Anti Phishing & Spam -- by lynn. E-mail Spam Anti Spam and How White-lists Black-lists Heuristics –Bayes –Neural Networks Static technique –keyword checking.

Slides:



Advertisements
Similar presentations
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Advertisements

PHISHING AND ANTI-PHISHING TECHNIQUES Sumanth, Sanath and Anil CpSc 620.
Gold Country Computer Learning Center March 2007 Spam Roger Thornburn.
1 CANTINA : A Content-Based Approach to Detecting Phishing Web Sites WWW Yue Zhang, Jason Hong, and Lorrie Cranor.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
6/1/2015 Spam Filtering - Muthiyalu Jothir 1 Spam Filtering Computer Security Seminar N.Muthiyalu Jothir – Media Informatics.
ITrustPage: Pretty Good Phishing Protection Stefan Saroiu, Troy Ronda, and Alec Wolman University of Toronto and Microsoft Research.
User Interfaces and Algorithms for Fighting Phishing Jason I. Hong Carnegie Mellon University.
Preventing Spam: Today and Tomorrow Zane Bonny Vilaphong Phasiname The Spamsters!
June 19, 2006TIPPI21 Web Wallet Preventing Phishing Attacks by Revealing User Intentions Rob Miller & Min Wu User Interface Design Group MIT CSAIL Joint.
CMU Usable Privacy and Security Laboratory A Brief History of Semantic Attacks or How Not to Get Screwed Online Serge Egelman.
Filtering Managing Unwanted Mail. Managing unwanted spam mail : Server Side Filtering Spam filtering at Monash comes in two forms. Server Side.
SPAM WeeSan Lee
PORTIA Project 1 Mitigating Online ID Theft: Phishing and Spyware Students:Blake Ross, Collin Jackson, Nick Miyake, Yuka Teraguchi, Robert Ladesma, Andrew.
Usable Privacy and Security Jason I. Hong Carnegie Mellon University.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
No. 1 anti-spam solution for Exchange/SMTP/Lotus.
September 16, 2009 SpamAssassin Way more than the Mac OS X Server GUI shows Presented by: Kevin A. McGrail Project Management Committee Member of the Apache.
IP Blacklisting Causes & Solution Marcus Low, R&D Director InternetNow International Sdn Bhd.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Spam Filtering Techniques Arnold Perez Joseph Tilley.
Examining the Effectiveness and Techniques of the Anti-Phishing Technology in Leading Web Browsers and Security Toolbars. Wesley W. Owen
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
SIM309. Connection Analysis (IP-based edge blocks) Reputation Analysis Connection Filtering Protect businesses from receiving –borne viruses.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
March 2007 | Prague 1 Technical University of Vienna Politecnico di Milano Engin Kirda Christopher Kruegel Angelo P.E. Rosiello AntiPhish: An Anti-Phishing.
Visual-Similarity-Based Phishing Detection Eric Medvet, Engin Kirda, Christopher Kruegel SecureComm 2008 Sep.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Masud Hasan Secue VS Hushmail Project 2.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
CMU Usable Privacy and Security Laboratory Phinding Phish: An Evaluation of Anti-Phishing Toolbars Yue Zhang, Serge Egelman, Lorrie.
Introduction to Your Digital Toolbox. Welcome to our network!
Highlights: Protection Performance New features Agenda.
Introduction To Internet
Draft-qi-i2nsf-access-network- usecase-00 Author: Minpeng Qi, Xiaojun Zhuang.
How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Spam Solutions Group 7 Leo Leung Peter Gorzkowski Seema Yadav Tobby Mathew You’ve Got Mail!
C August 24, 2004 Page 1 SMS Spam Control Nobuyuki Uchida QUALCOMM Incorporated Notice ©2004 QUALCOMM Incorporated. All rights reserved.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
VENKAT DEEP RAJAN SUMALATHA REDDY KARTHIK INJARAPU CPSC 620 CLEMSON UNIVERSITY.
Technology Update TSAG Meeting 7/8/04. Announcements New Interim Director of User Support Services: Bill Hardy Outage on July 17 Udrive status Anyone.
1 Network Security Management ─Mail Student : A 吳守宏.
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
Machine Learning for Spam Filtering 1 Sai Koushik Haddunoori.
Phishing & Pharming. 2 Oct to July 2005 APWG.
This opens the box as shown above where filtering on the Junk e mail folder can be adjusted. Click on the Blocked Senders tab. If adding an address.
Extra Credit Presentation: Allegra Earl CSCI 101 T 3:30.
1 Phinding Phish : Evaluating Anti- Phishing Tools Yue Zhang,Jason Hong (2007) Carnegie Mellon University.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
Server Implementation. NETGATE 2 Netgate2 Spam Firewall and Server deliver the most robust, effective and easy to manage security available.
Windows Tutorial 5 Protecting Your Computer
Anti-Spam Managing Spam with Kerio Connect
iTrustPage: Pretty Good Phishing Protection
MICROSOFT OUTLOOK and Outlook service Provider
Conveying Trust Serge Egelman.
Norton Antivirus Password Not Working Norton technical support phone number
Norton Antivirus Technical Support Number Norton toll free number
NORTON CUSTOMER SUPPORT NUMBER. NORTON CUSTOMER SERVICE.
Information Security Session October 24, 2005
راهنمای سیستم الکترونیکی دانشگاه تبریز
What is it? Why do I keep getting from Barracuda? SPAM.
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Spam control Old emphasis: detect spam
INTERNET SECURITY.
Presentation transcript:

Anti Phishing & Spam -- by lynn

Spam

Anti Spam and How White-lists Black-lists Heuristics –Bayes –Neural Networks Static technique –keyword checking Sender Authentication

Anti-spam Tools 1. SurfControl Filter for SMTP 2. Symantec Brightmail Anti-Spam 3. Symantect Mail Security for SMTP 4. Kaspersky Anti-Spam, referred 5. Borderware MXtreme Mail Filewall 6. Ikarus mySpamWall 7. SpamAssassin 8. CRM 114 (Controllable Regex Mutilator) 9. Bogofilter

product method White List******** Black List******** Bayes***** Neural Networks *** Static techniques ** * ****

As we can see … most of these products use White List & Black List. Static techniques are also popular among them About half of them use Bayes or Neural Networks as Heuristics

How they work? The spam sample was from SpamAssassin – 1397 Spam messages –1400 ham messages

SpamAssassin Low(2.64) –Bayes disabled –Network tests disabled SpamAssassin standard (2.64) –Bayes disabled –Network tests enabled SpamAssasin Bayes(2.64) –Bayes enable –Network tests enabled SpamAssassin (3.0) –Bayes enabled –Network tests enabled

Spam  Phishing phishing usually initiated through “ junk ” –Scam Anti-spam and Anti-phishing tools use similar methods –Black & White List –Community ratings –Heuristics methods –Authentication

Anti-Phishing and How CallingID Toolbar Cloudmark Anti-Fraud Toolbar EarthLink Toolbar eBay Toolbar Firefox 2 GeoTrust TrustWatch Toolbar Microsoft Phishing Filter in Windows Internet Explorer 7 Netcraft Anti-Phishing Toolbar Netscape Browser 8.1 SpoofGuard

Black List communit y ratings HeuristicsAuthent ication CallingID Toolbar *** Cloudmark ** EarthLink Toolbar **** eBay Toolbar ** Firefox 2 ** GeoTrust * Phishing Filter of IE7 ** Netcraft ** Netscape Browser 8.1 * SpoofGuard *

Conclusion … Black & White List : most popular –BogofilterBogofilter Heuristic methods : anti-phishing –SpoofGuardSpoofGuard Static technique : anti-spam –keyword checking

Thank you ~ Thank you ~