Techniques for combating spam mails, Computer Network Security

Techniques for combating Spam mails

Many anti spam products are commercially available in market. But it should also be noted that no  one technique is a complete solution to the problem of spam and each has trade-offs between incorrectly rejected legitimate e-mail and not rejecting all spam, and the associated cost in terms of time and effort.

Some of the commercial anti spam products are Surf control, GFI Mail Essentials, Red Earth Policy Patrol etc. Each of these products does a reasonably good job filtering SPAM at the Exchange level, but each has its strengths and weaknesses.

SurfControl takes a multi step approach to filtering SPAM. First, SurfControl blocks the mail relay host. This proves to be huddle to the spammers in relaying SPAM through the server on its way to other destinations. Closing the relay host is a good feature, but it can be easily achieved  directly through Exchange.

Next, SurfControl makes use of an anti SPAM agent to scrutinize each incoming mail. The tests performed on the messages include like a dictionary based scan that looks for words and phrases commonly used by spammers , and a client name DNS lookup. This lookup tests each address by comparing the sending domain's DNS entry against the IP address that actually sent the message. This checks for spoofed E-mail addresses. Messages are also checked against a live database of blacklisted senders. Senders can be blacklisted by domain, E-mail address, and IP address. One of the best features of SurfControl is that the online database contains actual SPAM messages that have been stored to produce digital signatures. When a new message arrives, the message's digital signature is compared against those stored in the database. Finally, if a received message contains some HTML code, the HTML code is stripped from the message. This would  remove any potentially harmful code.

GFIMailEssential firstly looks at what language the inbound messages are sent in. A lot of SPAM comes from foreign countries and is not even written in English or any other native language which is generally used. If a message comes into organization and is in a foreign language, the message can automatically be treated as SPAM . GFIMailEssential uses black lists and white lists.  In addition,GFI product also has the capacity to use third party blacklists. This means that the GFI product can also be benefitted by Internet databases containing the IP addresses of known spammers.

Red Earth Policy Patrol is a comprehensive e-mail-filtering software that offers advanced anti-spam, anti-virus, content & attachment checking, disclaimers, archiving and reporting. Using content filtering, Policy Patrol cuts down on false positives by allowing word scores to differentiate between certain phrases and words. Using this approach, an administrator can ensure minimal disruption is caused while still maintaining high standards of protection. In all, this solution provides effective filtering and has the benefit of anti-virus to further protect the  network from both known and potentially dangerous new threats, while ensuring that content is both legal and appropriate.

Some anti-spam sites, such as projecthoneypot.org, provide code which the users can include in their website pages. Typically, the pages contain one or more unique, randomised and hidden e-mail addresses or links, intended not for the human visitors but for spambots. Each time the page is served, the embedded addresses are automatically changed, allowing individual pieces of spam to be directly matched to the IP address of bots which gathered or harvested the addresses from naive sites. The IP address which the bot used to view the site is automatically submitted to the operators of the blacklist service. Often a link to a fake 'comment' or 'guest book' is also hidden as a trap to bots which post spam to web forms.

Some measures can be taken at the level of the end user also to combat spam.

Sharing of email addresses with unknown people should be avoided.When it is absolutely necessary to forward messages to recipients who don't know one another, it is a good practice to list the recipient names all after 'bcc:' instead of after 'to:'. This practice also decreases the risk of the address being distributed by machines affected with email address harvesting malware.

The email addresses,while posting on blogs and web sites, can be altered in such a way that they can only be read by humans and not by spammers. Avoid responding to spam as this would not stop the spammer from further sending spam mails rather this would confirm that the mailing address is valid and would lead to more spam mails.

With the advent of more and more anti spamming techniques, the number of spam mails have been reduced considerably. There has been a fair degree of success in the recent prosecutions of spammers. The biggest challenge in this field is that the laws of the land are not applicable on internet. There are also some issues of international Law which may prevent action being taken against overseas spammers. A joint effort is being made by different countries in collaboration with the industry to combat this problem.

Posted Date: 2/28/2013 7:02:28 AM | Location : United States







Related Discussions:- Techniques for combating spam mails, Assignment Help, Ask Question on Techniques for combating spam mails, Get Answer, Expert's Help, Techniques for combating spam mails Discussions

Write discussion on Techniques for combating spam mails
Your posts are moderated
Related Questions
Q1 (15 marks, 5 marks each part): This question has three parts: In a short paragraph (200-300 words) explain the fundamentals of Packet Switching and how it works. In a short pa

Maximum Transmission Unit  (MTU) Each hardware method specification adds the definition of the maximum size of the frame data area, which is known the Maximum Transmission Uni

Use the Chinese remainder theorem to evaluate x from the following simultaneous congruences: x ≡ 1 (mod 2); x ≡ 2 (mod 3); x ≡ 3 (mod 5). Calculate gcd(14526, 2568). (

a) Define the term "Enterprise Network". b) Briefly discuss the similarity and differences between a switch and a router. c) A company XYZ has been renting the 1 st Floor of

Question: a) There are two basic approaches to dealing with errors in the presence of pipelining. One way is Go-Back-N and the other strategy is Selective Repeat. i. Explain

Question: (a) What is the main security vulnerability of IPv4? (b) Which protocol can be used for secure remote login? (c) Distinguish between the transport and tunnel

PACKET SNIFFERS A packet network protocol analyzer is a network tool which collects copies of packets from network and analyzes them. It can give network administrator with valu

Cost Benefit Analysis (CBA) The common approach for information security controls is economic feasibility of implementation. CBA is begun by evaluating the worth of assets which

Question : An aircraft manufacturing company is considering linking the network of one of its offices to the network of its Headquarter using either xDSL or ISDN. i. Compare

Question: a) You are using Active Directory Users under Windows Server 2003 and Computers to configure user objects in your domain, and you are able to change the address and