Feeds

Spam: it sucks like a tarpit

Trapping the pump'n'dumpers

Seven Steps to Software Security

Spam sucks. That is the conclusion reached by a roomful of scientists at MIT on Friday after hearing a bunch of new research papers pitched at dealing with the problem.

Before adjourning to the pub, the group voted on the best paper. The award went to Ken Simpson, founder and CEO of Vancouver-based Mail Channels.

Simpson's paper was one of two covering tarpit simulators. Tarpit simulators are a way of throttling delivery times - slowing the speed of the bits - of suspected spam. For example, think of a web page loading very slowly. You'll kill the attempt and retry and often it will load quicker. The idea is that spammers are impatient and will give up if it is taking too long for their messages to get through.

Simpson's start-up company has been working on this for two and a half years, during which time the idea has mutated from the original goal of reducing spam into creating a product that would help deal with the volume.

"We had a theory that if spammers get impatient they will just go away," he said in his presentation. He was talking particularly about pump-and-dump spam – for example, the image-based messages that began appearing last November. He cited a New York Times study of a typical spam campaign of this type.

Just before the New York stock market closed on a Friday, a buyer acquired 11 million shares of an obscure penny stock. After a weekend of spam, the stock touted in these messages ticked upwards in the first few minutes of trading on Monday, just enough to net the spammers about $20,000 for their weekend's rampage.

For campaigns like these, speed and timing are of the essence. Therefore, the spammers turned out to be surprisingly impatient. The Request for Comments documents (RFCs) on which good email practice is based recommend that a sender stay connected for 10 minutes to ensure that a message is sent successfully, which gave him an opportunity to observe senders' behaviours.

Simpson's research showed that 80 to 90 per cent of spam traffic drops off after two minutes – with no loss of legitimate traffic. With throttling in place, he says, the load is hugely reduced, dropping the amount of spam landing in junk folders by 90 per cent and the amount that escapes the filters and lands in inboxes by 25 per cent.

The price, however, is a huge rise in the number of concurrent connections, which are far above the number most mail transfer agents can handle. Mail Channels handles this by creating a middle layer, a front end for SMTP that multiplexes these many connections into a small number the MTA is comfortable with.

"I think eventually everybody will have to have throttling," said Simpson. "But others disagree."

Tobias Eggendorfer, author of the second tarpits paper, noted that greylisting has begun to fail. This technique, which many people fighting spam favour, relies on requiring senders to retry.

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.