DOC PREVIEW
Yale CPSC 155 - E-Commerce

This preview shows page 1-2-3-19-20-39-40-41 out of 41 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 41 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 41 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 41 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 41 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 41 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 41 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 41 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 41 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 41 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

CS155b: E-CommerceWhat is Spam? Source: Mail Abuse Prevention System, LLCSpam About SpamWhy is Spam such a problem?Consequences of SpamHow is E-mail Sent? Source: RFC 821 (SMTP)Example Mail ExchangeTracking SpamE-Mail HeadersSpoofing E-mail HeadersOpen Mail RelaysRelay RejectionSlide 13SpamAssassin: OverviewJudging Spam: Example #1Judging Spam: Results #1Judging Spam: Example #2Judging Spam: Results #2SpamAssassin: Techniques Source: SpamAssassin.org (developers’ website)Tricks to Avoid FiltersExamples of Tricks Source: spam-stopper.netProposals to Eliminate SpamProve You are a HumanThe Yahoo! CAPTCHAVirusesHow Does One Get Infected?Types of VirusesViruses: Question #1Slide 29Consent to Run CodeViruses: Question #2Slide 32Viruses: Question #3Slide 34Beware of AttachmentsFiles That Can Contain CodeExample: MelissaExample: Code RedOther Nasty Virus TricksViruses and BusinessThe Cost of Disinfection Source: CNET.com NewsCS155b: E-CommerceLecture 23: April 17, 2003E-Mail Abuse: Spam and VirusesAcknowledgements: V. Ramachandran (Yale)and C. Dwork (Microsoft)What is Spam?Source: Mail Abuse Prevention System, LLC•Spam is unsolicited bulk e-mail (primarily used for advertising).•An electronic message is spam IF:(1)the recipient's personal identity and context are irrelevant because the message is equally applicable to many other potential recipients; AND(2) the recipient has not verifiably granted deliberate, explicit, and still-revocablepermission for it to be sent; AND(3) the transmission and reception of the message appears to the recipient to give a disproportionate benefit to the sender.Spam About SpamWhy is Spam such a problem?•Simple answer: People don’t like it!•Cost:–Postal mail and telephone calls cost money.–Sending e-mail does not (in general).•Speed:–Messages created and sent to many users instantaneously, without human effort.–(Almost) Instant notification of success or failure to reach destination.Consequences of Spam•Large amounts of network traffic (?)–Network congestion–Mail servers can be overloaded with network requests; could slow mail delivery•Wasted Time and Storage–Downloading headers & checking mail takes longer–More unwanted mail to delete–E-mail must be stored at servers–Microsoft: 65-85% of storage costs go to SpamHow is E-mail Sent?Source: RFC 821 (SMTP)Example Mail Exchange[vijayr@cyndra ~]$ telnet netra 25Trying 128.36.229.21...Connected to netra.cs.yale.edu (128.36.229.21).Escape character is '^]'.220 netra.cs.yale.edu ESMTP PostfixHELO cyndra250 netra.cs.yale.eduMAIL FROM:[email protected] OkRCPT TO:[email protected] OkDATA354 End data with <CR><LF>.<CR><LF>This is a test.250 Ok: queued as EE0A5D728EQUIT221 ByeConnection closed by foreign host.Tracking Spam•SMTP runs on top of TCP.–Packets are acknowledged.–Source of packets is known in any successfulmail session.•SMTP servers add the IP address and hostname of every mail server or host involved in the sending process to thee-mail’s message header.•But, dynamic IP addresses and large ISPs can make it difficult to identify senders.E-Mail HeadersSpoofing E-mail Headers•Most e-mail programs use (and most people see) only the standard “To,” “Cc,” “From,” “Subject,” and “Date” headers.•All of these are provided as part of the mail data by the mail sender’s client.•Any of this information can be falsified.•The only headers you can always believe are message-path headers from trusted SMTP servers.Open Mail Relays•An open mail relay is an SMTP server that will send mail when the sender and recipient are not in the server’s domain.•These servers can be used to obfuscate the mail-sending path of messages.•Mail-sending cost can be offloaded to servers not under spammers’ control.•Most servers are now configured to reject relays, and many servers will not accept mail from known open mail relays.Relay Rejection[vijayr@cyndra ~]$ telnet mail.cloud9.net 25Trying 168.100.1.4...Connected to russian-caravan.cloud9.net (168.100.1.4).Escape character is '^]'.220 russian-caravan.cloud9.net ESMTP PostfixMAIL FROM:[email protected] OkRCPT TO:[email protected] <[email protected]>: Relay access deniedQUIT221 ByeConnection closed by foreign host.•SpamAssassin is a spam-fighting tool.•Primary development efforts exist for the open-source, UNIX-compatible version. The source code and select Linux binaries are available for free download (for non-commercial use).•Commercial and Windows-compatible products are available that use the technology.•SpamAssassin is installed on many ISP mail servers and is used by the CS dept. at Yale.SpamAssassin: Overview•Filtering is done at the mail server.(But, the technology can also be used to create plug-ins for mail clients.)•Messages receive a score.–Message content and headers are parsed.–The more occurrences of Spam-like items in the message, the higher the score.•Messages with scores above a threshold are automatically moved from the user’s INBOX.•Tolerance for Spam is user-configurable.Judging Spam: Example #1Judging Spam: Results #1Judging Spam: Example #2Judging Spam: Results #2SpamAssassin: TechniquesSource: SpamAssassin.org (developers’ website)The spam-identification tactics used include: •header analysis: spammers use a number of tricks to mask their identities, fool you into thinking they've sent a valid mail, or fool you into thinking you must have subscribed at some stage. SpamAssassin tries to spot these. •text analysis: again, spam mails often have a characteristic style (to put it politely), and some characteristic disclaimers and CYA text. SpamAssassin can spot these, too. •blacklists: SpamAssassin supports many useful existing blacklists, such as mail-abuse.org, ordb.org or others. •Razor: Vipul's Razor is a collaborative spam-tracking database, which works by taking a signature of spam messages. Since spam typically operates by sending an identical message to hundreds of people, Razor short-circuits this by allowing the first person to receive a spam to add it to the database -- at which point everyone else will automatically block it. Once identified, the mail can then be optionally tagged as spam for later filtering using the user's own mail user-agent application.Tricks to Avoid Filters•Use MIME-/UU-encoding for messages.–E-mail messages can be in complex formats; this allows messages to contain multiple parts


View Full Document

Yale CPSC 155 - E-Commerce

Documents in this Course
Portals

Portals

16 pages

Lecture 4

Lecture 4

30 pages

Lecture 2

Lecture 2

20 pages

Lecture 2

Lecture 2

19 pages

Lecture 9

Lecture 9

25 pages

Lecture 7

Lecture 7

23 pages

Load more
Download E-Commerce
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view E-Commerce and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view E-Commerce 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?