Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Techniques for combating Spam mails

Many anti spam products are commercially available in market. But it should also be noted that no  one technique is a complete solution to the problem of spam and each has trade-offs between incorrectly rejected legitimate e-mail and not rejecting all spam, and the associated cost in terms of time and effort.

Some of the commercial anti spam products are Surf control, GFI Mail Essentials, Red Earth Policy Patrol etc. Each of these products does a reasonably good job filtering SPAM at the Exchange level, but each has its strengths and weaknesses.

SurfControl takes a multi step approach to filtering SPAM. First, SurfControl blocks the mail relay host. This proves to be huddle to the spammers in relaying SPAM through the server on its way to other destinations. Closing the relay host is a good feature, but it can be easily achieved  directly through Exchange.

Next, SurfControl makes use of an anti SPAM agent to scrutinize each incoming mail. The tests performed on the messages include like a dictionary based scan that looks for words and phrases commonly used by spammers , and a client name DNS lookup. This lookup tests each address by comparing the sending domain's DNS entry against the IP address that actually sent the message. This checks for spoofed E-mail addresses. Messages are also checked against a live database of blacklisted senders. Senders can be blacklisted by domain, E-mail address, and IP address. One of the best features of SurfControl is that the online database contains actual SPAM messages that have been stored to produce digital signatures. When a new message arrives, the message's digital signature is compared against those stored in the database. Finally, if a received message contains some HTML code, the HTML code is stripped from the message. This would  remove any potentially harmful code.

GFIMailEssential firstly looks at what language the inbound messages are sent in. A lot of SPAM comes from foreign countries and is not even written in English or any other native language which is generally used. If a message comes into organization and is in a foreign language, the message can automatically be treated as SPAM . GFIMailEssential uses black lists and white lists.  In addition,GFI product also has the capacity to use third party blacklists. This means that the GFI product can also be benefitted by Internet databases containing the IP addresses of known spammers.

Red Earth Policy Patrol is a comprehensive e-mail-filtering software that offers advanced anti-spam, anti-virus, content & attachment checking, disclaimers, archiving and reporting. Using content filtering, Policy Patrol cuts down on false positives by allowing word scores to differentiate between certain phrases and words. Using this approach, an administrator can ensure minimal disruption is caused while still maintaining high standards of protection. In all, this solution provides effective filtering and has the benefit of anti-virus to further protect the  network from both known and potentially dangerous new threats, while ensuring that content is both legal and appropriate.

Some anti-spam sites, such as projecthoneypot.org, provide code which the users can include in their website pages. Typically, the pages contain one or more unique, randomised and hidden e-mail addresses or links, intended not for the human visitors but for spambots. Each time the page is served, the embedded addresses are automatically changed, allowing individual pieces of spam to be directly matched to the IP address of bots which gathered or harvested the addresses from naive sites. The IP address which the bot used to view the site is automatically submitted to the operators of the blacklist service. Often a link to a fake 'comment' or 'guest book' is also hidden as a trap to bots which post spam to web forms.

Some measures can be taken at the level of the end user also to combat spam.

Sharing of email addresses with unknown people should be avoided.When it is absolutely necessary to forward messages to recipients who don't know one another, it is a good practice to list the recipient names all after 'bcc:' instead of after 'to:'. This practice also decreases the risk of the address being distributed by machines affected with email address harvesting malware.

The email addresses,while posting on blogs and web sites, can be altered in such a way that they can only be read by humans and not by spammers. Avoid responding to spam as this would not stop the spammer from further sending spam mails rather this would confirm that the mailing address is valid and would lead to more spam mails.

With the advent of more and more anti spamming techniques, the number of spam mails have been reduced considerably. There has been a fair degree of success in the recent prosecutions of spammers. The biggest challenge in this field is that the laws of the land are not applicable on internet. There are also some issues of international Law which may prevent action being taken against overseas spammers. A joint effort is being made by different countries in collaboration with the industry to combat this problem.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9525228

Have any Question?


Related Questions in Computer Network & Security

There are standards in network communication through which

There are standards in network communication through which data is transferred from one system to another. Discuss why these standards are important. Do you think it would be easier to purchase different equipment and so ...

Cybersecurity policy design issues describe cybersecurity

Cybersecurity Policy Design Issues Describe cybersecurity policy features that are needed to protect against the Insider Threat, Operations Security, Access Control and Biometric Authentication What features can be added ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

Assignment - 8021q tunneling q-in-q configuration8021q

Assignment - 802.1Q Tunneling (Q-in-Q) Configuration 802.1Q tunneling (aka Q-in-Q) is a technique often used by Metro Ethernet providers as a layer 2 VPN for customers. 802.1Q (or dot1q) tunneling is pretty simple...the ...

Advanced wireless networks assignment -wlan design project

Advanced Wireless Networks Assignment - WLAN Design Project - Description: You need to form a group of at most four students, and select one of the case studies provided in Assessment module on VU Collaborate. In this pr ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

Describe 2 variables a government will look at to predict

Describe 2 variables a government will look at to predict where the economy will be in the next six months.

A certain device is used to determine the sex of an unborn

A certain device is used to determine the sex of an unborn baby, but the device is not very reliable. If the fetus is truly a boy, the device says BOY with probability 0:8 (but, mistakenly, GIRL with probability 0:2). If ...

Shadow register setsa describe the use of shadow register

Shadow Register Sets a. Describe the use of shadow register sets. b. How many shadow register sets are supported? c. What instructions are used to move data between them? Floating Point Numbers. We have heretofore focuse ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As