Feeds

Cloudmark takes anti-spam to the edge

Content filtering at the network edge to keep spam off the core

Internet Security Threat Report 2014

Anti-spam developer Cloudmark claims its high-volume content-filtering email gateway could prevent almost all unwanted email from reaching a network's mail servers.

Many carriers and large enterprises run basic filters and throttles at the network edge, because if they can reject spam there, it takes a pile of dirt off their infrastructure and saves bandwidth, processing and storage. They then run the remainder through content filters such as Cloudmark in the core, before delivering it to users.

Neil Cook, Cloudmark Europe's technology chief, claimed the new gateway (or message transfer agent, MTA) could increase the effectiveness of edge filtering from perhaps 60 or 70 per cent to over 90 per cent, taking yet more load off the network.

He added that with junk now representing as much as 95 per cent of all US email traffic, and maybe 85 per cent of European email traffic, it is essential to block it as early as possible - but until now, content filtering has required too much processing power to do it at the network edge.

According to Cloudmark, its MTA can process messages 20 to 40 times faster than other content filters, making it feasible to do at the edge. Each MTA can scan more than three million messages an hour for spam, viruses and phishing attacks, the company said.

Cook said that the secret of its speed is that it runs messages through just eight single-pass 'fingerprinting' algorithms, rather than using techniques such as pattern-matching.

"Most of our competitors work on heuristics, and have manual centres around the world with people writing new rules to block spam as it is reported," he said. "The problem is that spam is randomised now and changes very rapidly.

"Cloudmark's intelligent fingerprinting algorithms extract the essence of the message - its characteristics and structure, not the text - so they are resistant to mutation and are not language-dependent."

He added that the next thing is for carriers to use these gateways on outbound traffic too, throttling or blocking spam from leaving their infrastructures, and alerting abuse teams to unusual traffic patterns that might indicate zombie PCs.

"There's so much going on in your network that's not through your mail system, and if you can't detect that, you get blacklisted. Blacklisting is a huge incentive - ISPs hate being blacklisted, because of the customer service calls and costs," he said, pointing to Tiscali's recent woes.

Cloudmark's technology is based on Vipul's Razor, an open source spam-filtering scheme invented by its founder, Vipul Ved Prakash. Cook said the Cloudmark version is also available for smaller organisations to use as a SpamAssassin plug-in, replacing Vipul's Razor. ®

Intelligent flash storage arrays

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.