Feeds

Spam: it sucks like a tarpit

Trapping the pump'n'dumpers

3 Big data security analytics techniques

Spam sucks. That is the conclusion reached by a roomful of scientists at MIT on Friday after hearing a bunch of new research papers pitched at dealing with the problem.

Before adjourning to the pub, the group voted on the best paper. The award went to Ken Simpson, founder and CEO of Vancouver-based Mail Channels.

Simpson's paper was one of two covering tarpit simulators. Tarpit simulators are a way of throttling delivery times - slowing the speed of the bits - of suspected spam. For example, think of a web page loading very slowly. You'll kill the attempt and retry and often it will load quicker. The idea is that spammers are impatient and will give up if it is taking too long for their messages to get through.

Simpson's start-up company has been working on this for two and a half years, during which time the idea has mutated from the original goal of reducing spam into creating a product that would help deal with the volume.

"We had a theory that if spammers get impatient they will just go away," he said in his presentation. He was talking particularly about pump-and-dump spam – for example, the image-based messages that began appearing last November. He cited a New York Times study of a typical spam campaign of this type.

Just before the New York stock market closed on a Friday, a buyer acquired 11 million shares of an obscure penny stock. After a weekend of spam, the stock touted in these messages ticked upwards in the first few minutes of trading on Monday, just enough to net the spammers about $20,000 for their weekend's rampage.

For campaigns like these, speed and timing are of the essence. Therefore, the spammers turned out to be surprisingly impatient. The Request for Comments documents (RFCs) on which good email practice is based recommend that a sender stay connected for 10 minutes to ensure that a message is sent successfully, which gave him an opportunity to observe senders' behaviours.

Simpson's research showed that 80 to 90 per cent of spam traffic drops off after two minutes – with no loss of legitimate traffic. With throttling in place, he says, the load is hugely reduced, dropping the amount of spam landing in junk folders by 90 per cent and the amount that escapes the filters and lands in inboxes by 25 per cent.

The price, however, is a huge rise in the number of concurrent connections, which are far above the number most mail transfer agents can handle. Mail Channels handles this by creating a middle layer, a front end for SMTP that multiplexes these many connections into a small number the MTA is comfortable with.

"I think eventually everybody will have to have throttling," said Simpson. "But others disagree."

Tobias Eggendorfer, author of the second tarpits paper, noted that greylisting has begun to fail. This technique, which many people fighting spam favour, relies on requiring senders to retry.

3 Big data security analytics techniques

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.