Department of Software The University of Babylon LECTURE NOTES ON Spam of Email By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@inet.uobabylon.edu.iq 14 December 2013 Def. of Spam Spam messages are the misuse of electronic messaging systems (including most of the media , and digital communication systems ) to send a huge amount of unwanted messages randomly . Although the figure known for messages spam is e-mail (which is what I will talk about in this article ) , but this term is present in other media such as letters of mobile phones , spam blogs, spamming wikis, spam online forums , fax spam . Known spam messages to e-mail other names : write propaganda unwanted ((unsolicited bulk Email (UBE) or junk mail)), or commercial electronic messages unwanted (unsolicited commercial email (UCE). Note 1: One of the biggest problems facing the technology e-mail is spam known as "spam" , which constitute 70 to 80% of the total e-mails sent . 14 December 2013 Dr. Samaher Hussein Ali Notes of Lecture 12 The Problem of Spam Spamming is the scourge of electronic-mail and newsgroups on the Internet. It can seriously interfere with the operation of public services, to say nothing of the effect it may have on any individual's e-mail mail system. ... Spammers are, in effect, taking resources away from users and service suppliers without compensation and without authorization.“ Why All the Fuss? Loss of Productivity. Discouraged Users. Loss of Efficiency. Legal Issues. Communications Quality. Business Continuity. Company Reputation. 14 December 2013 Dr. Samaher Hussein Ali Notes of Lecture 12 Types of Spam Note 2: the fact that most senders of spam infiltrate the computers of Internet users and malicious programs they download it (zombies) and use them to send their messages annoying in huge quantitie. The main Types of Spam: 1. 2. Propaganda :- More types of SPAM e-mails are propaganda, experience has shown that the senders of spam targeting certain goods and services to promote them. Some goods were chosen because computer users might be interested in them, but most of these goods will be on the black market (such as prescription drugs are unauthorized). Spam is considered illegal not only because its goals propaganda but because the goods and services offered by a legal violation in itself. Fraudulent :- such as messages, which claims the owner that the recipient can get a share of the funds was not able to sender obtained by himself for reasons of judicial versus assist the recipient in the legislation of these funds, and asks the recipient to provide details of his account banking, and of course if offered the recipient of this details will be stealing his own account, called this type of message to scam)). 14 December 2013 Dr. Samaher Hussein Ali Notes of Lecture 12 Types of Spam 3. 4. 5. 6. 7. Health and medicine: This category includes advertisements for weight loss, skin care, and treatment of baldness, dietary supplements and drugs that may be unauthorized, and so on, which can be purchased via the Internet. Technology(IT): This category includes offers hardware and software at discounted prices, as well as services to the owners of sites on the Internet such as web hosting, domain registration, and improve the sites, and so on. Personal finance: This type of insurance offers, and services to reduce debt, and loans with low interest rates, and so on. Education and training: This category includes offers for seminars, training, and access to educational certificates via the Internet and this may be a false certification Political spam : This category includes mudslinging or political threats from extremists and possible terrorists. Though these are merely nuisance messages to end users, security and law enforcement officials need to be aware of such mailings, since they can provide clues to genuine potential threats, or may be actual communication between terrorists. 14 December 2013 Dr. Samaher Hussein Ali Notes of Lecture 12 Rate each Type of Spam Messages To produce 13% Trade 22% Fraud 7% Health 10% Net 9% Entertainment 6% Religious 5% The other 25% Second Def. of spam (n): Unsolicited e-mail, often of a commercial nature, sent indiscriminately to multiple mailing lists, individuals, or newsgroups; junk email. 14 December 2013 Dr. Samaher Hussein Ali Notes of Lecture 12 The Spam Threat • Users don’t want spam Lost productivity Offensive, Embarrassing Legitimate messages get lost in the sea of spam • Spam isn’t going away People buy from spammers Legislation has not been effective The SMTP protocol is inadequate It allows spammers to forge message information • Spam is difficult to detect Spammers learn how to get past filters Legitimate messages WILL be lost • Anti-Spam is difficult to support Users don’t like misclassifications Client based anti-spam solutions interfere Authorized mass-mailers want special treatment • Spammers use malware Viruses “spam” themselves in mass quantities Compromised computers DoS attack Anti-Spam services (RBLs) Compromised computers send spam from inside the network 14 December 2013 Dr. Samaher Hussein Ali Notes of Lecture 12 The Disadvantages of Spam 1. According to a study conducted by Nucleus Research in 2009 , cost management process spam messages American companies more than 71 billion dollars a year because of the cost of lost production hours at a rate of $ 712 per employee . physical damage to the annoying messages can be summarized in the following points: 2. causing wasted staff time , because users who do not have protection against spam messages Sédron a lot of time to check their messages and delete spam messages from them. 3. the possibility that the user accidentally deletes an important message because of the mixing of spam messages with important messages . 4. spam messages cause the waste of network resources , particularly e-mail server , such as viruses causing it to fill in the database. 5. senders of spam usually infiltrate the computers of users and spam messages they send 14 December 2013 them without their permission Dr. Samaher Hussein Ali (Session hijacking). Notes of Lecture 12 How can we avoid the Spam Message? 1. Two email addresses. You should use your private address for personal correspondence only. The public address should be the one you use to register on public forums, in chat rooms, to subscribe to mailing lists etc. 2. Never publish your private address on publicly accessible resources. 3. Your private address should be difficult to spoof. Spammers use combinations of obvious names, words and numbers to build possible addresses. Your private address should not simply be your first and last name. Be creative and personalize your email address 4. If you have to publish your private address electronically, mask it to avoid having it harvested by spammers. Joe.Smith@yahoo.com is easy to harvest, as is Joe.Smith at yahoo.com. Try writing Joe-dot-Smith-at-yahoo-dot-com instead. If you need to publish your private address on a website, do this as a graphics file rather than as a link. 14 December 2013 Dr. Samaher Hussein Ali Notes of Lecture 12 How can we avoid the Spam Message? 5. Treat your public address as a temporary one. Chances are high that spammers will harvest your public address fairly quickly. Don't be afraid to change it often. 6. Always use your public address to register in forums and chatrooms and to subscribe to mailing lists and promotions. You might even consider using a number of public addresses in order to trace which services are selling addresses to spammers. 7. Never respond to spam. Most spammers verify receipt and log responses. The more you respond, the more spam you will receive 8. If your private address is discovered by spammers - change it. This can be inconvenient, but changing your email address does help you to avoid spam - at least for a while!. 9. Do not click on ‘unsubscribe’ links from questionable sources. Spammers send fake unsubscribe letters in an attempt to collect active addresses. You certainly don't want to have your address tagged as ‘active’ as it will just increase the amount of spam that you receive. 14 December 2013 Dr. Samaher Hussein Ali Notes of Lecture 12 How can we Reduce the Spam Message? Spammers are very resourceful and will find a way to get their messages to you. The only way to really eliminate spam is to use expensive custom anti-spam services like the ones used in large corporate spam firewalls. Given the ingenuity of spammers that may not last for long either. Here, the main significant methods to reduce spam. 1. Remove all clear text email addresses from your website. 2. Make sure your computer is secure 3. Mark all junk emails as junk. 4. Secure all web forms with captcha. Captcha is that wierd box with those hard to read letters. It is there because computers can't make sense of that image and people can. This stops robots from filling out online forms and clogging your inbox. Some industrious spammers will actually pay people to manually fill out online forms but it is a very small percentage of the total spam. 5. Don't forward chain letters. 6. Don't reply to spam 7. Watch out for check boxes that are already selected. 8. Turn off read and delivery receipts and automatic processing of meeting requests 9. Block pictures in HTML messages that spammers use as Web beacons 14 December 2013 Dr. Samaher Hussein Ali Notes of Lecture 12 As a result, Third def. of Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. Most spam is commercial advertising, often for dubious products, get-richquick schemes, or quasi-legal services. Spam costs the sender very little to send -most of the costs are paid for by the recipient or the carriers rather than by the sender Spam filter is a program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox. The Anti-Spam SMTP Proxy (ASSP) server project is an Open Source, Perl based, platform-independent transparent SMTP proxy server available at SourceForge.net that leverages numerous methodologies and technologies to both rigidly and adaptively identify e-mail spam. ASSP is easy to set up because it requires only minor changes to the configuration of your Mail Transfer Agent 14 December 2013 Dr. Samaher Hussein Ali Notes of Lecture 12 Anti-Spam Technologies Although some spam will inevitably get through, a spam slammer -- otherwise known as a spam blocker or anti-spam, etc -- saves an enormous amount of time that we would otherwise spend in sifting out the junk by doing this manually. Generally, anti-spam techniques fall into four categories: 1. Filters 2. Sender Policy Framework (SPF)/Reverse Lookup 3. Challenge/Response 4. Cryptography Note 3: In this lecture, we discuss the main steps of Filtering Process: 14 December 2013 Dr. Samaher Hussein Ali Notes of Lecture 12 Filtering Process Emails are processed in five phases: 1. Initialization Email client receives email, forwards it to Spamato, and waits for check result. msg isSpam(msg) 2. Pre-Check Veto against further processing (Configuration, Sender-whitelist) Spamato Base Gain information for other plugins (URL extractor) msg msg msg Filter 1 Filter 2 Filter N PreCheck(msg) PreCheck(msg) veto1(msg) veto2(msg) ..... PreCheck(msg) vetoN(msg) veto(msg) == true ignore this msg Checkpoint PreCheck veto(msg) = veto1(msg) || veto2(msg) || … || vetoN(msg) msg msg 14 December 2013 Filter 1 Filter 2 isSpam(msg) msg Dr. Samaher Hussein Ali Filter N Notes of Lecture 12 Filtering Process 3. Check Each filter calculates the spam probability 4. Decision The overall spam probability is calculated and returned to the email client 14 December 2013 Dr. Samaher Hussein Ali Notes of Lecture 12 Filtering Process 5. Post-Check Learn from global decision Collect statistics Note 4: In general, we can split the types of spam filtering into three groups: 1. First group, filter related to list base Black list White list Gray list Black wholly list 2. Second group, filter related to contain base Word base filter Heuristic filter Bayesian Filter 3. Third group, other filter Respon spam 14 December 2013 Dr. Samaher Hussein Ali Notes of Lecture 12 Filtering Process 14 December 2013 Dr. Samaher Hussein Ali Notes of Lecture 12