Cloudmark is now part of Proofpoint. Learn More

About Proofpoint

Cloudmark White Papers

  • Malware Defense Through Collaborative Filtering

    Traditional anti-virus solutions rely on heuristics and signature-based detection, which derives from the outdated assumption that the malware you saw yesterday will look the same way today.

    Download PDF (1.2MB)
  • Never Inspected, Never Blocked

    Cyber criminals are leveraging DNS networks to circumvent security defences, allowing them to launch DDoS attacks, APTs and data breaches on enterprise networks. This exclusive whitepaper details how DNS is being exploited for nefarious purposes and how you can protect your network.

    Download PDF (764KB)
  • Clustered Email Environments: Aggressive Throttling on Multiple Time Windows

    In the email world, spam and other malicious message types are an ongoing threat to customer satisfaction, provider capacity, and system security.

    Download PDF (250KB)
  • Information Privacy: Carriers Need to Be Savvy, Loud & Proud

    This whitepaper looks at how telcos and leading over-the-top (OTT) players are adjusting to the post-Snowden era, what's at stake and what the operators need to do to reinforce their competitive positioning regarding user privacy.

    Download PDF (169KB)
  • Keeping Wireless Networks and Devices Secure

    Smartphones have become dramatically more sophisticated over the past few years making them more similar to tiny computers than phones. But that sophistication has led to vulnerability — making today's smartphones just as susceptible to malware and security breaches as your typical laptop or desktop PC.

    Download PDF (625KB)
  • The New Frontier in LTE Security: Now for the Application Layer

    As network operators rush to deploy next-generation networks like LTE networks, security — even for the messaging channel—needs to be a top consideration. In this white paper, Patrick Donegan, Senior Analyst at Heavy Reading, presents the top security impacts in next generation network, including IP blacklisting and security risks posed by the introduction of IMS applications like RCS and VoLTE.

    Download PDF (282KB)
  • The True Cost of SMS Spam

    This informative whitepaper explores the impact of SMS spam on mobile network operators and their subscribers. Find out how this growing attack vector is increasing costs, leaking revenue and eroding your brand.

    Download PDF (729KB)
  • SMS Spam Overview

    This white paper details the growth of SMS Spam. Spammers are turning to SMS as a means to reach recipients and elicit illicit revenue. As a result, the number of unique SMS spam campaigns quadrupled in the first half of 2012 and the overall rate of receipt grew by 300% from 2011 to 2012.

    Download PDF (639KB)
  • Mobile Broadband Solutions Overview

    Mobile Broadband adoption is experiencing rapid growth. In 2009, worldwide subscriber counts exceeded 250 million users with nearly 100 million users concentrated in Asia alone–by far the fastest growing region in terms of subscribers. This represents more than a 93% increase from a year earlier, with an even faster adoption trajectory expected in 2010 and beyond.

    Download PDF (334KB)
  • BCP for Near Term SMTP Deployments in IPv6 Networks

    As unallocated IPv4 address space approaches exhaustion, IPv6 deployment becomes more critical for fixed line operators, mobile operators, and enterprises alike. Messaging industry understanding of how IPv6 impacts anti-abuse mechanisms is on the increase, but requires a broader acceptance of some of the risks involved with IPv6 connectivity and associated transition and translation technologies.

    Download PDF (454KB)
  • SMTP Abuse Prevention in IPv6 Networks

    This white paper presents a methodology for handling SMTP traffic from an unknown number of IPv6 source address senders with unknown intentions. Traditional blacklists and related technologies used successfully in IPv4 networks do not map well into IPv6 networks.

    Download PDF (492KB)
  • Mobile Messaging Threats and Requirements

    Mobile messaging generated 130 billion USD in worldwide revenues in 2008 and this figure continues to grow rapidly. As subscribers increasingly rely on their mobile phones for everyday communications, mobile applications and financial transactions, they become an attractive and lucrative target for attackers.

    Download PDF (428KB)
  • Taxonomy of Current and Potential Mobile Threats

    The users of traditional messaging services are well aware of the forms of abuse they face on a regular basis. Spam, phishing and viruses found in email are so common that these terms are part of our collective lexicon and need no definition. Emerging classes of messaging abuse in the mobile environment, however, have led to neologisms like “smishing,” or SMS phishing. Are these mobile threats real, or are they simply media-constructed FUD (fear, uncertainty, doubt) that ultimately distracts security managers from more imminent and damaging threats?

    Download PDF (221KB)
  • Applying Collaborative AntiSpam Techniques to AntiVirus Problem

    One of the most effective techniques available for combating spam is the widespread application of collaborative filtering, where members of a community identify spam messages. We present data and analysis of our success in applying a collaborative filter, originally designed for anti-spam, to the anti-virus problem. We show that not only is a collaborative filter effective for filtering viruses, but also that the community begins filtering the virus within minutes of its initial detection-and with an extremely low false positive rate.

    Download PDF (287KB)
  • Reputation Based Approach for Efficient Filtration of Spam

    In this paper, we describe the collaborative, reputation-based approach to fighting spam that has been developed by Cloudmark. Two core components of our technology are described in depth, namely the Global Threat Network and the Trust Evaluation System. The Global Threat Network rapidly gathers and correlates reports of suspect messages from millions of globally-distributed honeypots, customers, and various other sensors. The Cloudmark Trust Evaluation System (TES) analyzes the reports, assigns a reputation to the suspect messages based upon the reputation of the reporters, and then determines a new reputation for each reporter based upon their historical performance at correctly identifying unwanted content. Because the reputation-based collaborative system does not draw blanket conclusions about terms, hosts, or people, this approach reduces false positives and false criticals, while simultaneously decreasing administration costs.

    Download PDF (430KB)
  • Zero-Hour, Real Time Computer Virus Defense Through Collaborative Filtering

    Conventional anti-virus software relies on a staff of researchers to isolate and analyze viruses, and then write and test rules to block them. This process can take up to 24 hours and often blindly blocks many legitimate messages with attached executable code. In contrast, Cloudmark uses a fingerprinting algorithm to identify each incoming message, combined with a reputation-based, trusted community of users to accurately identify malicious viruses in real-time. Using the Cloudmark Trust Evaluation System (TES), Cloudmark is able to corroborate reports from the Cloudmark Global Threat Network. Cloudmark's virus fingerprinting algorithm automates the time-intensive 'reverse engineering' analysis of conventional technologies allowing its system to identify and stop new worms and virus strains in zero-hours.

    Download PDF (115KB)
  • How Collaborative Filtering Can Stop Future Forms of Messaging Abuse

    Community-based, collaborative filtering is just one of the powerful elements of Cloudmark's messaging security approach. This short white paper outlines why collaborative filtering is so effective at stopping the latest messaging threats and how it ties closely to other aspects of Cloudmark's overall system.

    Download PDF (86KB)
Site Map  •  Privacy Policy  •  ©2002–2019 Cloudmark, Inc.