New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Prime Choice
· TechTV!
· Head Lines
· CCSP News Ltrs
· Dnld of the Week!
· Find a Cure!

· Ian T's (AR 17)
· Marcia's (OP13)
· Bill G's (CO3)
· Paul's (AR 5)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· Recommend Us
· RegChat
· Reviews
· Search (Topics)
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
Which Anti-Virus product do you use?

Computer Associates
Eset (NOD32)
F-Secure
Frisk (F-Prot)
Grisoft (AVG)
Kaspersky
Network Associates (McAfee)
Panda
Sophos
Symantec (NAV)
Trend Micro
Other



Results
Polls

Votes: 16733
Comments: 142
image
Donations
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
Hosted By
Computer Cops is a satisfied customer of [ JaguarPC ]
image
image Email Hassles: Strategies: Content Filtering And Machine Learning image
Email Hassles!
Employing Multiple Anti-Spam Strategies
Content Filtering And Machine Learning
By InformationWeek

E-mail administrators can easily add blacklist query support to popular message transfer agents such as Sendmail, Qmail, and NTmail. Products such as GFI Software Ltd.'s MailEssentials for Exchange add blacklist support to Exchange Server, and there are also numerous add-ons available for client e-mail programs such as Microsoft Outlook that allow blacklists to be used by end users. Microsoft and Lotus have blacklist support in the forthcoming Exchange Server 2003 and Lotus Domino 6.

Blacklists alone, however, aren't an effective means of blocking spam. Originating IP addresses can be spoofed, rendering a blacklist lookup ineffectual. IP addresses can also be hijacked or used by more than one person at a time. Blocking that IP address may hurt legitimate users, which can have serious implications for due process, says Silliman. There are also over 150 blacklists available, varying in quality, so there isn't one guaranteed definitive, up-to-date blacklist. Most businesses subscribe to multiple blacklists to bolster their effectiveness.


We use 11 different blacklists, says Tom O'Neal, CEO of Texas American Communications Network Inc., an ISP that uses Qmail as its message transfer agent. O'Neal uses the popular open-source Spam Assassin package as its primary anti-spam defense, as well as whitelisting based on customer feedback.


Whitelists are lists of known IP addresses and domain names that a business or user knows are valid sources. Typically, lists of whitelists are maintained by end users and can be pushed to the anti-spam software running on the e-mail server. The whitelist system used by Hotmail e-mail account users (initiated by clicking on the this is not junk mail button in the user's junk-mail folder) is a typical example.


Content Filtering And Machine Learning
Content filtering, the filtering of e-mail based on the contents of the header and body of the e-mail message, has been around almost as long as there has been e-mail, but newer techniques involving rule-based reasoning have greatly improved the use of filtering as a defense against spam.


The widely imitated open-source Spam Assassin anti-spam tool is quite good at recognizing spam by applying a variety of rules with positive or negative scores attached to each rule. A rule that generates a positive score might look inside the e-mail message for variations of the word Viagra along with the word sale which might indicate an Internet spam message selling Viagra. A rule generating a negative score might look for informationweek.com, in the e-mail message header, indicating a desirable e-mail message that is unlikely to be spam. After applying all the rules, the e-mail message is rated by totaling up the scores and checking to see if the total score exceeds some threshold defined by the recipient or the e-mail administrator.


The total score, sometimes called a confidence level, has become an important number. Most anti-spam tools assign a similar numeric score to an e-mail message after analyzing it, and place that number in the e-mail message by adding an extra header to the message. E-mail clients, or other types of anti-spam software, can then access that number and decide what to do with the e-mail message. Microsoft's forthcoming Exchange Server 2003 doesn't actually contain any new filtering capabilities but instead has an improved API that lets third-party anti-spam software analyze incoming e-mail messages and insert a confidence level into the e-mail message. Outlook 2003 can then read the confidence level in the received message and decide whether to flag the message as spam. Similarly, Eudora Pro 6 can read the score inserted by several anti-spam software packages.

SecurityPipeLine
Posted on Sunday, 21 September 2003 @ 05:05:00 EDT by phoenix22
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Microsoft
· HotScripts
· Linux Manuals
· W3 Consortium
· Spam Cop
· More about Email Hassles!
· News by phoenix22


Most read story about Email Hassles!:
Nasty e-mails raise blood pressure

image
Article Rating
Average Score: 0
Votes: 0

Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

Send to a Friend  Send to a Friend
image
"Login" | Login/Create an Account | 0 comments
Threshold
  
The comments are owned by the poster. We aren't responsible for their content.