Techniques for combating spam mails, Computer Network Security

Techniques for combating Spam mails

Many anti spam products are commercially available in market. But it should also be noted that no  one technique is a complete solution to the problem of spam and each has trade-offs between incorrectly rejected legitimate e-mail and not rejecting all spam, and the associated cost in terms of time and effort.

Some of the commercial anti spam products are Surf control, GFI Mail Essentials, Red Earth Policy Patrol etc. Each of these products does a reasonably good job filtering SPAM at the Exchange level, but each has its strengths and weaknesses.

SurfControl takes a multi step approach to filtering SPAM. First, SurfControl blocks the mail relay host. This proves to be huddle to the spammers in relaying SPAM through the server on its way to other destinations. Closing the relay host is a good feature, but it can be easily achieved  directly through Exchange.

Next, SurfControl makes use of an anti SPAM agent to scrutinize each incoming mail. The tests performed on the messages include like a dictionary based scan that looks for words and phrases commonly used by spammers , and a client name DNS lookup. This lookup tests each address by comparing the sending domain's DNS entry against the IP address that actually sent the message. This checks for spoofed E-mail addresses. Messages are also checked against a live database of blacklisted senders. Senders can be blacklisted by domain, E-mail address, and IP address. One of the best features of SurfControl is that the online database contains actual SPAM messages that have been stored to produce digital signatures. When a new message arrives, the message's digital signature is compared against those stored in the database. Finally, if a received message contains some HTML code, the HTML code is stripped from the message. This would  remove any potentially harmful code.

GFIMailEssential firstly looks at what language the inbound messages are sent in. A lot of SPAM comes from foreign countries and is not even written in English or any other native language which is generally used. If a message comes into organization and is in a foreign language, the message can automatically be treated as SPAM . GFIMailEssential uses black lists and white lists.  In addition,GFI product also has the capacity to use third party blacklists. This means that the GFI product can also be benefitted by Internet databases containing the IP addresses of known spammers.

Red Earth Policy Patrol is a comprehensive e-mail-filtering software that offers advanced anti-spam, anti-virus, content & attachment checking, disclaimers, archiving and reporting. Using content filtering, Policy Patrol cuts down on false positives by allowing word scores to differentiate between certain phrases and words. Using this approach, an administrator can ensure minimal disruption is caused while still maintaining high standards of protection. In all, this solution provides effective filtering and has the benefit of anti-virus to further protect the  network from both known and potentially dangerous new threats, while ensuring that content is both legal and appropriate.

Some anti-spam sites, such as projecthoneypot.org, provide code which the users can include in their website pages. Typically, the pages contain one or more unique, randomised and hidden e-mail addresses or links, intended not for the human visitors but for spambots. Each time the page is served, the embedded addresses are automatically changed, allowing individual pieces of spam to be directly matched to the IP address of bots which gathered or harvested the addresses from naive sites. The IP address which the bot used to view the site is automatically submitted to the operators of the blacklist service. Often a link to a fake 'comment' or 'guest book' is also hidden as a trap to bots which post spam to web forms.

Some measures can be taken at the level of the end user also to combat spam.

Sharing of email addresses with unknown people should be avoided.When it is absolutely necessary to forward messages to recipients who don't know one another, it is a good practice to list the recipient names all after 'bcc:' instead of after 'to:'. This practice also decreases the risk of the address being distributed by machines affected with email address harvesting malware.

The email addresses,while posting on blogs and web sites, can be altered in such a way that they can only be read by humans and not by spammers. Avoid responding to spam as this would not stop the spammer from further sending spam mails rather this would confirm that the mailing address is valid and would lead to more spam mails.

With the advent of more and more anti spamming techniques, the number of spam mails have been reduced considerably. There has been a fair degree of success in the recent prosecutions of spammers. The biggest challenge in this field is that the laws of the land are not applicable on internet. There are also some issues of international Law which may prevent action being taken against overseas spammers. A joint effort is being made by different countries in collaboration with the industry to combat this problem.

Posted Date: 2/28/2013 7:02:28 AM | Location : United States







Related Discussions:- Techniques for combating spam mails, Assignment Help, Ask Question on Techniques for combating spam mails, Get Answer, Expert's Help, Techniques for combating spam mails Discussions

Write discussion on Techniques for combating spam mails
Your posts are moderated
Related Questions
Unguided Media This is the wireless media that transfer electromagnetic waves without using a physical media. Waves are broadcast through the air. This is performing through r

ASSET IDENTIFICATION AND VALUATION This process begins with identification of assets that includes all elements of an organization’s system (people, procedures, data and informa

i have an idea of clustering in wsns . where each and every sensor node use the reputation scheme and while clustering provide help against the selfishness atatck of the sensor nod

ADDRESS RESOLUTION AND PROTOCOL ADDRESSES Address resolution (ARP) is a network interface layer protocol. Protocol addresses are used in all upper layers. Address resolution s

LOG FILE MONITORS Log file monitor (LFM) is similar to NIDS. It reviews log files generated by servers, network devices, and even other IDSs for patterns and signatures. Pattern

Normal 0 false false false EN-US X-NONE X-NONE


QUESTION: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume that the signal level for a space in NRZ-L is positive; the signal level f

How safe is the encryption of virtual private networks?

ADDRESS RESOLUTION WITH CLOSED-FORM COMPUTATION For networks use reliable addressing, it is possible to select an address that creates closed-form address resolution possible.