19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 13-1:<br />

Limiting the<br />

number of<br />

resources<br />

that handle<br />

inbound<br />

messages.<br />

Chapter 13: Communication and Messaging Systems<br />

Even in large companies, there’s no reason that thousands of inbound e-mail<br />

deliveries should be necessary within a short time period.<br />

Some e-mail servers, especially UNIX-based servers, can be programmed to<br />

deliver e-mails to a daemon or service for automated functions, such as create<br />

this order on the fly when a message from this person is received. If DoS protection<br />

isn’t built in to the system, a hacker can crash both the server and the<br />

application that receives these messages and potentially create e-commerce<br />

liabilities and losses. This can happen more easily on e-commerce websites<br />

when CAPTCHA (short for Completely Automated Public Turing test to tell<br />

Computers and Humans Apart) is not used on forms. I cover web application<br />

security in Chapter 14.<br />

Automated e-mail security controls<br />

You can implement the following countermeasures as an additional layer of<br />

security for your e-mail systems:<br />

✓ Tarpitting: Tarpitting detects inbound messages destined for unknown<br />

users. If your e-mail server supports tarpitting, it can help prevent spam or<br />

DoS attacks against your server. If a predefined threshold is exceeded —<br />

say, more than ten messages — the tarpitting function effectively shuns<br />

traffic from the sending IP address for a period of time.<br />

✓ E-mail firewalls: E-mail firewalls and content-filtering applications from<br />

vendors such as Symantec and Barracuda Networks can go a long way<br />

towards preventing various e-mail attacks. These tools protect practically<br />

every aspect of an e-mail system.<br />

✓ Perimeter protection: Although not e-mail-specific, many firewall and IPS<br />

systems can detect various e-mail attacks and shut off the attacker in<br />

real time. This can come in handy during an attack.<br />

255

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!