Somebody Set Up Us the Bomb: Identifying List Bombing of End Users in an Email Anti-Spam Context
Overview
Experience | In Person |
---|---|
Type | Lightning Talk |
Track | Data Engineering and Streaming |
Industry | Enterprise Technology |
Technologies | Delta Lake, Databricks SQL, Databricks Workflows |
Skill Level | Intermediate |
Duration | 20 min |
Traditionally, spam emails are messages a user does not want, containing some kind of threat like phishing. Because of this, detection systems can focus on malicious content or sender behavior.
List bombing upends this paradigm. By abusing public forms such as marketing signups, attackers can fill a user's inbox with high volumes of legitimate mail. These emails don't contain threats, and each sender is following best practices to confirm the recipient wants to be subscribed, but the net effect for an end user is their inbox being flooded with dozens of emails per minute.
This talk covers the the exploration and implementation for identifying this attack in our company's anti-spam telemetry: from reading and writing to Kafka, Delta table streaming for ETL workflows, multi-table liquid clustering design for efficient table joins, curating gold tables to speed up critical queries and using Delta tables as an auditable integration point for interacting with external services.
Session Speakers
IMAGE COMING SOON
Doug Sibley
/Research Engineer
Cisco Talos