Improving domain blacklisting - spam mail, Computer Network Security

Improving domain blacklisting:

Current domain blacklisting techniques are not very effective as spammers keep replacing blacklisted domains with newly registered domains. Also, the IP blacklist only focuses on the sending IP addresses of spam emails, which is not effective against botnet-generated spam.  So,  to combat this problem the idea is to cluster spam domains based on their hosting IP addresses and associated email subjects and identify the most dominant hosts rather than the  common content-based spam detection research approach. The goal is to identify spam hosts that are heavily used by spammers to host many spam domains and account for a large number of spam messages.

 For blacklisting, The URLs within the spam emails are analyzed and scrutinized and reported to the blacklist. Further incoming emails which contain any of the blacklisted domains will be blocked. As a future view, the target is to build IP blacklist and domain blacklist that can be reported to law enforcement agents. Currently, it is done by SQL queries. Automating this process by having a computer program query the database and generate reports would be beneficial for spam reduction. This would reduce the time taken in analyzing the domains to be blacklisted and hence would reduce the spam mails.

Posted Date: 2/28/2013 7:04:06 AM | Location : United States







Related Discussions:- Improving domain blacklisting - spam mail, Assignment Help, Ask Question on Improving domain blacklisting - spam mail, Get Answer, Expert's Help, Improving domain blacklisting - spam mail Discussions

Write discussion on Improving domain blacklisting - spam mail
Your posts are moderated
Related Questions
Question: (a) Explain how the Diffie-Hellman key establishment protocol works. (b) Prove that the Diffie-Hellman key establishment protocol is vulnerable to a `man in the mi

UDP- DATAGRAM TRANSPORT SERVICE INTRODUCTION:  UDP is the one of the transport protocols in TCP/IP protocol suite. UDP protocol accepts applications on the computers to

QUESTION: (a) Briefly explain the steps involved in Network Simplex Method. (b) What data structures you would expect in the Network Simplex Method. Show the data struct

CarALouer provides rental of cars to its customer on a regional basis i.e. a car is attached to a regional home-base which also houses a regional office of the company. Each regi

Example : UCSF Medical Center In the year 2002, the University of California, San Francisco (UCSF) Medical Center received an email message from someone who claimed to be a doct

TCP-RELIABLE TRANSPORT SERVICE INTRODUCTION:  TCP is the major transport protocol architecture in the TCP/IP suite. It uses unreliable datagram function offered by IP whe

Question requires you to develop firewall rules based on a fictitious organisation. Scenario: You work for a security-conscious company, xC-Cure, who develop encryption tec

Question: (a) How can you prevent someone from accessing your computer when you leave your office for some time? (b) What is the difference between a classic login and a w

IP DATAGRAM Various options can be included to IP header, e.g., source route, record route and timestamp. Header with no function has H. LEN field value 5; data starts immedia

QUESTION 1: a) Differentiate between a routing protocol and a routed protocol. b) Describe any three design goals of Routing protocols. c) Lists some of the features shared