Fighting spam by finding and listing Exploitable Servers.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Netiquette and Safety A Student ’ s Guide to Proper and Safe Web Behavior.
Chapter 4 Personal Security
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
UC Irvine’s New Anti-Spam Measures Keith Chong Network & Support Programming Network & Academic Computing Services UC Irvine August 9, 2005 Keith Chong.
1 Understanding Botnet Phenomenon MITP Kevin Lynch, Will Fiedler, Navin Johri, Sam Annor, Alex Roussev.
Bots and Botnets CS-431 Dick Steflik. DDoS ● One of the most common ways to mount a Distributed Denial of Service attacks is done via networks of zombie.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Security Issues: Phishing, Pharming, and Spam
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
MKTG 476 SECURITY Lars Perner, Instructor 1 Internet Security  Servers  Hacking  Publicly available information  Information storage  Intrusion methods.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
A Student’s Guide to Proper and Safe Web Behavior
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Viruses & Destructive Programs
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.
Fighting spam by finding and listing Exploitable Servers.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer viruses are small software programs designed to spread from one computer to another corrupt or delete data on your computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
VENKAT DEEP RAJAN SUMALATHA REDDY KARTHIK INJARAPU CPSC 620 CLEMSON UNIVERSITY.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet security  Definition  Types of internet security  Firewalls  Anti spyware  Buffer overflow attack  Phishing  Summary.
Computer Skills and Applications Computer Security.
Ethics Unit 1. What does ethical mean? Following rules or doing the right thing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Risks Computing Science.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Security Issues & Ethics in Education By Maud Mushayamunda.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
28th March 2003 SPAM Presenter: Matthew Sullivan.
Technical Implementation: Security Risks
A Student’s Guide to Proper and Safe Web Behavior
Securing Information Systems
‘e-Safety’ and it’s importance
how to prevent them from being successful
Learn how to protect yourself against common attacks
Securing Information Systems
How to Protect your Identity Online PIYUSH HARSH
Protecting Yourself Keeping Your Secrets Secret November 11, 2004
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Fire-wall.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Communicating in the IT Industry
INTERNET SECURITY.
Phishing, Pharming, and Spam
Presentation transcript:

Fighting spam by finding and listing Exploitable Servers.

What is spam…? Why is it a problem…? Why is it a problem…? Where do viruses fit in…? Where do viruses fit in…? Spyware, what is it what does it do…? Spyware, what is it what does it do…? “Phishing”, what is it…? “Phishing”, what is it…? The merging of technologies. The merging of technologies. The new attack vector. The new attack vector. What can be done…? What can be done…?

Fighting spam by finding and listing Exploitable Servers. Unsolicited Bulk …? Unsolicited Commercial …? Unsolicited Commercial …? Unsolicited Promotional …? Unsolicited Promotional …? Not what we’re sending…? Not what we’re sending…? Unsolicited …? Unsolicited …? Objectionable …? Objectionable …? What the ACA tells us is spam…? What the ACA tells us is spam…?

Fighting spam by finding and listing Exploitable Servers.

All of the above….! Each message is spam in it’s own right. Each message is spam in it’s own right. Each poses it’s own dangers. Each poses it’s own dangers. We should be working to stop them all. We should be working to stop them all.

Fighting spam by finding and listing Exploitable Servers. Open Relays Proxy Servers Proxy Servers Spam “Bots” Spam “Bots” DoS “Bots” DoS “Bots” More sinister directions... More sinister directions... Spyware Spyware Key-loggers Key-loggers

Fighting spam by finding and listing Exploitable Servers. Open Relays, are they really a problem…? How about proxy servers….? How about proxy servers….? The risks: The risks: Open relays are diminished in numbers. Open relays are diminished in numbers. Proxies work both ways. Proxies work both ways. Proxy servers being delivered in spam. Proxy servers being delivered in spam.

Fighting spam by finding and listing Exploitable Servers. Tracking movements across the Net Tracking movements across the Net Demographics Demographics Parental Control Software Parental Control Software Surveillance Surveillance Key-logging Key-logging Complete user tracking Complete user tracking How can we get rid of it…? How can we get rid of it…?

Fighting spam by finding and listing Exploitable Servers. (fish´ing) (n.) The act of sending an to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. How do we combat it…? How do we combat it…? What can we do when we get caught...? What can we do when we get caught...? How can we prevent it…? How can we prevent it…?

Fighting spam by finding and listing Exploitable Servers. viruses combining with exploits. viruses combining with exploits. Newer Trojans that avoid system calls to “hide”. Newer Trojans that avoid system calls to “hide”. Newer ones allow remote upload of software. Newer ones allow remote upload of software. Continually changing ports to avoid detection. Continually changing ports to avoid detection. Calling home, or using IRC servers. Calling home, or using IRC servers.

Fighting spam by finding and listing Exploitable Servers. Open Relays Open Relays Open Proxies Open Proxies Trojans Trojans Viruses Viruses Spyware Spyware What’s this all leading to….? What’s this all leading to….? Spam, Spam, Spam, and more Spam...! Spam, Spam, Spam, and more Spam...! So what is the new attack vector…? So what is the new attack vector…?

Fighting spam by finding and listing Exploitable Servers.

AHBLThe Abusive Hosts Blocking ListHits: % BOGONScompletewhois.com: Bogon IP'sHits: 1441% BOPMBlitzed Open Proxy MonitorHits: 5106% CBLComposite Blocking ListHits: % DRBLDistributed Realtime Blocking ListHits: % DSBLDistributed Server Boycott ListHits: % FIVETENLocal Blackholes at Five-TenHits: % JIPPGMAJIPPG's Relay Blackhole ListHits: 1421% NJABLNot Just Another Bogus ListHits: % NOMOREdr. Jørgen Mash's DNSblHits: 3383% ORDBOpen Relay DataBaseHits: 1670% PSBLPassive Spam Block ListHits: 11619% SBLSpamhaus Block ListHits: 6986% SORBSSpam and Open Relay Blocking SystemHits: % SPAMBAGSpambagsHits: % SPAMCOPSpamCopHits: % SPAMRBLHits: 90% SPAMSITESpamware Peddler and SpamservicesHits: 50% SPEWSSpam Prevention Early Warning SystemHits: % UCEPROTHits: 8808% WPBLWeighted Private Block ListHits: 7787% Which shows statistics mean nothing!

Fighting spam by finding and listing Exploitable Servers.