Hi Sanjay, Conversely to your point, IP addresses/email addresses that have poor reputations due to being a source of UCE/UBE go under heightened scrutiny or may be blocked based on the implementers policy/preference for other protocols.
There are a few IPS/IDS solutions out there utilizing email reputation as part of their solutions, and they primarily get their strength from a centralized managed db on the part of the vendor supplying the solution. Cheers, --- Tremaine Lea Network Security Consultant Intrepid ACL Paranoia for hire The best way to find out if you can trust somebody is to trust them. - Ernest Hemingway On Tue, 2008-11-25 at 21:09 +0530, Sanjay R wrote: > Hi Gautam: > My general feeling towards the reputation system is "It is not a > security mechanism" and it should be proven either by me or by someone > else in more formal words/way. > now let us take the scenario that you posed. each email has a > reputaion value associated with it (magically!!) and IDS should scan > it based on its reputaion value (in this way, we are anyway defeating > the very purpose of having IDS). First thing is " what are parameters > to be used in calculating reputaion?" Another thing is: You must be > knowing that a virus/worm spread quite randomly (loosly speaking) and > many emails infacted by a new virus will be having high reputaion > values and therefore, bypass the IDS ( a case of false negative). > Let me know if you are not convinced or I have missed something in your views. > -sanjay > > On Tue, Nov 25, 2008 at 12:14 AM, Gautam Singaraju > <[EMAIL PROTECTED]> wrote: > > Sanjay, > > > > FYI: > > http://searchsecurity.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid14_gci1271716,00.html > > > > --- > > Gautam > > > > > > > > On Mon, Nov 24, 2008 at 1:24 PM, Gautam Singaraju > > <[EMAIL PROTECTED]> wrote: > >> Hi Sanjay, > >> > >> I have a hearsay that some commercial products are in fact attempting > >> this. I understand that inputs from IDSs are being used to 'refine' > >> email reputation and vice-versa; though I have not seen any numbers > >> that attempt these. > >> > >> The idea is that: IDSs can monitor connections from those senders > >> closely depending on the reputation (reputation 80 to 100: basic > >> checks; 50-80 moderate checks; less than 50 extensive checks). The > >> number of classes and boundaries could be variable. In comparison, > >> blacklist is just "good/bad". > >> > >> I want to test this theory that email reputation could be useful in > >> more mechanisms that just classifying emails. > >> --- > >> Gautam > >> > >> > >> > >> On Mon, Nov 24, 2008 at 1:10 PM, Sanjay R <[EMAIL PROTECTED]> wrote: > >>> Hi Gautam, > >>> Can you please mention those references that have tried to incorporate > >>> email reputation systems into an IDS? To me, it appears that this type > >>> of solutions are more close to creating a "black-list" rather than > >>> core functionality of IDS i.e detecting an attack (malicious > >>> activities). > >>> > >>> -sanjay > >>> > >>> On Sun, Nov 23, 2008 at 6:51 AM, Gautam Singaraju > >>> <[EMAIL PROTECTED]> wrote: > >>>> All, > >>>> > >>>> I have been working in email reputation system that has computed > >>>> sender reputations for over an year. I believe that there are couple > >>>> of efforts to incorporate email reputations into IDSs. Is someone in > >>>> the group working on this? Are there any IDSs which can be configured > >>>> to perform extensive analysis for non-reputable senders? I would be > >>>> interested in sharing this data with other researchers in the group. > >>>> > >>>> --- > >>>> Gautam > >>>> > >>>> ------------------------------------------------------------------------ > >>>> Test Your IDS > >>>> > >>>> Is your IDS deployed correctly? > >>>> Find out quickly and easily by testing it > >>>> with real-world attacks from CORE IMPACT. > >>>> Go to > >>>> http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw > >>>> to learn more. > >>>> ------------------------------------------------------------------------ > >>>> > >>>> > >>> > >>> > >>> > >>> -- > >>> Computer Security Learner > >>> > >> > > > > > ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.coresecurity.com/index.php5?module=Form&action=impact&campaign=intro_sfw to learn more. ------------------------------------------------------------------------