Taiwan Network Information Center Spam Status & Anti-Spam Schemes in Taiwan Taiwan Network Information Center David Chen Sep 5, 2002.

Slides:



Advertisements
Similar presentations
1 Taiwan Routing table statistics – a new service in TWNIC Ching-Heng Ku IP Department TWNIC.
Advertisements

Presenter: Mark Elkins Topic: Things not getting done.
Example policy elements and their role in bandwidth management and optimisation.
An Anti Spam Action Strategy John Haydon, Australian Communications Authority.
Anti-Spam Management for Service Provider in Malaysia Alan Lee NTT MSC.
Basic Communication on the Internet:
1 A Survey of ISPs in Taiwan for applying HD-Ratio to IPv4 David Chen, Senior Engineer Taiwan Network Information Center, IP department
IPv6 Deployment CANTO Nate Davis, Chief Operating Officer 13 August 2014.
FIREWALLS Chapter 11.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Consortium Conference 13 July 2012 Operational Developments Ian Lehmann Chief Operations Officer London Grid for Learning.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
Firewalls and Intrusion Detection Systems
FROM RICHARD RODRIGUES JOHN ANIMALU FELIX SHULMAN THE HONORARY MEMBERS OF THE INTERCONTINENTAL GROUP Information security in real business firewall security.
Chapter 7 HARDENING SERVERS.
Chapter Extension 7 How the Internet Works © 2008 Prentice Hall, Experiencing MIS, David Kroenke.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
FIREWALL Mạng máy tính nâng cao-V1.
Chapter 7: Using Windows Servers to Share Information.
Marketing of Information Security Products. The business case for Information Security Management.
IPv6 Activities and Future Strategies in Chunghwa Telecom Fu-Kuei Chung Data Communications Business Group Chunghwa Telecom 2003/02.
Chapter 13 – Network Security
Taiwan Network Information Center Introduction to TWNIC RMS (Resource Management System) 15 th APNIC NIR Meeting David Chen Feb 26,
1 TWNIC Update Sheng Wei Kuo, TWNIC NIR SIG, APNIC 30.
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
Windows 7 Firewall.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
CHAPTER 3 PLANNING INTERNET CONNECTIVITY. D ETERMINING INTERNET CONNECTIVITY REQUIREMENTS Factors to be considered in internet access strategy: Sufficient.
Large Space IPv4 Trial Usage Program for Future IPv6 Deployment ACTIVITIES UPDATE Vol.5 APNIC 16 Meeting / Policy SIG August 21st, 2003 at Seoul Kosuke.
VIETNAM INTERNET NETWORK INFORMATION CENTER VNNIC – NIR Update NIR SIG – APNIC 32 Busan, Aug Presented: Nguyen Vinh Hoang
Anti-Spam update Unsolicited Electronic Messages Bill and ISP Spam Code of Practice 2 February 2006 Keith Davidson Executive Director.
Access Control List (ACL)
1 TWNIC Update Sheng Wei Kuo, TWNIC NIR SIG, 28 th APNIC OPM.
Promoting Good Practices in Domain Name Registration Supported by.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
ICANN Root Name Server System Advisory Committee March 2, 1999 SUNTEC Convention Center Singapore.
ISC Anti-Spam Activities and Progress Li Hong Internet Society of China.
Network abuse BOF APNIC 14 Kitakyushu, Japan 5 September 2002.
Spam from an ISP perspective Simon Lyall, Ihug Uniforum NZ NetForum Conference July 2003.
台灣電腦網路危機處理中心暨協調中心 Taiwan Computer Emergency Response Team / Coordination Center Impacts of slammer worm in Taiwan The first message about the worm we got.
1 TWNIC Update Sheng Wei Kuo, TWNIC NIR SIG, APNIC 29.
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
NICI IPv6 Infrastructure Development Status IPv6 Summit in Taiwan 2005 Aug. 23 rd, 2005 Jing-Jou Yen National Center for High-Performance Computing.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E APNIC Status Report ARIN VI Public Policy Meeting 2-4 October 2000.
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Firewall Technology and InterCell Communication Peter T. Dinsmore Trusted Information Systems Network Associates Inc 3060 Washington Rd (Rt. 97) Glenwood,
LEFIS ROVANIEMI MEETING 19TH 20TH JANUARY 2007 Privacy In The Web TATYANA STEFANOVA LEX.BG BULGARIA.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Access Control List (ACL) W.lilakiatsakun. Transport Layer Review (1) TCP (Transmission Control Protocol) – HTTP (Web) – SMTP (Mail) UDP (User Datagram.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
Open DNS resolvers have to be closed ● Open resolvers respond to recursive queries from any host on the Internet ● Amplification DNS attack 2.
4.3 Network Layer Logical Addressing
Chapter 7: Using Windows Servers
CONNECTING TO THE INTERNET
Hush mail Customer Tech Support Number Hush mail Customer Tech Support Number Call Now : Toll Free Call Now : Toll Free.
Virtual LANs.
Unit 27: Network Operating Systems
Firewalls Jiang Long Spring 2002.
NIR SIG, 18th APNIC Meeting
Presentation transcript:

Taiwan Network Information Center Spam Status & Anti-Spam Schemes in Taiwan Taiwan Network Information Center David Chen Sep 5, 2002

© Taiwan Network Information Center Outline The Effect of Spam Current Anti-Spam Strategies ASTF The Obstacles of Schemes

© Taiwan Network Information Center The Effect of Spam (1) Net Consumers Association Taiwan made a public opinion poll report – 1/3 people spend 10 mins to handle spam every day – Over 70% people feel annoyed – 75% people say they don ’ t want to receive spam any more – 90% people think it ’ s unfair to share the cost of spam including ISP – 2/3 people in favor of introducing appropriate law, the other third say it ’ s not necessary

© Taiwan Network Information Center The Effect of Spam (2) – The Cost of Spam End user – US$1,830 Million a year – Waste of internet resources, waiting time and mail server crush ISP – Wasting bandwidth cost US$8 Million a year – Hardware renew, Software develop and maintainer ’ s cost can ’ t evaluate Source :

© Taiwan Network Information Center IP/netmaskamountIP/netmaskamount / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / /16189 Blocked IP : 1,008,354 Taiwan IP blocked list in spam.dnsrbl.net (RBL) Total IP : 11,455,744Aug.15, 2002

© Taiwan Network Information Center The Effect of Spam (4) IP blocked rate of the 3 major Taiwan ISPs Top 3 ISP In Taiwan Blocked IP amount(/24) Blocked IP/ Total blocked Blocked IP/ Total allocated HiNet % 25.7 % SeedNet % 11.1 % TANet % 0.14 % Aug.15, 2002

© Taiwan Network Information Center The Effect of Spam (5) Top ISPs with blocked IP Rank ISP Blocked IP amount (/24) Blocked IP / Total blocked Blocked IP / Total allocate 1 HiNet % 25.7 % 2 FetNet % 49.7 % 3 SeedNet % 11.1 % 4 Savecom % 25 % 5 Pagic % 21.4 % 6 Netpoly % 60 % 7 Dome % 60 % Aug.15, 2002

© Taiwan Network Information Center Current Anti-Spam strategies (1) ISP Network Administrator – Set up the channel for complainants – Educate and announce anti-spam policies – Close open relay function on the mail server – Filter outgoing spam on the Router or Mail Server temporarily – Block incoming spam on the Router or Mail server temporarily – Manage and log dynamic IP user behavior – Terminate spamers ’ connections

© Taiwan Network Information Center Current Anti-Spam strategies(2) Mail Server Administrator – Filter outgoing and block incoming Spam – Self-detect open relay function Instruction refer to – Close open relay function Instruction refer to fix.html User – Filter mails – Delete mails

© Taiwan Network Information Center Current Anti-Spam strategies(3) TWNIC Anti-Spam Plan – Filtering IP or domain name on Router port:25 Temporarily – Using mail server procmail function to check spam pattern in procmailrc.spam file – Using mail server access.db function to filter IP or domain name – Setting up mail server sendmail.cf to check sender ’ s IP ON LINE through DNS query

© Taiwan Network Information Center Current Anti-Spam strategies(4) – Using RBL DNS Check Spam List – Spam.dnsrbl.net – Blackholes.mail-abuse.org – Rsbl.aupads.org – Tbl.maps.vix.com Check Dial Up IP List – Duinv.aupads.org – Dul.maps.vix.com Check Open Relay List – Orvedb.aupads.org – Relays.mail-abuse.org – Relays.orbs.org

© Taiwan Network Information Center ASTF (1) Anti-Spam Task Force (ASTF) – established by TWNIC on June 2002 – Free membership – Encourage all major ISPs to join – Goals To reduce spam To protect users from Getting SPAM To educate users NOT spamming and filtering To coordinate ISPs and jointly find out the solution No more blocked IP from Taiwan

© Taiwan Network Information Center ASTF (2) Implementation – Promote Anti-Spam awareness Setup WEB sites Seek new technology or mechanism – Create tw-anti-spam mail list for ASTF members

© Taiwan Network Information Center ASTF (3) Discussing Topics in the mailing list – Do we need a new TW-RBL ? It ’ s still a controversial issue – Should we build a RT System to track SPAM complaints ? Most of members say Yes – Do we need to build a WEB site for publishing anti-spam knowledge how to handle spam ? Yes, It ’ s under construction – Do we need to create a review procedure to determine and deal with spamers IP ? Yes, but not now

© Taiwan Network Information Center ASTF (4) Management and Law – Management regulation for Government Service Network, GSN – Legislating “ Electronic advertisement mail management law ” draft to against spam Clarify sender message Permitted by receiver in advance Against unfair network cost to end user Restrict advertise mail usage Indemnity to victim

© Taiwan Network Information Center The Obstacles of Schemes Defining Spam criteria is difficult Small group of people like Spam ISPs may lose some customers ISPs may not apply the new RBLs Legislation is a long process

© Taiwan Network Information Center Thank You