputation Allow from servers that have been authenticated as senders of legitimate Domain-based Message Authentication, Reporting and Conformance (DMARC) A DMARC policy allows a sender to indicate that their s are protected by SPF and/or DKIM, and tells a receiver what to do if neither of those authentication methods passes SPF DKIM

13 Random Driver 13 Sender Policy Framework Sender Policy Framework (SPF): an anti-spam approach in which the Internet domain of an sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their .

14 Random Driver 14 DomainKeys Identified Mail DKIM is a specification for cryptographically signing messages. A signing domain (eg: Gmail) claims responsibility for the by adding a DKIM-Signature header field to message’s header. The verifier recovers the signer's public key using the DNS, and then verifies that the signature matches the actual message's content. The receiving SMTP server uses the domain name and the selector to perform a DNS lookup.

15 Random Driver 15 DKIM workflow

16 Random Driver 16 Other Current Solutions End user actions Whitelisting : Reject everything except the addresses accepted one by one Spam Poisoning: Restrict the distribution of one’s address to only trusted parties, effectively hiding from spammer. (eg. Collaborative filtering: detect messages being sent to large number of recipients Ideas under consideration: Micropayment: Charging 1cent per sent. If answer remove the charge. Internet Mail 2000: “Internet 2000” mail messages are stored by the sender. The receiver is pulling his(her) message from the sender server.

17 Random Driver 17 Existing SPAM legislations: CountryLegislation ArgentinaPersonal Data Protection Act (2000) AustraliaSpam Act 2003 AustriaAustrian Telecommunications Act 1997 BelgiumLoi du 11 mars 2003 Canada Personal Information Protection and Electronic Documents Act 2000 (PIPEDA) Canada Fighting Internet and Wireless Spam Act 2010 ChinaRegulations on Internet Services - Death penalty risked by spammers CyprusRegulation of Electronic Communications and Postal Services Law of 2004 Czech RepublicAct No. 480/2004 Coll., on Certain Information Society Services DenmarkDanish marketing practices act European UnionDirective on Privacy and Electronic Communications FinlandAct on Data Protection in Electronic Communications (516/2004) FranceLoi informatique et libertee Jan GermanyGesetz gegen Unlauteren Wettbewerb (UWG) ("Act against Unfair Competition") Hong KongUnsolicited Electronic Messaging Ordinance HungaryAct CVIII of 2001 on Electronic Commerce IndonesiaUndang-undang Informasi dan Transaksi Elektronic (ITE) (Internet Law) IrelandEuropean Communities (Electronic Communications Networks and Services) (Data Protection and Privacy) Regulations 2003 IsraelCommunications Law (Telecommunications and Broadcasting), 1982 (Amendment 2008) ItalyData Protection Code (Legislative Decree no. 196/2003) JapanThe Law on Regulation of Transmission of Specified Electronic Mail MalaysiaCommunications and Multimedia Act 1998 MaltaData Protection Act (CAP 440) NetherlandsDutch Telecommunications Act New ZealandUnsolicited Electronic Messages Act 2007 PakistanPrevention of Electronic Crimes Ordinance 2007 SingaporeSpam Control Act 2007 South AfricaElectronic Communications and Transactions Act, 2002 South AfricaConsumer Protection Act, 2008 South KoreaAct on Promotion of Information and Communication and Communications Network Utilization and Information Protection of SpainAct 34/2002 of 11 July on Information Society Services and Electronic Commerce SwedenMarknadsföringslagen (1995:450) Swedish Marketing Act United KingdomPrivacy and Electronic Communications (EC Directive) Regulations 2003 United StatesControlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 (CAN-SPAM Act of 2003) NoneBrazil, India, Mexico, Russia

18 Random Driver 18 Examples of penalties UK Nov 2012 Christopher Niebel and Gary McNeish fined $700,000 sending million SMS Netherlands Oct 2012 Companeo fined 100,000 €, 15 Million between 2009 and 2011 without the consent of the recipients %E2%82%AC-damende-pour-lenvoi- de-spams %E2%82%AC-damende-pour-lenvoi- de-spams France One man fined 22,000 € 1 Million SPAMs. +1,000 € per new SPAM. CASL: Canada Anti Spam Legislation Value Click has settled charges today with the Federal Trade Commission, netting the FTC $2.9 million in civil penalties. Failure to disclose that users must first sign up for other offers (ones that cost them money) before collecting the prize. [9:26:06 PM] Samar Patel: Australian Communication and Media Authority: Spam Act regulates the sending of commercial electronic messages (CEMs) and prohibits the sending of these messages except in certain limited circumstances. , MMS, SMS. Oct 9 th 2013: Grays has become the latest online retailer to get caught ing people without providing an unsubscribe button, and the company has paid AU$165,000 for the mistake. Russia: The biggest spammer was found dead in his apartment.

19 Random Driver 19 PROs and CONs Several Countries have legislation Organization are being fined Majority of the countries do not have legislation Fines against individuals rarely work. Either too high or too low Lack of identification Hard to have legislation keep up with technology Legislators are not tech savvy PROs CONs

20 Random Driver 20 Proposed Solution

21 Random Driver 21 Proposed Solution Gmail Spam filter Gmail spam filters use combination of statistical filtering, content filtering and authentication methods like SPF and DKIM to filter spam Users can train system by marking as spam or not spam Administrators can set up whitelists/graylists/blacklists Scans all attachments for viruses before reaching the user Less than 1% of in the inbox reported as spam (average is between 1.8% and 3%) Less than 1% of falsely marked as spam

22 Random Driver 22 Cost & Implementation. Cost - $50/user/year Includes other services and not just spam protection Implementation - Feasibility Easy to migrate from Exchange server Users can continue using current client like outlook or use web mail Can be implemented in 90 days for large enterprise(>750 users), in 4 weeks for medium businesses and within 1 hour for a small business Statistics: Gmai l has no more than 1% of the enterprise market, but it has close to 50% of the market for enterprise cloud (2011 Gartner) 39% of small companies <50p use Gmail 20% of large companies use Gmail

23 Random Driver 23 Strength and Weaknesses Uses multiple techniques to block spam includes DMARC Google acquired Postini (2007) that made them superior. Less than 1% spam (Avg. 1.8% - 3%) Google Apps is better suited for heterogeneous environments Easy to implement Automatic updated and easy to configure by users and administrators Includes complete productivity suites in the cost of subscription Trusting data to cloud provider Legal concern over privacy of data Expensive if only looking for anti spam solution and not any other functionality Solution is as good as the capacity of Spammer to find a new exploit STRENGTHS WEAKNESSES

24 Random Driver 24 Adopters

25 Random Driver 25 Conclusion - Questions While there are no perfect solutions to stop all SPAM, the protection mechanisms can be very efficient. This does not solve the generation of 70% traffic that weight on the internet. The impetus for change is likely to be given by governments requesting ISP to find solutions. Once ISP find the value of non spam network and avoid the inherent threats posed by these messages, they will seriously work on the issue and find solution.

26 Random Driver 26 Backup Slides Additional Material

27 Random Driver 27 Sender Policy Framework.

28 Random Driver 28 SPAM

29 Random Driver 29 accounts and Traffic – Current and Projection

Download ppt "Random Driver Corporate Spam Defense Gilles Bouyer Oleg Kipnis Hang Li Samar Patel Ashwin Shanmugasundaram."

Similar presentations

Ads by Google