UC Irvine’s New Anti-Spam Measures Keith Chong Network & Support Programming Network & Academic Computing Services UC Irvine August 9, 2005 Keith Chong.

Slides:



Advertisements
Similar presentations
Example policy elements and their role in bandwidth management and optimisation.
Advertisements

Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
Module 6 Implementing Messaging Security. Module Overview Deploying Edge Transport Servers Deploying an Antivirus Solution Configuring an Anti-Spam Solution.
Methods for Stopping Spam James Lick
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
AVG Internet Security 7.5 Product presentation.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
How it Works Copyright Nicola Ottomano 2005http://
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
What is SpamSniper? SpamSniper is the leading security solution which locates in front of mail server to perform mail proxy, virus firewall and filter.
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
The Internet and Security Steven Shedd. The Internet How it began How it began.
Computer viruses By: Shannon Simonian. What is a computer virus?  -Shares traits of a biological virus in people.  -Computer viruses pass from computer.
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Spam Reduction Techniques Using greylisting and SpamAssassin.
September 16, 2009 SpamAssassin Way more than the Mac OS X Server GUI shows Presented by: Kevin A. McGrail Project Management Committee Member of the Apache.
IP Blacklisting Causes & Solution Marcus Low, R&D Director InternetNow International Sdn Bhd.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
1 Computer Security: Protect your PC and Protect Yourself.
Firewalls Marin Stamov. Introduction Technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts.
Update Unix Users Feb 2006 Kevin Hill. Update Spam Cop (We’ve been busted!) Greylisting- Next Generation Spam Fighting.
Spam and Anti-Spam By Aditi Desai Yousuf Haider. Agenda Introduction Purpose of Spam Types of Spam Spam Techniques Anti spam Why Spam is so Easy Anti.
Antispam GARR Michele Michelotto Hepix Karlsruhe, 11 May 2005.
The Anti-SPAM service from Forskningsnettet - What is new about it? TF-MSP meeting 4/ Martin Bech, UNI-C
GOT SPAM? Spam is the unsolicited or undesired bulk electronic messages. Spam usually contains pornography, viruses, phishing attacks, scams, trojans,
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Combating Abuse Brian Nisbet NOC Manager HEAnet.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
Fighting spam by finding and listing Exploitable Servers.
Page 1 Credits to Page 2 what happened What you don’t know CAN hurt you s o p l e a s e t a k e a moment to get to know around the world recently E-Rule:
Using Traffic Shaping to Combat Spam David Cawley, Senior Engineer December 12th, 2007.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
Digital Citizenship. Topics  Netiquette  Copyright and Fair Use  Plagiarism  Safety on the Internet  Safety on your Computer.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Homework #2 John Bach IST 110 Section 031 JMB6824 9/15/2012.
Tired of Spam? The solution is MailWasher
E- SAFETY GROUP MEMBERS:  MALINI A/P KUMAR  PREMA A/P PARAMASIVAN.
Spam from an ISP perspective Simon Lyall, Ihug Uniforum NZ NetForum Conference July 2003.
Silicon & Software Systems (S3)‏ Copyright © Silicon & Software Systems Limited Antispam protection IT Department 20/03/2008 Ondrej Valousek.
RUCUS - IETF 71 1 Lessons Learned From IETF Antispam Work Jim Fenton.
Homework 04 Hint Mail System. Computer Center, CS, NCTU 2 Software  Postfix mail/postfix  POP/IMAP mail/dovecot  MTA filter security/amavisd-new 
What is Spam? d min.
Trojans Daniel Bartsch CPSC 420 April 19,2007. What is a Trojan? Trojans are malware Named after Odysseus’s mythical trick Embedded in a program Cause.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
, IM, and File sharing specialist By: Sophie Gordon.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.
Instant Messaging. Magnitude of the Problem Radicati reports that 85% of enterprises today use IM. Furthermore, Radicati predicts IM usage increases will.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
[1] Control Spam by the Use of Greylisting Torgny Hallenmark LDC - Computing Center Lund University, Sweden TERENA Networking.
Anti-Spam Updates Activity Coordination Meeting March 2006 Kevin Hill.
28th March 2003 SPAM Presenter: Matthew Sullivan.
Fighting spam by finding and listing Exploitable Servers.
Chapter 40 Internet Security.
Fix AOL Mail Error Code 554 Call for Help
Fix Gmail Temporary Error 500 Call Gmail Helpline.
Stealing Credentials.
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
The Internet: Encryption & Public Keys
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
INTERNET SECURITY.
Presentation transcript:

UC Irvine’s New Anti-Spam Measures Keith Chong Network & Support Programming Network & Academic Computing Services UC Irvine August 9, 2005 Keith Chong Network & Support Programming Network & Academic Computing Services UC Irvine August 9, 2005

New Anti-Spam Measures Realtime Block List (RBL) from Spamhaus.org: Spamhaus Block List (SBL): List of spam sources and spam services. Exploits Block List (XBL): List of computers with proxies, viruses, and trojans installed. “Greeting delay” blocks connections from non- conforming mailers that send data too early. Greylisting temporarily rejects new senders. Compliant servers will return. Spammers are not likely to return. Unknown users blocked earlier in transaction. Rate limiting: 60 messages per minute and 10 concurrent connections on a per server basis. Realtime Block List (RBL) from Spamhaus.org: Spamhaus Block List (SBL): List of spam sources and spam services. Exploits Block List (XBL): List of computers with proxies, viruses, and trojans installed. “Greeting delay” blocks connections from non- conforming mailers that send data too early. Greylisting temporarily rejects new senders. Compliant servers will return. Spammers are not likely to return. Unknown users blocked earlier in transaction. Rate limiting: 60 messages per minute and 10 concurrent connections on a per server basis.

UC Irvine’s System

Effectiveness of Anti-Spam Measures 418, , ,353 Accepted 190,446 Spam 19,972 Viruses 131,674 Accepted 11,307 Spam 836 Viruses

Connections Blocked

New Preventive MeasureBlocked Connections Spamhaus RBL186,240 Greeting Delay11,898 Unknown Users9,426 Too Many Open Connections 6,115 Rate Limit Exceeded10,793 Statistics for 7/29/2005

Questions & Answers