Spam and the Ongoing Battle for the Inbox Joshua Goodman, Gordon Cormack, and David Heckerman Louis Szgalsky Andrew Burns.

Slides:



Advertisements
Similar presentations
1 Eloqua Providing Industry-Leading Management Tools May 2009.
Advertisements

IP Warming Overview and Implementation Using Eloqua.
Managing Incoming Chapter 3 Bit Literacy. Terminology client – program which retrieves s from a mail server, lets you read the mails,
Authentication Approaches Phillip Hallam-Baker VeriSign Inc.
Using Traffic Analysis to Detect Spam Richard Clayton TERENA, Lyngby, 22 nd May 2007.
Controlling Spam through Lightweight Currency Proceedings of the Hawaii International Conference on Computer Systems Honolulu HI Jan 2004 David A. Turner.
Microsoft ® Office Outlook ® 2003 Virtually Working for You presents:
Dealing With Spam The kind, not the Food product.
DNSSEC & Validation Tiger Team DHS Federal Network Security (FNS) & Information Security and Identity Management Committee (ISIMC) Earl Crane Department.
1 Aug. 3 rd, 2007Conference on and Anti-Spam (CEAS’07) Slicing Spam with Occam’s Razor Chris Fleizach, Geoffrey M. Voelker, Stefan Savage University.
Lesson 7: Business, , & Personal Information Management
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
Preventing Spam: Today and Tomorrow Zane Bonny Vilaphong Phasiname The Spamsters!
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
Lecture 12 Security. Summary  PEM  secure  PGP  S/MIME.
Security Jonathan Calazan December 12, 2005.
PRISM-PROOF Phillip Hallam-Baker Comodo Group Inc.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Login Screen This is the Sign In page for the Dashboard Enter Id and Password to sign In New User Registration.
Identity Based Sender Authentication for Spam Mitigation Sufian Hameed (FAST-NUCES) Tobias Kloht (University of Goetingen) Xiaoming Fu (University.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
1 The Business Case for DomainKeys Identified Mail.
Wireless and Security CSCI 5857: Encoding and Encryption.
Masud Hasan Secue VS Hushmail Project 2.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Network Security: Lab#4-1 Security J. H. Wang Dec. 3, 2013.
Postfix Mail Server Postfix is used frequently and handle thousands of messages. compatible with sendmail at command level. high performance program easier-
Cryptology Tim Cahill Ryan Church. Project Progress We have researched hill ciphers and are in the process of understanding them. We are also in the process.
By Hina Patel TCM 471 Introduction SPAM? Solicited Unsolicited How spammer gets the address Prevention from spam Conclusion.
SPF/Sender-ID DNS & DDoS Threats Operations Analysis and Research Center for the Internet Douglas Otis November 3, 2007
Managing Incoming Chapter 3 Bit Literacy. Terminology client – program which retrieves s from a mail server, lets you read the mails,
STRATEGY SESSION SEPTEMBER 15, YEAR SECURITY DISCUSSION 1 NETWORK PLANNING TASK FORCE.
SPF/Sender-ID DNS & DDoS Threats Internet Security Operations and Intelligence II Douglas Otis
How to Read Outlook . Make sure the computer is on.
Security Technology Clients and Mail Servers
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
RUCUS - IETF 71 1 Lessons Learned From IETF Antispam Work Jim Fenton.
CSCE 201 Security Fall CSCE Farkas2 Electronic Mail Most heavily used network-based application – Over 210 billion per day Used across.
Computer Networks Fall, 2007 Prof Peterson. CIS 235: Networks Fall, 2007 Western State College How’s it going??
X-ASVP Executive Overview eXtensible Anti-spam Verification Protocol X-ASVP Committee Technical Working Group July 25, 2007.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Cryptology Tim Cahill Ryan Church.
Policy Considerations Phill Hallam Baker. We have a choice.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Cryptology aka Cryptography Tim Cahill Ryan Church.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
X-ASVP Technical Overview eXtensible Anti-spam Verification Protocol X-ASVP Committee Technical Working Group July 22, 2007.
The problem of spam from IPv6. Modern filters.
Lesson Background  is the most popular application on the Internet and the intranet.  Twelve million s were sent each day in.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Definitions. Inbox – Incoming s are stored in the Inbox Sent Box – Set your system to save your sent messages.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Learn Some Steps To Block Yahoo Spam Mail Yahoo Support Australia Number.
Unit 3 Section 6.4: Internet Security
Internet Insecurity The was founded as a tool based on trust
How to manage your s Tips and tricks.
Misc. Security Items.
Looking for Gmail Help? JUST CALL (800)
راهنمای سیستم الکترونیکی دانشگاه تبریز
معلم الصف الثالث الابتدائي
نکات بسیار مهم در مورد دانشگاه تبریز
פחת ורווח הון סוגיות מיוחדות תהילה ששון עו"ד (רו"ח) ספטמבר 2015
By Laith Qabbani Mohannad Al-Raie
ФОНД “СОЦИАЛНО ПОДПОМАГАНЕ”
Spam control Old emphasis: detect spam
Presentation transcript:

Spam and the Ongoing Battle for the Inbox Joshua Goodman, Gordon Cormack, and David Heckerman Louis Szgalsky Andrew Burns

Summary 1998, 10% of spam Now, 80% of spam New technologies used to detect spam Advances in machine learning

Two Main Spam Fighters Cryptograpic standards –PGP, S/MIME –Robust to attacks, but hard to implement Domain Identities –SenderID, DKIM –Use DKS to distribute key information

Ethics Issues Privacy Issues –People don’t want address freely known. Resource issues –Mail serves must handle all incoming mail.

Opinion Good information on fight between spammers and spam-fighters Too much on how to organize research