Hello Sniffer Folks,

I thought I would drop you a note to let you know some things we're doing behind the scenes to improve filtering accuracy and prevent false positives.

Unqualified false positive candidates:

In partnership with our larger customers we have created a new system to proactively review captured messages that _might_ be unreported false positives (usually they are spam, but some aren't). Through this review process we are able to remove and modify pattern rules that cause occasional low-level false positives that would otherwise not be reported. This system is already allowing us to recode or remove dozens of rules per day to make them more accurate; and to update our rule coding practices and support systems to further improve our accuracy moving forward.

Real-time rule / IP conflict analysis:

Today we have completed a new false-positive early-warning system. This system monitors conflicts between IP reputations and pattern rule matches across the entire fleet of Message Sniffer installations in real-time. Any time a pattern match is in disagreement with a source IP's reputation that information is analyzed and pumped through a sophisticated collection of filters and data-mining tools. The resulting analysis is displayed in real-time in our spam-weather center so that our staff can respond immediately (24x365) if there is any sign of a "bad rule".

Since we launched this new system and operating protocols earlier today we have already had several "events" -- All of them turned out to be valid anti-spam rules capturing content from bot nets that had previously sent *berserkers to improve their IP reputations, or where some of the campaigns in question had leaked sufficiently to produce temporary positive IP reputations on some systems. This information itself is very interesting now that we can see it more clearly and we are already working on ways to identify these cases and reduce the leakage associated with them.

As always your comments, ideas, and suggestions are both welcome and encouraged.

Best,

_M

PS: *berserkers - Blackhats sometimes send messages that are random and/or carry no payload. These "berserkers", sometimes sent by accident by broken bots or broken spam scripts, have the effect of improving the IP reputations of the systems that send them because there is no sufficient content to filter against. In addition these messages are often sent at such low rates that most adaptive filtering systems fail to respond to them--- if those systems were to be (conventionally) sensitized to the berserkers they would also significantly increase their false-positive rates.

We call these berserkers based on the practice of old Norse warriors who, in an uncontrollable state (chaotic, berserk (in a fit of madness), and with the belief they are immune to weapons), would charge directly into the enemies ranks fearlessly attacking anything and everything (friend or foe).

http://en.wikipedia.org/wiki/Berserker



#############################################################
This message is sent to you because you are subscribed to
 the mailing list <[email protected]>.
This list is for discussing Message Sniffer,
Anti-spam, Anti-Malware, and related email topics.
For More information see http://www.armresearch.com
To unsubscribe, E-mail to: <[email protected]>
To switch to the DIGEST mode, E-mail to <[email protected]>
To switch to the INDEX mode, E-mail to <[email protected]>
Send administrative queries to  <[email protected]>

Reply via email to