Download File

Total Page:16

File Type:pdf, Size:1020Kb

Download File Scaling up VoIP: Transport Protocols and Controlling Unwanted Communication Requests Kumiko Ono Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2012 c 2012 Kumiko Ono All Rights Reserved ABSTRACT Scaling up VoIP: Transport Protocols and Controlling Unwanted Communication Requests Kumiko Ono Millions of people worldwide use voice over IP (VoIP) services not only as cost-effective alternatives to long distance and international calls but also as unified communication tools, such as video conferencing. Owing to the low cost of new user accounts, each person can easily obtain multiple accounts for various purposes. Rich VoIP functions combined with the low cost of new accounts and connections attract many people, resulting in a dramatic increase in the number of active user accounts. Internet telephony service providers (ITSPs), therefore, need to deploy VoIP systems to accommodate this growing demand for VoIP user accounts. Attracted people also include bad actors who make calls that are unwanted to callees. Once ITSPs openly connect with each other, unwanted bulk calls will be at least as serious a problem as email spam. This dissertation studies how we can reduce load both on ITSPs and end users to ensure continuing the success of VoIP services. From ITSPs' perspective, the scalability of VoIP servers is of importance and concern. Scalability depends on server implementation and the transport protocol for SIP, VoIP sig- naling. We conduct experiments to understand the impact of connection-oriented transport protocols, namely, TCP and SCTP, because of the additional costs of handling connec- tions. Contradicting the negative perception of connection-oriented transport protocols, our experimental results demonstrate that the TCP implementation in Linux can maintain comparable capacity to UDP, which is a lightweight connection-less transport protocol. The use of SCTP, on the other hand, requires improving the Linux implementation since the not-well-tested implementation makes a server less scalable. We establish the maximum number of concurrent TCP or SCTP connections as baseline data and suggest better server configurations to minimize the negative impact of handling a large number of connections. Thus, our experimental analysis will also contribute to the design of other servers with a very large number of TCP or SCTP connections. From the perspective of end users, controlling unwanted calls is vital to preserving the VoIP service utility and value. Prior work on preventing unwanted email or calls has mainly focused on detecting unwanted communication requests, leaving many messages or calls unlabeled since false positives during filtering are unacceptable. Unlike prior work, we explore approaches to identifying a \good" call based on signaling messages rather than content. This is because content-based filtering cannot prevent call spam from disturbing callees since a ringing tone interrupts them before content is sent. Our first approach uses \cross-media relations." Calls are unlikely to be unwanted if two parties have previously communicated with each other through other communication means. Specifically, we propose two mechanisms using cross-media relations. For the first mechanism, a potential caller offers her contact addresses which might be used in future calls to the callee. For the second mechanism, a callee provides a potential caller with weak secret for future use. When the caller makes a call, she conveys the information to be identified as someone the callee contacted before through other means. Our prototype illustrates how these mechanisms work in Web-then-call and email-then-call scenarios. In addition, our user study of received email messages, calls, SMS messages demonstrates the potential effectiveness of this idea. Another approach uses caller's attributes, such as organizational affiliation, in the case where two parties have had no prior contact. We introduce a lightweight mechanism for validating user attributes with privacy-awareness and moderate security. Unlike existing mechanisms of asserting user attributes, we design to allow the caller to claim her attributes to callees without needing to prove her identity or her public key. To strike the proper balance between the ease of service deployment and security, our proposed mechanism relies on transitive trust, through an attribute validation server, established over transport layer security. This mechanism uses an attribute reference ID, which limits the lifetime and restricts relying parties. Our prototype demonstrates the simplicity of our concept and the possibility of practical use. Table of Contents 1 Introduction1 1.1 The Need for Reducing Load on SIP Servers: Understanding the Impact of Transport Protocols for SIP...........................3 1.2 The Need for Reducing Load on Callees: Controlling Unwanted Calls....5 1.3 Thesis Outline and Contributions........................7 I The Impact of Transport Protocols on Large-Scale SIP Servers9 2 Background and Related Work 10 2.1 Introduction.................................... 10 2.2 SIP Specification of Transport Protocols.................... 10 2.3 SIP Implementation and Deployment of Transport Protocols........ 11 2.4 TCP and SCTP Features Affecting Server Performance........... 12 2.4.1 Connection Orientation......................... 12 2.4.2 One-to-Many Sockets for SCTP..................... 13 2.4.3 Message Orientation in SCTP...................... 16 2.5 SIP Servers.................................... 16 2.5.1 Service Architecture........................... 16 2.5.2 Long Connection Lifetime........................ 18 2.6 Capacity Requirements for a SIP Server.................... 19 2.7 Components Affecting Server Performance................... 22 2.8 Scalable Servers Using TCP........................... 23 i 2.9 SIP Server Performance............................. 24 3 Understanding the Impact of Using TCP and SCTP on Echo Server Scal- ability 27 3.1 Introduction.................................... 27 3.2 Measurement Goals and Metrics........................ 28 3.3 Experimental Setup............................... 28 3.3.1 Server Under Test............................ 28 3.3.2 Echo Clients............................... 29 3.4 Measurement Results Using TCP........................ 30 3.4.1 The Maximum Number of Concurrent Connections.......... 30 3.4.2 The Cost of Establishing and Maintaining TCP Connections.... 32 3.5 Measurement Results Using SCTP....................... 35 3.5.1 The Maximum Number of Concurrent Connections and the Effect of One-to-Many Sockets.......................... 35 3.5.2 Data Transfer Latency and the Effect of One-to-Many Sockets... 38 3.5.3 The Effect of Piggyback Setup..................... 39 3.6 Conclusion.................................... 41 4 Understanding the Impact of Using TCP and SCTP on SIP Server Scal- ability 44 4.1 Introduction.................................... 44 4.2 Measurement Goals and Metrics........................ 45 4.3 Experimental Setup............................... 46 4.3.1 Servers Under Test............................ 46 4.3.2 User Clients................................ 46 4.4 Measurement Results Using TCP........................ 46 4.4.1 The Impact of Using TCP on SIP Operations............. 46 4.5 Measurement Results Using SCTP....................... 51 4.5.1 Data Transfer Latency and the Effect of Message Orientation.... 51 ii 4.6 Applicability of SIP Registrar Measurements for Estimating the Impact of Using TCP or SCTP on a SIP Proxy Server.................. 53 4.7 Conclusion.................................... 55 5 Guidelines on Transport Protocols 56 5.1 Implementation Guidelines........................... 56 5.2 Transport Protocol Design Guidelines..................... 57 II Controlling Unwanted Communication Requests 58 6 Definitions, Background, and Related Work 59 6.1 Introduction.................................... 59 6.2 Definitions..................................... 60 6.3 Ways People Trust Each Other......................... 62 6.3.1 Trust Relationships Based on Direct Interactions........... 62 6.3.2 Trust Relationships without Direct Interactions............ 63 6.4 Good Calls or Messages............................. 67 6.5 Preventing Unwanted Communication Requests: Calls and Email...... 69 6.5.1 Detecting Unwanted Email or Calls.................. 72 6.5.2 Identifying Good Email Messages or Calls............... 76 6.6 Limited Availability of Caller ID Authentication to Callees......... 80 6.6.1 Overview of Caller ID.......................... 80 6.6.2 Anonymous Caller ID services...................... 81 6.6.3 Limitations of Caller ID Authentication Mechanisms......... 81 6.7 Limitations of Caller-ID-based Filtering.................... 82 6.8 Limitations on the Use of Caller ID as a Caller's Attribute......... 83 7 Using Cross-Media Relations to Identify Good Communication Requests 87 7.1 Introduction.................................... 87 7.2 Hypotheses.................................... 88 iii 7.3 Cross-Media Relations.............................. 88 7.4 Service Architecture............................... 89 7.5 Collecting Contact Addresses of Potential Callers............... 91 7.5.1 Scenario 1: Web-then-Call Relations.................. 91 7.5.2 Scenario 2: Email-then-Call Relations................. 94 7.6 Sharing a Weak Secret Generated by Callee.................. 95 7.6.1 Scenario 1: Web-then-Call Relations.................
Recommended publications
  • Trendmicro™ Hosted Email Security
    TrendMicro™ Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. The names of companies, products, people, characters, and/or data mentioned herein are fictitious and are in no way intended to represent any real individual, company, product, or event, unless otherwise noted. Complying with all applicable copyright laws is the responsibility of the user. Copyright © 2016 Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, and TrendLabs are trademarks or registered trademarks of Trend Micro, Incorporated. All other brand and product names may be trademarks or registered trademarks of their respective companies or organizations. No part of this publication may be reproduced, photocopied, stored in a retrieval system, or transmitted without the express prior written consent of Trend Micro Incorporated. Authors : Michael Mortiz, Jefferson Gonzaga Editorial : Jason Zhang Released : June 2016 Table of Contents 1 Best Practice Configurations ................................................................................................................................. 8 1.1 Activating a domain ....................................................................................................................................... 8 1.2 Adding Approved/Blocked Sender ................................................................................................................ 8 1.3 HES order
    [Show full text]
  • Guide to Open Source Solutions
    White paper ___________________________ Guide to open source solutions “Guide to open source by Smile ” Page 2 PREAMBLE SMILE Smile is a company of engineers specialising in the implementing of open source solutions OM and the integrating of systems relying on open source. Smile is member of APRIL, the C . association for the promotion and defence of free software, Alliance Libre, PLOSS, and PLOSS RA, which are regional cluster associations of free software companies. OSS Smile has 600 throughout the World which makes it the largest company in Europe - specialising in open source. Since approximately 2000, Smile has been actively supervising developments in technology which enables it to discover the most promising open source products, to qualify and assess them so as to offer its clients the most accomplished, robust and sustainable products. SMILE . This approach has led to a range of white papers covering various fields of application: Content management (2004), portals (2005), business intelligence (2006), PHP frameworks (2007), virtualisation (2007), and electronic document management (2008), as well as PGIs/ERPs (2008). Among the works published in 2009, we would also cite “open source VPN’s”, “Firewall open source flow control”, and “Middleware”, within the framework of the WWW “System and Infrastructure” collection. Each of these works presents a selection of best open source solutions for the domain in question, their respective qualities as well as operational feedback. As open source solutions continue to acquire new domains, Smile will be there to help its clients benefit from these in a risk-free way. Smile is present in the European IT landscape as the integration architect of choice to support the largest companies in the adoption of the best open source solutions.
    [Show full text]
  • A Survey of Learning-Based Techniques of Email Spam Filtering
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Unitn-eprints Research A SURVEY OF LEARNING-BASED TECHNIQUES OF EMAIL SPAM FILTERING Enrico Blanzieri and Anton Bryl January 2008 (Updated version) Technical Report # DIT-06-056 A Survey of Learning-Based Techniques of Email Spam Filtering Enrico Blanzieri, University of Trento, Italy, and Anton Bryl University of Trento, Italy, Create-Net, Italy [email protected] January 11, 2008 Abstract vertising pornography, pyramid schemes, etc. [68]. The total worldwide financial losses caused by spam Email spam is one of the major problems of the to- in 2005 were estimated by Ferris Research Analyzer day’s Internet, bringing financial damage to compa- Information Service at $50 billion [31]. nies and annoying individual users. Among the ap- Lately, Goodman et al. [39] presented an overview proaches developed to stop spam, filtering is an im- of the field of anti-spam protection, giving a brief portant and popular one. In this paper we give an history of spam and anti-spam and describing major overview of the state of the art of machine learn- directions of development. They are quite optimistic ing applications for spam filtering, and of the ways in their conclusions, indicating learning-based spam of evaluation and comparison of different filtering recognition, together with anti-spoofing technologies methods. We also provide a brief description of and economic approaches, as one of the measures other branches of anti-spam protection and discuss which together will probably lead to the final victory the use of various approaches in commercial and non- over email spammers in the near future.
    [Show full text]
  • Detecting Phishing in Emails Srikanth Palla and Ram Dantu, University of North Texas, Denton, TX
    1 Detecting Phishing in Emails Srikanth Palla and Ram Dantu, University of North Texas, Denton, TX announcements. The third category of spammers is called Abstract — Phishing attackers misrepresent the true sender and phishers. Phishing attackers misrepresent the true sender and steal consumers' personal identity data and financial account steal the consumers' personal identity data and financial credentials. Though phishers try to counterfeit the websites in account credentials. These spammers send spoofed emails and the content, they do not have access to all the fields in the lead consumers to counterfeit websites designed to trick email header. Our classification method is based on the recipients into divulging financial data such as credit card information provided in the email header (rather than the numbers, account usernames, passwords and social security content of the email). We believe the phisher cannot modify numbers. By hijacking brand names of banks, e-retailers and the complete header, though he can forge certain fields. We credit card companies, phishers often convince the recipients based our classification on three kinds of analyses on the to respond. Legislation can not help since a majority number header: DNS-based header analysis, Social Network analysis of phishers do not belong to the United States. In this paper we and Wantedness analysis. In the DNS-based header analysis, present a new method for recognizing phishing attacks so that we classified the corpus into 8 buckets and used social the consumers can be vigilant and not fall prey to these network analysis to further reduce the false positives. We counterfeit websites. Based on the relation between credibility introduced a concept of wantedness and credibility, and and phishing frequency, we classify the phishers into i) derived equations to calculate the wantedness values of the Prospective Phishers ii) Suspects iii) Recent Phishers iv) Serial email senders.
    [Show full text]
  • Analysis and Testing of Voip- Subsystems of Ipbrick
    ANALYSIS AND TESTING OF VOIP- SUBSYSTEMS OF IPBRICK SWAMY H K Julho de 2017 1 ANALYSIS AND TESTING OF VOIP-SUBSYSTEMS OF IPBRICK PORTUGAL, S.A. SWAMY HK Department of Electrical Engineering Master‟s in Electrical Engineering – Power Systems 2017 2 3 Report prepared for the partial satisfaction of the requirements of DSEE Unit Course – Dissertation of the Master‟s in Electrical Engineering – Power Systems Swamy HK, Nº 1150084, [email protected] Professor.Sergio Ramos , [email protected] Company: IP BRICK, Oporto, Portugal Supervisor: Mr. Miguel Ramalhão, [email protected] Department of Electrical Engineering Master‟s in Electrical Engineering – Power Systems 2017 4 5 Where there is righteousness in the heart, There is beauty in the character. When there is beauty in the character, There is harmony in the home. When there is harmony in the home, There is order in the nation. When there is order in the nation, There is peace in the world.” - APJ Abdul Kalam 6 7 ACKNOWLEDGMENT At the end, the last stage of many successful stages over the course of my academic career comes to an end and its pride and pleasure that I completed it. During the development of this thesis work, the support and encouragement of several people were fundamental. So I would like to thank all those who have left their footprints in my way. This journey would not have been possible without the support of my professors, supervisors and mentors, family and friends. To my family thank you for encouraging me in all my pursuits and inspiring me to follow my dreams.
    [Show full text]
  • Efficient Spam Filtering System Based on Smart Cooperative Subjective and Objective Methods*
    Int. J. Communications, Network and System Sciences, 2013, 6, 88-99 http://dx.doi.org/10.4236/ijcns.2013.62011 Published Online February 2013 (http://www.scirp.org/journal/ijcns) Efficient Spam Filtering System Based on Smart * Cooperative Subjective and Objective Methods Samir A. Elsagheer Mohamed1,2 1College of Computer, Qassim University, Qassim, KSA 2Electrical Engineering Department, Faculty of Engineering, Aswan University, Aswan, Egypt Email: [email protected], [email protected] Received September 17, 2012; revised January 16, 2013; accepted January 25, 2013 ABSTRACT Most of the spam filtering techniques are based on objective methods such as the content filtering and DNS/reverse DNS checks. Recently, some cooperative subjective spam filtering techniques are proposed. Objective methods suffer from the false positive and false negative classification. Objective methods based on the content filtering are time con- suming and resource demanding. They are inaccurate and require continuous update to cope with newly invented spammer’s tricks. On the other side, the existing subjective proposals have some drawbacks like the attacks from mali- cious users that make them unreliable and the privacy. In this paper, we propose an efficient spam filtering system that is based on a smart cooperative subjective technique for content filtering in addition to the fastest and the most reliable non-content-based objective methods. The system combines several applications. The first is a web-based system that we have developed based on the proposed technique. A server application having extra features suitable for the enter- prises and closed work groups is a second part of the system. Another part is a set of standard web services that allow any existing email server or email client to interact with the system.
    [Show full text]
  • Account Administrator's Guide
    ePrism Email Security Account Administrator’s Guide - V10.4 4225 Executive Sq, Ste 1600 Give us a call: Send us an email: For more info, visit us at: La Jolla, CA 92037-1487 1-800-782-3762 [email protected] www.edgewave.com © 2001—2016 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners. The Email Security software and its documentation are copyrighted materials. Law prohibits making unauthorized copies. No part of this software or documentation may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into another language without prior permission of EdgeWave. 10.4 Contents Chapter 1 Overview 1 Overview of Services 1 Email Filtering (EMF) 2 Archive 3 Continuity 3 Encryption 4 Data Loss Protection (DLP) 4 Personal Health Information 4 Personal Financial Information 5 Document Conventions 6 Other Conventions 6 Supported Browsers 7 Reporting Spam to EdgeWave 7 Contacting Us 7 Additional Resources 7 Chapter 2 Portal Overview 8 Navigation Tree 9 Work Area 10 Navigation Icons 10 Getting Started 11 Logging into the portal for the first time 11 Logging into the portal after registration 12 Changing Your Personal Information 12 Configuring Accounts 12 Chapter 3 EdgeWave Administrator
    [Show full text]
  • A Survey of Open Source Products for Building a SIP Communication Platform
    Hindawi Publishing Corporation Advances in Multimedia Volume 2011, Article ID 372591, 21 pages doi:10.1155/2011/372591 Research Article A Survey of Open Source Products for Building a SIP Communication Platform Pavel Segec and Tatiana Kovacikova Department of InfoCom Networks, University of Zilina, Univerzitna 8215/1, 010 26 Zilina, Slovakia Correspondence should be addressed to Tatiana Kovacikova, [email protected] Received 29 July 2011; Revised 31 October 2011; Accepted 15 November 2011 Academic Editor: T. Turletti Copyright © 2011 P. Segec and T. Kovacikova. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. The Session Initiation Protocol (SIP) is a multimedia signalling protocol that has evolved into a widely adopted communication standard. The integration of SIP into existing IP networks has fostered IP networks becoming a convergence platform for both real- time and non-real-time multimedia communications. This converged platform integrates data, voice, video, presence, messaging, and conference services into a single network that offers new communication experiences for users. The open source community has contributed to SIP adoption through the development of open source software for both SIP clients and servers. In this paper, we provide a survey on open SIP systems that can be built using publically available software. We identify SIP features for service deve- lopment and programming, services and applications of a SIP-converged platform, and the most important technologies support- ing SIP functionalities. We propose an advanced converged IP communication platform that uses SIP for service delivery.
    [Show full text]
  • IFIP AICT 394, Pp
    A Scalable Spam Filtering Architecture Nuno Ferreira1, Gracinda Carvalho1, and Paulo Rogério Pereira2 1 Universidade Aberta, Portugal 2 INESC-ID, Instituto Superior Técnico, Technical University of Lisbon, Portugal [email protected], [email protected], [email protected] Abstract. The proposed spam filtering architecture for MTA1 servers is a component based architecture that allows distributed processing and centralized knowledge. This architecture allows heterogeneous systems to coexist and benefit from a centralized knowledge source and filtering rules. MTA servers in the infrastructure contribute to a common knowledge, allowing for a more rational resource usage. The architecture is fully scalable, ranging from all-in- one system with minimal components instances, to multiple components instances distributed across multiple systems. Filtering rules can be implemented as independent modules that can be added, removed or modified without impact on MTA servers operation. A proof-of-concept solution was developed. Most of spam is filtered due to a grey-listing effect from the architecture itself. Using simple filters as Domain Name System black and white lists, and Sender Policy Framework validation, it is possible to guarantee a spam filtering effective, efficient and virtually without false positives. Keywords: spam filtering, distributed architecture, component based, centralized knowledge, heterogeneous system, scalable deployment, dynamic rules, modular implementation. 1 Introduction Internet mail spam2 is a problem for most organizations and individuals. Receiving spam on mobile devices, and on other connected appliances, is yet a bigger problem, as these platforms are not the most appropriate for spam filtering. Spam can be seen as belonging to one of two major categories: Fraud and Commercial.
    [Show full text]
  • Kolokované Nasazení Asterisk PBX a Kamailio SIP Proxy Ve Funkci SBC
    VŠB – Technická univerzita Ostrava Fakulta elektrotechniky a informatiky Katedra telekomunikační techniky Kolokované nasazení Asterisk PBX a Kamailio SIP Proxy ve funkci SBC Combined Implementation of Asterisk PBX and SIP Proxy Kamailio in the Role of the SBC 2017 Bc. Róbert Šimovič Poďakovanie Rád by som poďakoval Ing. Janovi Rozhonovi, Ph.D., za odbornú pomoc a konzultáciu pri vytváraní tejto diplomovej práce. Abstrakt Práca sa zaoberá vytvorením SBC pomocou spoločného nasadenia pobočkovej ústredne Asterisk a SIP proxy Kamailio. Pri návrhu SBC bolo potrebné brať do úvahy spôsob implementácie oboch platforiem na spoločne zdieľanom virtuálnom serveri. Návrh je vystavaný na novších verziách platforiem a využíva tie výhody oboch platforiem, ktoré robia dané riešenie atraktívne. Kľúčové funkcie pre celý systém sú bezpečnosť a variabilita nastavenia SBC, ktoré je možné meniť podľa aktuálnych požiadaviek. V mojom realizovanom prostredí bolo potrebné navrhnúť súbor bezpečnostných funkcií, ktoré naplňovali funkciu SBC. Celý systém bol vystavený výkonnostnému testovaniu, ktorý som vyhodnocoval pomocou grafov. Zásadou metodiky testovania je možnosť reprodukovateľnosti. Kľúčové slová Kamailio, Asterisk, SBC, testovanie, SIPp, bezpečnosť, VoIP, HTABLE, PIKE, TOPOH, RATELIMIT, TLS Abstract This thesis deals with the creation of SBC by the combined implementation of Asterisk PBX and SIP Proxy Kamailio. When designing the SBC, it was necessary to take in consideration the implementation of both platforms on one share virtual server. The design is based on newer versions of mentioned platforms and uses the benefits of both platforms, which make the solution more attractive. The key functions of the whole system are security and variability of the SBC settings, which can be altered according to actual requirements.
    [Show full text]
  • Homer 5 & Captagent 6
    HOMER 5 & CAPTAGENT 6 Presented by: Alexandr Dubovikov Presentation Written by: Alexandr Dubovikov & Lorenzo Mangani HOMER Development Team http://sipcapture.org Introduction About the Authors - Behind the Project Alexandr Dubovikov Senior Voice Expert for QSC AG, one of the major German voice and data providers. Alexandr holds a diploma in physics of Odessa State University and brings 20 years of experience in telecommunication techniques, contributing to many Open Source projects like FreeSwitch, SER, Kamailio, SEMS, Asterisk, SIPp, Wireshark. Alexandr is founder and the main developer of Homer SIP Capture project. Also founder of IRC RusNet Network, one of the biggest national IRC networks in the world. Lorenzo Mangani Sr. Voice Engineer and Designer for the largest international cable operator worldwide, founder of Amsterdam based QXIP BV, Co-Founder and Developer of Homer SIP Capture project and voice specialist of the NTOP Team. Formerly a Sound Engineer, Lorenzo has been deeply involved with telecommunications and VoIP for well over a decade and has contributed ideas, design concepts and code to many voice-related Open-Source and commercial projects specializing in active and passive monitoring solutions. Introduction About this presentation HOMER has been a resident guest since the inception of Kamailio World and over time the event also became the clock of our major project releases and the stage where we love to introduce the fruit of our hard work to a familiar crowd. This year is of course no exception and we proudly bring you: - HOMER v5 New Features ○ New User-Interface! ○ New Core Functionality! ○ Easy to Extend and Integrate ○ … and so much More! - CAPTAGENT v6 ● New Features ○ New Internal Architecture! ○ Capture Scenarios configuration! ○ Multiple sockets, multiple input & outputs! ○ Additional Protocols & Statistics! ○ … and so much More! Proudly Presenting HOMER 5 HOMER 5 Introduction & History HOMER 5? Wait a second! ..
    [Show full text]
  • White Paper Barracuda • Comprehensive Email Filtering
    Comprehensive Email Filtering White Paper Barracuda • Comprehensive Email Filtering Email has undoubtedly become a valued communications tool among organizations worldwide. With Spam History frequent virus attacks and the alarming influx of spam, email loses the efficiency to communicate. Spam Spam is one form of abuse messages represent the vast majority of email traffic on the Internet. Spam is no longer a simple annoyance; of the Simple Mail Transfer it is a significant security issue and a massive drain on financial resources. Protocol (SMTP), which is implemented in email systems This is simply astounding and unacceptable. It’s time to take control of spam and virus attacks. on the basis of RFC 524. First proposed in 1973, RFC 524 was Filtering Email in Two Advanced Processes developed during a time when computer security was not a Today, there are a number of solutions designed to help alleviate the spam problem. Barracuda Networks significant concern. As such, designed the affordable Barracuda Email Security Gateway as an easy-to-use, enterprise-class hardware and RFC 524 is no longer a secure software solution for businesses of all sizes that comprehensively evaluates each email, using two main command set, making it and classes of sophisticated algorithms and techniques: Connection Management and Mail Scanning. SMTP susceptible to abuse. During the connection management process, emails are filtered through five defense layers to verify Most spam-making tools authenticity of envelope information, and any inappropriate incoming mail connections are dropped exploit the security holes in even before receiving the message. Any emails that survive the connection verification process must then SMTP.
    [Show full text]