Anti-Spam Research Group (ASRG) 56 th IETF Meeting March 20, 2003 Paul Q. Judge.

Slides:



Advertisements
Similar presentations
Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Advertisements

2 Introduction A central issue in supporting interoperability is achieving type compatibility. Type compatibility allows (a) entities developed by various.
CONEX BoF. Welcome to CONEX! Chairs: –Leslie Daigle –Philip Eardley Scribe Note well MORE INFO: -ECN.
An Anti Spam Action Strategy John Haydon, Australian Communications Authority.
Service Function Chaining (SFC) BoF
Anti-Spam Management for Service Provider in Malaysia Alan Lee NTT MSC.
Basic Communication on the Internet:
Introduction to the Anti-Spam Research Group (ASRG) Presented by Yakov Shafranovich, ASRG Co-chair NIST Spam Technology Workshop Gaithersburg, Maryland,
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
ROMaN: Revenue driven Overlay Multicast Networking Varun Khare.
An Overview of the Law on Spam Anti-Spam Research Group San Francisco, CA March 20, 2003 Jon Praed Internet Law Group
Domain Name Registrant Data: The Privacy Questions Alan Davidson Center for Democracy and Technology
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Lisa Farmer, Cedo Vicente, Eric Ahlm
November IPsec Remote Access BOF Washington D.C. November
Spam Sonia Jahid University of Illinois Fall 2007.
Sophos anti-virus and anti-spam for business OARNET October 13, 2004.
An Effective Defense Against Spam Laundering Paper by: Mengjun Xie, Heng Yin, Haining Wang Presented at:CCS'06 Presentation by: Devendra Salvi.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
OECD SPAM TOOLKIT Lindsay Barton Manager, Online Policy Department of Communications, Information Technology and the Arts (Australia)
Taiwan Network Information Center Spam Status & Anti-Spam Schemes in Taiwan Taiwan Network Information Center David Chen Sep 5, 2002.
“We Can Stop Spam” Author: Jack P. McHugh Pui Ying (Ivy) Cheung.
WE Can Stop the Spam! June 16, 2003 Author: Mr. Jack P. McHugh Presented by: Nidhi Dalwadi.
Your technology solution partner.™ Security Enterprise Protection Gener C. Tongco Product Manager CT Link Systems Inc.
Untouchable?: A Canadian Perspective on the Anti- Spam Battle Michael Geist Canada Research Chair in Internet & E- commerce Law University of Ottawa, Faculty.
How Companies Fight Spamming by Sonya Tormaschy & Marc Eggert E-Commerce: Tuesday & Thursdays; 1:30 – 2:45.
Should there be a law that forbids people from sending to thousands of people (spam)? By: Bennett Moss Daniel Hoyt Hizkias Neway Junyu Wang.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Using Routing and Tunnelling to Combat DoS Attacks Adam Greenhalgh, Mark Handley, Felipe Huici Dept. of Computer Science University College London
Department of Computer Sciences The University of Texas at Austin Zmail : Zero-Sum Free Market Control of Spam Benjamin J. Kuipers, Alex X. Liu, Aashin.
Virtual Business CREATING A WEB PRESENCE Copyright © Texas Education Agency, All rights reserved.
Update on the Internet Research Task Force Aaron Falk IRTF Chair IETF-72 – Dublin.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Ngtrans CHAIRS: Alain Durand Tony Hain Margaret Wasserman
Proposal for a Network Complexity Research Group IRTF Open Meeting, 27 July 2011, Quebec Michael Behringer, Geoff Huston
BEHAVE BOF (Behavior Engineering for Hindrance AVoidancE) Cullen Jennings Jiri Kuthan.
The Effects of Anti-Spam Methods on Spam Mail Eilon Solan, Tel Aviv University Eran Reshef, Blue Security Inc.
DEV234 Project Management For.NET Developers Marc Gusmano Director of Emerging Technologies The Information Management Group.
Policy Considerations RUCUS BOF IETF 71 - Philadelphia March 10, 2005 John Morris.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
SCAMS and SPAM John Corker Senior Associate. Oz NetLaw  National Internet legal practice of the Communications Law Centre.  Website at oznetlaw.net.
HP Overview. HP Overview is a family of integrated network and system management solution for managing the complete IT enterprises, including networks,
Spam Solutions Group 7 Leo Leung Peter Gorzkowski Seema Yadav Tobby Mathew You’ve Got Mail!
Trespass to Chattels: Spam Richard Warner. CompuServe v. Cyber Promotion  :“CompuServe has received many complaints from subscribers threatening to discontinue.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
The information contained in this document is confidential, for internal use only, and may not be distributed outside Ministry of Transport and Communications.
CONEX BoF. Welcome to CONEX! Chairs: –Leslie Daigle –Philip Eardley Scribe Note well.
A Pattern Language for Firewalls Eduardo B. Fernandez, Maria M. Petrie, Naeem Seliya, Nelly Delessy, and Angela Herzberg.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
Emergency Context Resolution with Internet Technologies BOF (ecrit) Jon Peterson, Hannes Tschofenig BOF Chairs.
Requirements and Selection Process for RADIUS Crypto-Agility December 5, 2007 David B. Nelson IETF 70 Vancouver, BC.
Layer 2 Control Protocol BoF (L2CP) IETF 65, Dallas, TX Wojciech Dec Matthew Bocci
UCI Large-Scale Collection of Application Usage Data to Inform Software Development David M. Hilbert David F. Redmiles Information and Computer Science.
MODERN BoF Managing, Ordering, Distributing, Exposing, and Registering telephone Numbers IETF 92.
Reducing Unwanted Communications in SIP (RUCUS) BOF Hannes Tschofenig Francois Audet.
Jeju, 13 – 16 May 2013Standards for Shared ICT Andrew White Principal Consultant Nokia Siemens Networks ATIS’ Cloud Services Activity Document No: GSC17-PLEN-64.
Deployable Filtering Architectures Against Denial-of-Service Attacks Department of Computer Science University College London Telephone: +44 (0)
WREC Working Group IETF 49, San Diego Co-Chairs: Mark Nottingham Ian Cooper WREC Working Group.
Handling Spam In Government Administration – The Singapore Approach Presented to ICA Annual Conference 2004 Presented by Wu Choy Peng (Ms) 20 October 2004.
Consumer rights when subscribing to an internet service.
An Effective Defense Against Spam Laundering Author: Mengjun Xie, Heng Yin, Haining Wang Presented At: CCS’ 06 Prepared By: Amit Shrivastava.
ATIS’ Cloud Services Activity
A Study On Solutions To Spam
CONEX BoF.
Spam Detection Algorithm Analysis
How to build an Internet Service
Presentation transcript:

Anti-Spam Research Group (ASRG) 56 th IETF Meeting March 20, 2003 Paul Q. Judge

Agenda bash, Paul Judge, 5 mins Review charter, Paul Judge, 10 mins -----Background and Views of the Problem----- Size of Problem, Laura Atkins, SpamCon, 10 mins The Service Providers View: Difficulties of communicating consent, Hans Peter Brondmo, NAI Service Provider Coalition, 10 mins Best Practices for End-Users, John Morris, Center for Democracy and Technology, 10 mins How Lawsuits Against Spammers Can Aid Spam-Filtering Technology, Jon Praed, Internet Law Group, 15 mins -----RG Work Items----- Review progress and milestones, Paul Judge, 15 mins Taxonomy of anti-spam technologies, Paul Judge, 20 mins -----Overviews of Different Approaches----- Summary of Proposed Authentication Systems, Philip Hallam-Baker, Verisign, 15 mins A Consent-Based Architecture, David Brussin, ePrivacy Group, 15 mins A Cost-Based Model: “Economic disincentives”, Balachander Krishnamurthy, AT&T Research, 15 mins -----Wrap Up----- Next Steps, 10 mins Agenda

Review ASRG Charter

Focus and Motivation Focus: –ASRG focuses on the problem of unwanted messages, loosely referred to as spam Motivation: –Scale, growth, and effect of spam –Was nuisance, Now a significant portion of traffic –Stands to affect local networks, the infrastructure, and the way that people use

Consent-based Communication Definition of spam is inconsistent and unclear Generalize the problem into one of “consent-based communication” Expressing consent closer to the source makes it more difficult to satisfy all downstream receivers

Consent-based Framework Consent Expression Policy Enforcement Source Tracking

The purpose of the ASRG Understand the problem and collectively propose and evaluate solutions

Understand the problem Taxonomy of solutions Characterization of the problem Requirements for solutions Understand the scope of spam legislation

Propose Solutions Novel approaches Standards based on common techniques Combination of approaches Best Practices/Education

Evaluate Solutions Usefulness –Effectiveness –Accuracy Cost –Effect on normal use of the system (Change in use, Difficulty of use, delay, etc ) –Monetary costs of using the system (Charge, Bandwidth, Computation, etc )

Interaction Developers SoftwareVendors Researchers ISPs Administrators Users Government Build It Enforce It Live With It Deploy It

The rest of the solution Best Practices Technology Legislation Education

Interaction between Technology & Law Technological Effectiveness Legal Effectiveness Casual Spammer Forwards Chain Letters Hobbyist Spammer Mass BCC mailings with normal clients Small-Scale Spammer Uses spamming toolkit and address CDs Hacker Spammer Develops tools to bypass filters Large-Scale Spammer Well-funded and knowledgeable