Techniques for combating spam mails, Computer Network Security

Assignment Help:

Techniques for combating Spam mails

Many anti spam products are commercially available in market. But it should also be noted that no  one technique is a complete solution to the problem of spam and each has trade-offs between incorrectly rejected legitimate e-mail and not rejecting all spam, and the associated cost in terms of time and effort.

Some of the commercial anti spam products are Surf control, GFI Mail Essentials, Red Earth Policy Patrol etc. Each of these products does a reasonably good job filtering SPAM at the Exchange level, but each has its strengths and weaknesses.

SurfControl takes a multi step approach to filtering SPAM. First, SurfControl blocks the mail relay host. This proves to be huddle to the spammers in relaying SPAM through the server on its way to other destinations. Closing the relay host is a good feature, but it can be easily achieved  directly through Exchange.

Next, SurfControl makes use of an anti SPAM agent to scrutinize each incoming mail. The tests performed on the messages include like a dictionary based scan that looks for words and phrases commonly used by spammers , and a client name DNS lookup. This lookup tests each address by comparing the sending domain's DNS entry against the IP address that actually sent the message. This checks for spoofed E-mail addresses. Messages are also checked against a live database of blacklisted senders. Senders can be blacklisted by domain, E-mail address, and IP address. One of the best features of SurfControl is that the online database contains actual SPAM messages that have been stored to produce digital signatures. When a new message arrives, the message's digital signature is compared against those stored in the database. Finally, if a received message contains some HTML code, the HTML code is stripped from the message. This would  remove any potentially harmful code.

GFIMailEssential firstly looks at what language the inbound messages are sent in. A lot of SPAM comes from foreign countries and is not even written in English or any other native language which is generally used. If a message comes into organization and is in a foreign language, the message can automatically be treated as SPAM . GFIMailEssential uses black lists and white lists.  In addition,GFI product also has the capacity to use third party blacklists. This means that the GFI product can also be benefitted by Internet databases containing the IP addresses of known spammers.

Red Earth Policy Patrol is a comprehensive e-mail-filtering software that offers advanced anti-spam, anti-virus, content & attachment checking, disclaimers, archiving and reporting. Using content filtering, Policy Patrol cuts down on false positives by allowing word scores to differentiate between certain phrases and words. Using this approach, an administrator can ensure minimal disruption is caused while still maintaining high standards of protection. In all, this solution provides effective filtering and has the benefit of anti-virus to further protect the  network from both known and potentially dangerous new threats, while ensuring that content is both legal and appropriate.

Some anti-spam sites, such as projecthoneypot.org, provide code which the users can include in their website pages. Typically, the pages contain one or more unique, randomised and hidden e-mail addresses or links, intended not for the human visitors but for spambots. Each time the page is served, the embedded addresses are automatically changed, allowing individual pieces of spam to be directly matched to the IP address of bots which gathered or harvested the addresses from naive sites. The IP address which the bot used to view the site is automatically submitted to the operators of the blacklist service. Often a link to a fake 'comment' or 'guest book' is also hidden as a trap to bots which post spam to web forms.

Some measures can be taken at the level of the end user also to combat spam.

Sharing of email addresses with unknown people should be avoided.When it is absolutely necessary to forward messages to recipients who don't know one another, it is a good practice to list the recipient names all after 'bcc:' instead of after 'to:'. This practice also decreases the risk of the address being distributed by machines affected with email address harvesting malware.

The email addresses,while posting on blogs and web sites, can be altered in such a way that they can only be read by humans and not by spammers. Avoid responding to spam as this would not stop the spammer from further sending spam mails rather this would confirm that the mailing address is valid and would lead to more spam mails.

With the advent of more and more anti spamming techniques, the number of spam mails have been reduced considerably. There has been a fair degree of success in the recent prosecutions of spammers. The biggest challenge in this field is that the laws of the land are not applicable on internet. There are also some issues of international Law which may prevent action being taken against overseas spammers. A joint effort is being made by different countries in collaboration with the industry to combat this problem.


Related Discussions:- Techniques for combating spam mails

Discuss a communication channel, Question An organization is planning t...

Question An organization is planning to connect its networks to the Internet. The network is located within a four story building. A web server supporting online sales is also

Draw the waveform for an asynchronous transmission, QUESTION: (a) For ...

QUESTION: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume that the signal level for a space in NRZ-L is positive; the signal level f

What is a firewall, QUESTION (a) Define and distinguish between Electro...

QUESTION (a) Define and distinguish between Electronic Commerce and Electronic Business (b) According to you what are the benefits that Electronic Commerce can brings to org

Access controls-information security, Access Controls Access controls ad...

Access Controls Access controls addresses admission of a user into a trusted area of organization. It comprises of a combination of policies & technologies. The ways to control

Security clearances-information security, Security Clearances For a secu...

Security Clearances For a security clearance in organizations each data user should be assigned a single level of authorization indicating classification level. Before approachi

State the fermat-euler theorem, Question: (a) Prove that every positive...

Question: (a) Prove that every positive integer n can be factorized into a product of prime powers. (b) State the Fermat-Euler theorem as needed in the RSA system. (c) Us

Syntax conversion, Write down the significance of the syntax conversion . S...

Write down the significance of the syntax conversion . Syntax Conversion is described below: Syntax conversion is a significant function carried out in the presentation layer. I

Illustrate about tinysec protocol, Illustrate about TinySec Protocol T...

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer

What is network address translation, Question: (a) What is Network Add...

Question: (a) What is Network Address Translation (NAT)? Why is it used? (b) Given a following information by your ISP about your newly acquired Frame Relay connection:

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd