S a p m a m a n a d n d H a H m 성균관대학교 최형기

Similar documents
Spam and Ham 성균관대학교 최형기

Handling unwanted . What are the main sources of junk ?

Ethical Hacking and. Version 6. Spamming

Security and Privacy

Objectives CINS/F1-01

anti-spam techniques beyond Bayesian filters

Malware, , Database Security

Authentication GUIDE. Frequently Asked QUES T ION S T OGETHER STRONGER

COSC 301 Network Management. Lecture 14: Electronic Mail

Deliverability Terms

Security Protection

BEST PRACTICES FOR PERSONAL Security

On the Surface. Security Datasheet. Security Datasheet

Introduction This paper will discuss the best practices for stopping the maximum amount of SPAM arriving in a user's inbox. It will outline simple

Spam Protection Guide

Marketing 201. March, Craig Stouffer, Pinpointe Marketing (408) x125

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Introduction to Antispam Practices

GFI product comparison: GFI MailEssentials vs. McAfee Security for Servers

MDaemon Vs. MailEnable Enterprise Premium

I G H T T H E A G A I N S T S P A M. ww w.atmail.com. Copyright 2015 atmail pty ltd. All rights reserved. 1

Introduction. Logging in. WebMail User Guide

Application Firewalls

Security by Any Other Name:

MDaemon Vs. MailEnable Enterprise Premium

Debian/GNU Linux Mailing

Debian/GNU Linux Mailing

MDaemon Vs. Kerio Connect

SMTP Scanner Creation

SPAM UNDERSTANDING & AVOIDING

Debian/GNU Linux Mailing

MDaemon Vs. IceWarp Unified Communications Server

Contents. Management. Client. Choosing One 1/20/17

Advanced Filtering. Tobias Eggendorfer

CPSC156a: The Internet Co-Evolution of Technology and Society

to Stay Out of the Spam Folder

Anti-Spoofing. Inbound SPF Settings

Mail Assure Quick Start Guide

Technical Approaches to Spam and Standards Activities (ITU WSIS Spam Conference)

MDaemon Vs. SmarterMail Enterprise Edition

Security Using Digital Signatures & Encryption

Online Scams. Ready to get started? Click on the green button to continue.

WITH INTEGRITY

GFI Product Comparison. GFI MailEssentials vs Sophos PureMessage

Binarytech Digital Education Karta Allahabad ( Notes)

Cisco s Appliance-based Content Security: IronPort and Web Security

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

GFI product comparison: GFI MailEssentials vs Symantec Mail Security for Microsoft Exchange 7.5

Security and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1

GFI product comparison: GFI MailEssentials vs. Barracuda Spam Firewall

MDaemon Vs. SmarterMail Enterprise Edition

Factors that Impact Deliverability

MDaemon Vs. Zimbra Network Edition Professional

INTERNET SAFETY IS IMPORTANT

MDaemon Vs. Microsoft Exchange Server 2016 Standard

Office 365 Integration Guide Software Version 6.7

CS 43: Computer Networks. 12: and SMTP September 28, 2018

Managing Spam. To access the spam settings in admin panel: 1. Login to the admin panel by entering valid login credentials.

MDaemon Vs. SmarterMail Enterprise Edition

APCAUCE / APRICOT Kuala Lumpur Dave Crocker Brandenburg InternetWorking <

GFI product comparison: GFI MailEssentials vs. Trend Micro ScanMail Suite for Microsoft Exchange

MDaemon Vs. Kerio Connect

Mail Assure. Quick Start Guide

How Enterprise Tackles Phishing. Nelson Yuen Technology Manager, Cybersecurity Microsoft Hong Kong

Franzes Francisco Manila IBM Domino Server Crash and Messaging

Web Mail and e-scout Instructions

(electronic mail) is the exchange of computer-stored messages by telecommunication.

PROTECTING YOUR BUSINESS ASSETS

s and Anti-spam

Error Codes have 3 Digits

MDaemon Vs. Microsoft Exchange Server 2016 Standard

Spam, Security and SORBS v2.0

Anti-Spam. Overview of Anti-Spam Scanning

Trustwave SEG Cloud BEC Fraud Detection Basics

Fighting Spam, Phishing and Malware With Recurrent Pattern Detection

MxVault Questions and Answers

Account Customer Portal Manual

is still the most used Internet app. According to some studies around 85% of Internet users still use for communication.

CS321: Computer Networks ELECTRONIC MAIL

Use and Abuse of Anti-Spam White/Black Lists

MDaemon Vs. SmarterMail Enterprise Edition

Vendor: Cisco. Exam Code: Exam Name: ESFE Cisco Security Field Engineer Specialist. Version: Demo

For example, if a message is both a virus and spam, the message is categorized as a virus as virus is higher in precedence than spam.

Deep Sea Phishing: Examples & Countermeasures

TrendMicro Hosted Security. Best Practice Guide

Electronic Mail

Fortinet.Certdumps.FCESP.v by.Zocki.81q. Exam Code: FCESP. Exam Name: Fortinet Certified Security Professional

States, Companies Begin to Can Spam

CS 356 Internet Security Protocols. Fall 2013

Phishing: When is the Enemy

Cyber Security Guide for NHSmail

Internet Architecture

Symantec Intelligence Quarterly: Best Practices and Methodologies October - December, 2009

FAQ. Usually appear to be sent from official address

Mail Server. Introduction

Webmail Which Webmail applications are available?

Managing Graymail. Overview of Graymail. Graymail Management Solution in Security Appliance

A Review Paper on Network Security Attacks and Defences

Untitled Page. Help Documentation

Symantec Security.cloud

Transcription:

Spam and Ham 성균관대학교 최형기

Agenda Email Protocol Introduction to spam Techniques spammers use Kinds of spam Solutions to spam Conclusion CINS/F1-01 Sungkyunkwan University, Hyoung-Kee Choi 2

SMTP 1

Electronic Mail outgoing message queue Three major components: user agents mail servers simple mail transfer protocol: SMTP mail server SMTP user agent SMTP user mailbox mail server user agent user agent mail server SMTP user agent user agent user agent Sungkyunkwan University, Hyoung-Kee Choi 4

How Are E-mails Transported? LAN MUA Sender MTA Internet LAN MUA Recipient MUA= Mail User Agent, a.k.a. Mail Client MTA=Mail Transport Agent, a.k.a. Mail Server MTA 5

Composition and Delivery Sender supplies To: and Subject: fields and message body. MUA translates into RFC 822 message and connects across LAN to MTA MUA instructs MTA using a protocol called SMTP (or a proprietary alternative; e.g. MS exchange) and sends RFC 822 message. Sender s MTA uses MX record in DNS to find IP address of recipient s MTA based on To: field. Sender s MTA opens connection to Recipient s MTA transfer RFC 822 message using SMTP. Recipient s MTA may deliver to Recipient s MUA or may store message locally for later retrieval. 6

Mail access protocols user agent SMTP SMTP POP3 or IMAP user agent SMTP: delivery/storage to receiver s server Mail access protocol: retrieval from server POP: Post Office Protocol [RFC 1939] authorization (agent <-->server) and download IMAP: Internet Mail Access Protocol [RFC 1730] more features (more complex) sender s mail server receiver s mail server manipulation of stored msgs on server HTTP: Hotmail, Yahoo! Mail, etc. 7

Mail message format RFC 822: standard for text message format: header lines, e.g., To: From: Subject: different from SMTP commands! body the message, ASCII characters only header body 8

SPAM 2

What is Spam? Typical legal definition: unsolicited commercial email (UCE) from someone without a preexisting business relationship. The Gartner Group estimates that 34% of all message in the enterprise relate to UCE. Jupiter Media-Metrix predicts 206 billion junk emails will be send in US in 2006. emarketer estimates spamming cost only $0.00032 cents/message $3 to spam a million people 10

Kinds of Spam Email spam (you already know about that) Newsgroup spam Chat rooms Popups Web pages Spyware Search engine spam Conclusion: If you can advertise for free, someone will 11

Techniques that Spammers Use Getting email addresses Dictionary attacks Web Crawling Sending spam Open proxies Open relays Zombies 12

Getting Email Addresses Dictionary Attacks: Try millions or billions of possible email addresses Put together first-name and last-name, or first-name + number, etc. See if the mail bounces : if not, you have a live address Use Web beacons to check if mail is being read Web crawling: Look for email addresses on web pages Send spam to these addresses or sell them to other spammers 13

Sending Spam -- Open Relays Mail is sent from server to server until destination Mail server processes a mail message where neither the sender nor the recipient is a local user A mail server is an open relay if it will forward on behalf of anyone. Spammers love open relays Spammers use this free ride to send bulk mails A little harder to trace them Shifts bandwidth and other burdens to someone else But open relays are added to blackhole lists, and quickly cannot send legitimate mail 14

Sending Spam -- Open Proxies These are web-page proxy servers Used for getting web-pages past firewalls Should have nothing to do with email Spammers really love these Almost impossible to trace spammer Less incentive for owner to close the proxy than to close open mail relays: they don t care if their web proxy is on an email blackhole list 15

Sending Spam -- Zombies Consumer computers taken over by viruses or trojans Spammer tells them what to send Very difficult to trace Very cheap for spammer Rent a zombie for about $3/month! Four-fifths of spam now emanates from computers contaminated with Trojan horse infections http://www.theregister.co.uk/2004/06/04/trojan_spam_study/ 16

SOLUTIONS 3

Solutions to Spam List based DNS based Filter based Etceteras 18

List Based Black list Blacklist IPs and Blacklist sender email address RBLs (Realtime Blackhole Lists) Hook to MTA Collections of open proxies and open mail relays Too simple White list Safe Sender Lists Black lists are hard People get very angry when you call them a spammer There are 2^32 IP addresses Instead, make lists of known good senders Use challenge/response and computational challenge to authenticate a send at the very first time 19

Challenge-Response Filtering Email from someone NOT on your whitelist, an automatic reply is sent telling what steps the sender should take to be considered for the whitelist (e.g. send you a confirmation, make a donation, solve a puzzle, etc.) Very effective at stopping spam BUT has a number of drawbacks: valid mail delayed kind of harsh -- some may think of it as inconsiderate and never reply, extra work for senders etc. 20

DNS Based Email authentication Domain authentication Sender authentication 21

Email Authentication Traditional Email authentication SMTP Auth and STARTTLS Designed to restrict who can connect to a mail server Closed system Traditional Email singing S/MIME and PGP Designed to cryptographically prove the individual author and content of a message Secure but heavy Requires enabled clients 22

Domain Authentication Emerging standards designed to authenticate domains from which an email was sent e.g. SenderID, DomainKeys Lighter weight than traditional email signing mechanism Not required enabled clients Only sending and receiving MTAs need to be aware Not break backward compatibility Not require a flag day 23

DomainKeys by Email spoofing Forge another person s email to get users to trust Without sender authentication, difficult to know for certain if message is legitimate or forged DomainKeys provides mechanism for verifying domain of email and message integrity Once domain can be verified, compare against domain in From: field in the header MTA such as qmail start to implement gmail started to implement DomainKeys Similar to Cisco s IIM (Identified Internet Email) 24

DomainKeys Sending servers Domain owner setup a public/private key pair. This public key published in DNS (step A) Authorized end-users in domain send email email system generates digital signature using domain s private key Signature is prepend to the email header as shown in step B 25

DomainKeys Receiving servers Extract signature and claimed From: field in the header and fetch public key from DNS step C Verify signature This proves that email was truly sent by claimed From: field Not altered during tranfer Deliver Step D 26

SPF and senderid 1. Sender sends an e-mail message to Receiver. 2. Receiver's inbound mail server receives mail. 3. Receiver's server checks for SPF (Sender Policy Framework) record of the sending domain published in DNS. Sending domain founded in From: field in the header 4. Inbound e-mail server determines if sending e- mail server's IP address matches the IP address that is published in DNS. 27

Client SMTP Validation CSV Reputable accreditation service Client SMTP authorization (CSA) Domain name accreditation (DNA) 28

Sender Authentication A way of closing your inbox to people you don t know Similar to Instant Messaging Probably longer-term due to MUA changes, but paradigm shifts 29

Filter Based Contents based Rule based scoring Baysian 30

Filtering -- Machine Learning Learn spam versus good (ham) Problem: need source of training data Get users to volunteer GOOD and SPAM But spammers are adapting to machine learning too Images, different words, misspellings, etc. We use machine learning details later 31

Content-based Filtering What is the signature in spam? 'join today', 'FREE' are good indicators for spam! But this doesn t mean mail containing these words are definitely spam, but a high PROBABILITY they are! Use statistics and heuristics to block SPAM How about!!!!!!!!!hello!!!!hello!!!hello? Miss-spelling: Porn P0rn 32

Rule-based Filtering Keyword-based filtering If SUBJECT contains FREE, TEENS, Hello!!! Scoring Free 5 pts and Teens 3 pts If sum beyond threshold then alert Strength Easy to implement Linear computational cost to # of rules Weakness Low precision Adding thousands of rules is a tedious work 33

Bayesian Filtering Scan SPAM emails and nonspam emails to identify tokens in the email corpus Count the number of each token in each corpus Create probability that an email containing this token is a SPAM Similar to rule-based scoring system Different from assigning scores Most popular 34

Bayesian Filtering Once a new email arrives, Identifies token in the email Calculate probability for each token Compute overall probability the email is SPAM based on probability of each token Judge this email is SPAM by comparing the probability with threshold 35

Etcetera Bonded sender Habeas Haiku Disposable email address 36

Bonded Sender Program developed by IronPort systems, now working with TrustE List safe IP addresses Senders must post a bond deposit money with Bonded Sender Portion of bond is confiscated based on complaints However, some users make mistakes, so you get some complaints for free. Need to monitor volume rate (to compute complaint rate) and so that a spammer cannot post a small bond and then send billions of messages quickly Record number of queries about each sender 37

Habeas Haiku Sender warranted email Vigilant to prevent spammers from misusing The Habeas Warrant Mark. Once a breach discovered, unlicensed IP addresses will be placed on Habeas blacklist. 38

Disposable Email Addresses Also called Ephemeral Addresses You have one address for each sender JOSHUAGO1895422@microsoft.com All go to same mailbox If I give you my address, and you send me spam, I just delete the address How do new senders get an address? If I send mail to 3 people, which address is it From? Hard to remember! 39

Miscellaneous Email masking Hide email address from automatic email bot Limit issuing of email account Must involved HIP (Human Interactive Proof) Outbound control Set max. send of mail per day Limit interval between sending mails Mail server vulnerability check Look for open relay, open proxy and zombie 40

Conclusion Lots of different solutions Often, they work best in combination Example: combine machine learning filters with postage or use machine learning filters and HIPs to help stop outbound spam No single discipline can solve this Final solution will combine approaches Safe sender lists and postage help ensure all good mail gets through Filters, blackhole lists stop mail from unknown or known bad senders 41

Phishing 4

What is Phishing? Spoofed email messages and websites designed to fool recipients into divulging personal financial information Sent via Spam techniques Operated by criminals, and getting harder to detect 43

Phishing Attacks Spoofed Email Address (SecretService@ebay.com) Spam Mass Mailing Brand Hijacking Disguised Link to Phisher Site href="http://www.ebay.com:tkbm6yjkimgd23 4dgdfhfnbjghuiiqrfgfdhgjgtWdfdbhjiuEbnku od5fetnuo3243h*@211.56.245.66:7301/" 44

Phishing Attacks Website doesn t match branding Brand Hijacking Request for Sensitive Information 45

Can You Detect It? Website URL may not match hijacked company phisher websites are increasingly hosted offshore, and may show a numeric IP address rather than a domain IE Bug let phishers make fake URLs Other devious ways to trick you Popups and redirections 46

Latest Trick Javascript fake Address bar Displays the real URL of the bank website Displays it as https secure Actually works 47