I SPCon 2003 – Evaluating Spam Control SolutionsBrandendenburg.com / 1 Email Points of Control UA = User Agent MTA = Message Transfer Agent o =originator.

Slides:



Advertisements
Similar presentations
Virtual Conference on Anti-spam Regulation and Policy Development Sharing The Singapore Experience By Low Boon Kiat Policy & Competition Development Group.
Advertisements

Anti-Spam Management for Service Provider in Malaysia Alan Lee NTT MSC.
Introduction to the Anti-Spam Research Group (ASRG) Presented by Yakov Shafranovich, ASRG Co-chair NIST Spam Technology Workshop Gaithersburg, Maryland,
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Electronic Mail CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Electronic Mail Name: ____________________ Class: ________________.
Presented to Adventist Educational Leaders and Practitioners By Dr. Lilya Wagner, CFRE.
IMPLEMENTATION COSTS AND BURDEN OF INTERNATIONAL CLP AGREEMENTS UNCTAD-IDRC: Competition Provisions in RTAs Yeditepe University – Istanbul, Turkey 31 July,
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Spam Edward W. Felten Dept. of Computer Science Princeton University.
Ostra: Leveraging trust to thwart unwanted commnunication Alan Mislove Ansley Post Reter Druschel Krishna P. Gummadi.
Methods for Stopping Spam James Lick
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
IMF Mihály Andó IT-IS 6 November Mihály Andó 2 / 11 6 November 2006 What is IMF? ­ Intelligent Message Filter ­ provides server-side message filtering,
System Aspects of Spam Control Architecture and Operations Issues IBM Academy 6 Apr 2005 Dave Crocker Brandenburg InternetWorking IBM.
The Application Layer Chapter 7. Where are we now?
DEVELOP CONTENT FOR USE IN MARKETING COMMUNICATIONS TO CREATE INTEREST IN PRODUCT/BUSINESS/IDEA.
1 Enhancing Address Privacy on Anti-SPAM by Dou Wang and Ying Chen School of Computer Science University of Windsor October 2007.
John Kristoff DePaul Security Forum Network Defenses to Denial of Service Attacks John Kristoff
Copyright © 2007 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Web 101 Third Edition by Wendy G. Lehnert & Richard L. Kopec Chapter 3: .
Sender policy framework. Note: is a good reference source for SPFhttp://
© Business & Legal Reports, Inc Alabama Retail is committed to partnering with our members to create and keep safe workplaces. Be sure to check out.
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Marketing Bunder M. Shageer Individual Project COM 359 Digital Media for Strategic Communication Dr. Hammick.
Filtron: A Learning-Based Anti-Spam Filter Eirinaios Michelakis Ion Androutsopoulos
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine Shuang Hao, Nadeem Ahmed Syed, Nick Feamster, Alexander G. Gray,
GOT SPAM? Spam is the unsolicited or undesired bulk electronic messages. Spam usually contains pornography, viruses, phishing attacks, scams, trojans,
Sending Mark Kruger Coldfusionmuse.com Cfwebtools.com.
© 2007 Convio, Inc. HOW TO: Best Practices for Sending to Organizations Confidential for use by American Cancer Society and Convio – Copyright ©
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
Taking Common Action Against Spam Internet Society of China Beijing – 2004 Dave Crocker Brandenburg InternetWorking
NETIQUETTE. WHAT IS IT??? Netiquette refers to the rules of online etiquette that guide users while working, communicating, and utilizing resources in.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Department of Computer Sciences The University of Texas at Austin Zmail : Zero-Sum Free Market Control of Spam Benjamin J. Kuipers, Alex X. Liu, Aashin.
SMS to Converter - A new approach to send .
Module 6 Planning and Deploying Messaging Security.
A Trust Overlay for Operations: DKIM and Beyond Dave Crocker Brandenburg Internet Working bbiw.net Apricot / Perth 2006 Dave Crocker Brandenburg.
The Effects of Anti-Spam Methods on Spam Mail Eilon Solan, Tel Aviv University Eran Reshef, Blue Security Inc.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
Spam: Ready, Fire, Aim! APCAUCE / APRICOT Kuala Lumpur – 2004 Dave Crocker Brandenburg InternetWorking APCAUCE / APRICOT Kuala Lumpur – 2004 Dave Crocker.
GovernmentConnect is a software solution that supports business operations and all important business processes within government institutions. It enables.
CAN SPAM and Your Marketing Best Practices for Senders By Lars Helgeson Cooler .
A Retrospective on Future Anti-Spam Standards Internet Society of China Beijing – September, 2004 Dave Crocker Brandenburg InternetWorking
Directorate for Food, Agriculture, and Fisheries 1 ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT ORGANISATION DE COOPÉRATION ET DE DEVELOPMENT.
Marketing Amanda Freeman. Design Guidelines Set your width to pixels Avoid too many tables Flash, JavaScript, ActiveX and movies will not.
Silicon & Software Systems (S3)‏ Copyright © Silicon & Software Systems Limited Antispam protection IT Department 20/03/2008 Ondrej Valousek.
Lecture 10. and Netiquette Instructor: Jie Yang Department of Computer Science University of Massachusetts Lowell Exploring the Internet,
to Groups Robby Seitz. What is it? It gives authorized users the ability to send messages to employees and students without having to manage.
The IT Vendor: HIPAA Security Savior for Smaller Health Plans?
Managing Your Inbox. Flagging Messages Message requires a specific response or action from the recipient Flagging draws attention to your request Quick.
Making Healthful Choices Building Health Skills Chapter 2 – Lesson 1.
Conflict Resolution and Consensus Building
ST18 subgroup report 23 november ST 18 subgroup The ST18 subgroup, convened by the co-chairs, to: – Assess existing options, areas of agreement.
Sender policy framework. Note: is a good reference source for SPFhttp://
Laws and Rules That Govern Internet Safety Ashley Martin.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
Improving Personal and Organizational Communications.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Intelligent, simple and reliable verification on the cloud.
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
How Errors are Best Resolved and Yahoo Support in Itself has a Point.
Reputation and Engagement
An Application with Active Spoof Monitoring and Control
Fix Bigpond Error Code 550 Call for Help
Ch. 11 – Cipher Techniques Dr. Wayne Summers
KNOWLEDGE MANAGEMENT (KM) Session # 36
Presentation transcript:

I SPCon 2003 – Evaluating Spam Control SolutionsBrandendenburg.com / 1 Points of Control UA = User Agent MTA = Message Transfer Agent o =originator i = intermediate r = recipient MTA r UA r UA o MTA o DNS MTA i1 MTA i2  Accountability  Filtering  Enforcement  Filtering

I SPCon 2003 – Evaluating Spam Control SolutionsBrandendenburg.com / 2 Evaluating Proposals  Adoption  Effort to adopt proposal  Effort for ongoing use  Balance among participants  Threshold to benefit  Operations impact on  Adopters of proposal  Others  Internet scaling – What if…  Use by everyone  Much bigger Internet  Robustness  How easily circumvented  System metrics  Cost  Efficiency  Reliability  Impact  Amount of Net affected  Amount of spam affected  Test scenarios  Personal post/Reply  Mailing List  Inter-Enterprise

I SPCon 2003 – Evaluating Spam Control SolutionsBrandendenburg.com / 3 Cascading Control Types of Spam  Accountable  Legitimate businesses  Aggressive marketing  Absence of formal rules  Rogue  Actively avoid accountability  Find a “safe haven”  Not always seeking money Types of Control  Legal  Terminology  Boundaries  Whitelist  Validate sender  Validate sending policy  Blacklist  Arms race  False positives

I SPCon 2003 – Evaluating Spam Control SolutionsBrandendenburg.com / 4 Be Careful What You Ask For Be Careful What You Ask For  Changes to complex systems always have unintended, negative consequences  We must attack spam, but we must attack it carefully  Attacking superficial spam characteristics invites an arms race  Constantly “improving” tools, but constantly failing to reach a stable level of effectiveness  Adequate solutions for one constituency might be inappropriate for another  Look at their communications styles