At 09:26 AM 9/19/2007, Jan-Pieter Cornet wrote:
>Since we're treating clamav's detected phishes as spam, instead of
>rejecting them (what we do with regular malware), we noticed that
>the heuristic detection causes lots of false positives: in only a
>few samples I detected legitimate paypal mails (and I know it's
>legit because it's DomainKeys signed), and mails to the lockergnome
>mailinglist.
>
>I have now disabled the heuristic by setting "PhishingScanURLs no".
>
>Is anyone actually using this to reject mails on a large production
>environment, without getting serious complaints about false positives?
>(we're doing 5-10 million mails a day, could be that we're seeing
>more false positives due to the high volume)
>
>--
>Jan-Pieter Cornet <[EMAIL PROTECTED]>

I think it would be insane to reject or discard mail based on 
"PhishingScanURLs yes" on anything bigger than a home/hobby server 
because of the high false positive rate.

A significant percentage (I'm guessing 10% or more) of the 
"Phishing.Heuristics.*" detections here are false, which I then 
release from quarantine and submit to the signature team as a false 
positive.  This is in contrast to the rest of the clamav detections 
which have a FP rate approaching zero percent.

It's probably important to note that these aren't strictly "false 
positives" as the messages invariably contain some sort of funky URL 
redirect that triggers the detection.

Most of the false positives I see are "marketing" type messages from 
various legit companies.  Apparently being on a sales team causes one 
to like using questionable URL redirects.

I've thought about turning this feature off several times, but the 
volume here isn't so big that it's a burden (yet), and I like to 
think I'm helping others by submitting the FPs.


-- 
Noel Jones 

_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://lurker.clamav.net/list/clamav-users.html

Reply via email to