A Technical Approach to Minimizing Spam Mallory J. Paine.

Slides:



Advertisements
Similar presentations
Microsoft ® Office Outlook ® 2003 Training Outlook can help protect you from junk Upstate Technology Services presents:
Advertisements

Document Filtering Dr. Frank McCown Intro to Web Science Harding University This work is licensed under a Creative Commons Attribution-NonCommercial- ShareAlike.
Basic Communication on the Internet:
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Surrey Public Library Electronic Classrooms Essentials.
Spam Edward W. Felten Dept. of Computer Science Princeton University.
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
Presented by: Alex Misstear Spam Filtering An Artificial Intelligence Showcase.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
6/1/2015 Spam Filtering - Muthiyalu Jothir 1 Spam Filtering Computer Security Seminar N.Muthiyalu Jothir – Media Informatics.
Victor Ivanov. Introduction  Definition  Unsolicited bulk messages  Concerns  Server load  Garbage content.
FROM RICHARD RODRIGUES JOHN ANIMALU FELIX SHULMAN THE HONORARY MEMBERS OF THE INTERCONTINENTAL GROUP Information security in real business firewall security.
Lesson 7: Business, , & Personal Information Management
COS 125 DAY 4. Agenda Questions from last Class?? Today’s topics Communicating on the Internet Assignment #1 due Assignment #2 will be posted next week.
Preventing Spam: Today and Tomorrow Zane Bonny Vilaphong Phasiname The Spamsters!
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
1 Enhancing Address Privacy on Anti-SPAM by Dou Wang and Ying Chen School of Computer Science University of Windsor October 2007.
Spam Andy Nguyen 5/17/2004. What is Spam? Unsolicited means that the Recipient has not granted verifiable permission for the message to be sent. Bulk.
Spam Filters. What is Spam? Unsolicited (legally, “no existing relationship” Automated Bulk Not necessarily commercial – “flaming”, political.
Spam May CS239. Taxonomy (UBE)  Advertisement  Phishing Webpage  Content  Links From: Thrifty Health-Insurance Mailed-By: noticeoption.comReply-To:
Surrey Libraries Computer Learning Centres Totally New to Computers Easy Gmail March 2013 Easy Gmail Teaching Script.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
Spam Reduction Techniques Using greylisting and SpamAssassin.
Spam? Not any more !! Detecting spam s using neural networks ECE/CS/ME 539 Project presentation Submitted by Sivanadyan, Thiagarajan.
Managing and Avoiding Junkmail. Junk  Where does Junk Mail come from? People with whom you do business  Pepsi Friends of people with whom you.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
ICT Essential Skills. (electronic mail) Snail Mail.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
E – Mail History of s What is an ? What happens when we sent an ? messages Folders Address Attachments Types of.
Personalized Spam Filtering for Gray Mail Ming-wei Chang University of Illinois at Urbana-Champaign Wen-tau Yih and Robert McCann Microsoft Corporation.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
UNIT 14 Lecturer: Ghadah Aldehim 1 Websites. Introduction 2.
Combating Abuse Brian Nisbet NOC Manager HEAnet.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Network and Systems Security By, Vigya Sharma (2011MCS2564) FaisalAlam(2011MCS2608) DETECTING SPAMMERS ON SOCIAL NETWORKS.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
Department of Computer Sciences The University of Texas at Austin Zmail : Zero-Sum Free Market Control of Spam Benjamin J. Kuipers, Alex X. Liu, Aashin.
A Neural Network Classifier for Junk Ian Stuart, Sung-Hyuk Cha, and Charles Tappert CSIS Student/Faculty Research Day May 7, 2004.
Data Structures & Algorithms and The Internet: A different way of thinking.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
Content Control Stewart Duncan Technical Manager.
SCAVENGER: A JUNK MAIL CLASSIFICATION PROGRAM Rohan Malkhare Committee : Dr. Eugene Fink Dr. Dewey Rundus Dr. Alan Hevner.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Problem Solving Techniques. Compiler n Is a computer program whose purpose is to take a description of a desired program coded in a programming language.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
C August 24, 2004 Page 1 SMS Spam Control Nobuyuki Uchida QUALCOMM Incorporated Notice ©2004 QUALCOMM Incorporated. All rights reserved.
Leveraging Asset Reputation Systems to Detect and Prevent Fraud and Abuse at LinkedIn Jenelle Bray Staff Data Scientist Strata + Hadoop World New York,
Improving Spam Detection Based on Structural Similarity By Luiz H. Gomes, Fernando D. O. Castro, Rodrigo B. Almeida, Luis M. A. Bettencourt, Virgílio A.
Introduction Spam in Society Spam IM Spam Text Spam Blog Spamming Spam Blogs.
Machine Learning for Spam Filtering 1 Sai Koushik Haddunoori.
Bayesian Filtering Team Glyph Debbie Bridygham Pravesvuth Uparanukraw Ronald Ko Rihui Luo Thuong Luu Team Glyph Debbie Bridygham Pravesvuth Uparanukraw.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
Wikispam, Wikispam, Wikispam PmWiki Patrick R. Michaud, Ph.D. March 4, 2005.
A False Positive Safe Neural Network for Spam Detection Alexandru Catalin Cosoi
By Toby Reed.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
Key management issues in PGP
Introduction to Networking
Unit 4 IT Security.
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
What is it? Why do I keep getting from Barracuda? SPAM.
Switching Techniques.
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Presentation transcript:

A Technical Approach to Minimizing Spam Mallory J. Paine

The Spam Epidemic By June 2003, unsolicited commercial , or spam, accounted for nearly 55% of total traffic on the Internet. Spam is on the rise! On 2/1/05, the New York Times reported that spam now accounts for “80% or more” of all traffic. Why is spam a problem? Can’t users just ignore it?

Current Anti-Spam Technologies Protection of Address Keyword- and Rule-based Filters Verification Filters Bayesian Analytical Filters T

Keyword- and Rule-Based Filters Consists of a series of rules that use Boolean logic and the textual contents of a message to determine its legitimacy. Good because it’s simple to implement. Bad because analytical process is ‘dumb.’ Example: Suppose your filter contains a rule that blocks messages containing both the word ‘viagra’ and a URL. Messages containing a URL and a slight variation of ‘viagra’, like or ‘v i a g r a’ pass through the filter as legitimate messages.

Verification Filters Message classification is based on the sender of the . If message is from a trusted sender, it’s marked as legitimate. If message is from a known spammer, message is immediately classified as spam. If message is from an unknown sender, then message is placed in quarantine until successful completion of a verification process. Failure to complete the verification process results in sender labeled as a spammer, message classified as spam.

Verification Filters: The Verification Process Many different implementations of the Verification Process. Ideally, verification process includes a task that is difficult or impossible for a computer to complete without human assistance. Two examples: Simple image verification, more complex image verification: the CAPTCHA.

Verification Filters: Advantages and Disadvantages Good because nearly 100% effective at catching spam. Bad because: Friends have to “jump through a hoop” to send to someone who uses a verification filter. Verification filter ignores text contents of a message. Senders of messages that are obviously spam are still asked to complete verification. This means lots of unnecessary verification s and wasted bandwidth. Spam with a fake sender’s address is incorrectly classified as legitimate.

Bayesian Filters: The Best Real-World Anti-Spam Technique Calculates probability that a given message is spam by examining the words (or phrases) contained in the message. By examining the words found in a message, and taking note of how many times each word has occurred in a user’s legitimate messages versus how many times that same word has occurred in junk s, the Bayesian Filters computes the probability that the entire message is junk.

Bayesian Filters: Advantages and Disadvantages Good because a good implementation will classify messages with >99% accuracy and close to zero false positives. Bad because the filter must be trained. The filter maintains databases of words from legit s and of words from junk s. Initially, these databases are empty. Until the databases contain a substantial amount of information about a user’s , the filter will be unable to classify messages with any accuracy whatsoever.

Now what? Given that all of the anti-spam techniques presented possess significant disadvantages to their use, it’s clear that none will effectively solve the spam epidemic. Basically, it’s clear that there are huge, gaping flaws in the current system, which is based on the POP3 and SMTP protocols. These protocols are very “open” and they make it easy for spammers to send millions of messages without restriction. The system must be redesigned entirely.

and the Future Two Variations of a Viable Overhaul of the System Implement an system where the sender of a message is charged a small monetary fee for every message sent ($0.001, for example). This fee is negligible to the average user, but translates into a cost-prohibitive fee of $1000 for every million messages sent. Implement a similar system where the sender is instead charged a computational fee for each message sent. This computational fee requires perhaps.1 seconds of processing time to complete, which translates into ~28 hours of computing time for every million messages. Given that spammers rely on the free cost and ease of sending to send tens of millions of messages per day, either of these two solutions is more than adequate to solve the spam epidemic. Unlikely that either system will be implemented because the current system is very, very deeply ingrained in all sorts of mainstream technology.