Improving domain blacklisting - spam mail, Computer Network Security

Improving domain blacklisting:

Current domain blacklisting techniques are not very effective as spammers keep replacing blacklisted domains with newly registered domains. Also, the IP blacklist only focuses on the sending IP addresses of spam emails, which is not effective against botnet-generated spam.  So,  to combat this problem the idea is to cluster spam domains based on their hosting IP addresses and associated email subjects and identify the most dominant hosts rather than the  common content-based spam detection research approach. The goal is to identify spam hosts that are heavily used by spammers to host many spam domains and account for a large number of spam messages.

 For blacklisting, The URLs within the spam emails are analyzed and scrutinized and reported to the blacklist. Further incoming emails which contain any of the blacklisted domains will be blocked. As a future view, the target is to build IP blacklist and domain blacklist that can be reported to law enforcement agents. Currently, it is done by SQL queries. Automating this process by having a computer program query the database and generate reports would be beneficial for spam reduction. This would reduce the time taken in analyzing the domains to be blacklisted and hence would reduce the spam mails.

Posted Date: 2/28/2013 7:04:06 AM | Location : United States







Related Discussions:- Improving domain blacklisting - spam mail, Assignment Help, Ask Question on Improving domain blacklisting - spam mail, Get Answer, Expert's Help, Improving domain blacklisting - spam mail Discussions

Write discussion on Improving domain blacklisting - spam mail
Your posts are moderated
Related Questions
FRAGMENTATION Fragmentation information is kept in different extension header.  Every fragment has base header and fragmentation header. Whole datagram including original hea

Bridges perform both in the data link layers and physical of LANs of same kind. They split a bigger network in to smaller segments. They have logic that accept them to store the

CONCEPT OF PACKET : Network systems splits data in small junks or blocks known as packets, which they send individually. Why we required packets rather than bits? The answer to

Address resolution algorithms may be grouped into three basic types: Table lookup Closed-form computation Message Exchange 1. TABLE LOOKUP: In Table Loo

How much would it cost to have a project completed by tomorrow night?

Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co

You are hired as a consultant to help design a digital library in which books are scanned and stored digitally and made available to users of the World Wide Web. Assume that the li

ADDRESS RESOLUTION PROTOCOL (ARP) TCP/IP can use any of the three address resolution functions relaying on the addressing procedure used by the underlying hardware. To guarant

Netfilter Firewall Netfilter is the popular name for the packet filtering system installed by default in the Linux kernel. The filtering system can be used as a very effective

IPV6 BASE HEADER FORMAT: It has less information than IPV4 message header. Next header shows to first extension message header. Flow label is partitioned into a TRAFFIC CLASS