Sender and Receiver Addresses as Cues for Anti-Spam Filtering Chih-Chien Wang
|
|
|
- Muriel Terry
- 10 years ago
- Views:
Transcription
1 Sender and Receiver Addresses as Cues for Anti-Spam Filtering Chih-Chien Wang Graduate Institute of Information Management National Taipei University 69, Sec. 2, JianGuo N. Rd., Taipei City , Taiwan Tel: Fax: This study analysed the sender and receiver addresses of 3,417 unsolicited s. Over 60.3% of unsolicited s were found to have an invalid sender address and 92.8% receiver addresses did not appear in the To or CC headers. The analytical results indicated that addresses in the header could provide a cue for filtering junk s. Categories and Subject Descriptors: H.3.3 [Information Search and Retrieval]: Information filtering Keywords: Spam, unsolicited , junk mail, address, filter 1. INTRODUCTION Junk has long been a problem on the Internet. Internet pioneer Jon Postel recognised the potential for this problem to develop as long ago as November 1975 (Postel, 1975). The problem has now become extremely serious. The growing popularity and low cost of s have attracted the attention of marketers. Using readily available bulk software and lists of addresses harvested from web pages and newsgroup archives, sending messages to millions of recipients is very easy and very cheap, and can be considered almost free. Consequently, these unsolicited e- mails bother users and fill their folders with unwanted messages. Few users, if any, have never received unsolicited s. These unwanted messages generally are called unsolicited e- mails or spam. Spam also describes the action of sending out such mails. These unsolicited s are also known as bulk mails, because they are generally sent out in large batches, and as junk mail, because they are worthless to most recipients. Spamming interferes with ordinary communication and reduces employee productivity. Cranor and LaMacchia (1998) reported that spam messages constituted 10% of all incoming messages. It has become more serious recently. It is estimated that there will be more spam than real and spam currently costs business US $ 13 billion annually (Swartz, 2003). According to Nucleus Research (2003), spamming will cost 1.4 percent of employee productivity, or $874 per year per employee, in Consequently, screening out spam is an extremely urgent problem. Copyright 2004, Australian Computer Society Inc. General permission to republish, but not for profit, all or part of this material is granted, provided that the JRPIT copyright notice is given and that reference is made to the publication, to its date of issue, and to the fact that reprinting privileges were granted by permission of the Australian Computer Society Inc. Manuscript received: 24 July 2003 Communicating Editor: Sidney A. Morris Journal of Research and Practice in Information Technology, Vol. 36, No. 1, February
2 Several techniques exist for filtering spam. However, none of these filters is perfect. This study proposes a filtering approach based on screening the addresses in the header section. This study conducted a content analysis of junk addresses to check the possibility of using addresses as a cue for filtering spam. The results indicated that invalid sender and irrelative receiver addresses left in the header section of junk s could be used to screen out junk . The results of this study may be useful in developing anti-spam strategies. 2. ANTI-SPAM FILTERING TECHNIQUES Most, if not all, service providers and Internet users wish to filter out junk s. Various methods of filtering have already been developed. Various methods for filtering spam out are listed below. 2.1 Filtering by Number of Recipients This method involves screening out s being sent to a large number of recipients. This method is based on the assumption that junk s generally are sent in bulk. However, this method is easily defeated by bulk programs that automatically reconnect to the mail server or automatically change the title and/or body messages after sending a certain number of e- mails. The spammer can set this number to as little as twenty or less. Additionally, this method assumes all bulk s to be junk, and thus may filter out important and solicited as well as unsolicited Filtering by Keyword Keyword filtering is another method of screening junk . Several service providers currently provide content-based filtering on their mail servers. Some studies based on the Naive Bayes filter (such as Pazzani, 2000; Robinson, 2003) or memory-based filter (such as Sakkis, Androutsopoulos, Paliouras, Karkaletsis, Spyropoulos, and Stamatopoulos, 2003) focus on promoting the filter efficiency of this method. However, this filter method also does not perform perfectly, and thus users still must check filtered s and put any unsolicited in the junk mail pool. This method is based on the assumption that the titles and/or body messages of junk s may contain specific words. Sell, on sale, and sex are some typical keywords used to filter s with this approach. These words should be defined in advance. However, this approach suffers the problem of a high possibility of solicited s being filtered out simply because they happen to include words on the filter list. 2.3 Filtering by Sender Address Filtering spam out based on the sender address is the most straightforward approach (Cranor and LaMacchia, 1998). However, the problem with this technique is that it is easy for senders to obtain new addresses or use fake addresses. Besides, defining spammers and separate them from the normal users represents another problem. Disputes can occur if mail servers improperly classify normal users into spammers and refuse to deliver mails sent by these normal users. 2.4 Filtering by Address Validity The format of is described in the Requests for Comments (RFC) 822 initially designed by Crocker (1982). According to RFC 822, each must include the headers of From and either To, CC, or BCC. The sender address is listed in the From header and the receiver addresses are listed in the To, CC, or BCC headers. All s should have at least a sender and a receiver. 4 Journal of Research and Practice in Information Technology, Vol. 36, No. 1, February 2004
3 Although RFC 822 mandates the existence of the From header in s, no mechanism exists to ensure the validity of the sender address. That is, the address left in the From header can be invalid if the sender so chooses. The validity of addresses of the header session may provide a cue for anti-spam filtering. The return addresses of unsolicited can be invalid for numerous reasons including that the spammers hope to avoid being sued if the breaks the law, disrupts Internet service or initiates an electronic bombing attack. Most servers suspend the services of spammers. Moreover, some users who hate receiving unsolicited s use electronic bombing to shut down the accounts of spammers. The To, CC, and BCC headers are used to identify message recipients. To is used to identity main message recipients. Moreover, CC standing for Carbon Copy, identifies second message recipients rather than main message recipients. The function of the To and CC headers thus are very similar. However, BCC differs from the To and CC header. BCC means Blind Carbon Copy and blinds individual recipients to identify other recipients. No receivers thus can see the addresses of other BCC receivers. servers generally add undisclosedrecipients to the To header if only BCC is available. Junk s are sent in bulk and have numerous recipients. Spammers generally use the BCC header rather than To or CC for the receiver address to avoid revealing that the mail is part of a large batch. This habit of spammers provides a further cue for judging the possibility that an inbound is a junk EMPIRICAL STUDY Content analysis can be used to examine sender and receiver addresses of junk . This study attempts to identify rules to discriminate desired and junk s. Statistic analysis of header fields is performed for this purpose. The validity of the sender and receiver addresses also is checked to determine if they could be cues to filter out unsolicited . The checks used in this study include Domain Name Server (DNS) checking for the existence of the mail servers indicated in the address and Simple Mail Transfer Protocol (SMTP) checking for the existence of the accounts. messages were sent to check the existence of the accounts when the SMTP servers refused to respond to addresses validity checks. 3.1 Collecting Junk Mail To gather unsolicited s, an account was obtained from a Taiwanese Internet Service Provider (ISP), and bulk mail filtering options were not activated. This account was not used for any other purposes. All received mails except for messages sent by the ISPs system administrators were unsolicited. Unsolicited s were collected over a twenty-month period between November 2001 and June 2003, yielding 3,417 junk mails. 3.2 Analysis of Sender and Receiver Addresses Return address validity was checked for all junk mails. Figure 1 illustrates the results. Of the 3,417 junk mails collected, 277 (8.1%) had no sender address. The addresses of the remaining 3,142 e- mails were checked. Of this group, 178 (5.2%) were invalid because the domain name of the account mail server was unregistered, and a further 797 (23.3%) were confirmed to be invalid by SMTP checking. However, many SMTP servers refuse to respond to address checks to prevent spammers from collecting-mail addresses. Consequently, a real was sent to check whether the account existed. 806 (23.5%) addresses were confirmed invalid by obtaining Journal of Research and Practice in Information Technology, Vol. 36, No. 1, February
4 Figure 1: Sender Addresses of Received Junk Mail warnings that the message could not be delivered. Overall, 2,058 (60.3%) of the 3,417 junk mails lacked a valid sender address. Of the 3,417 junk mails, 247 displayed the receiver address in the To or CC header, while the remaining 3,170 (92.8%) displayed the receiver addresses in the BCC header. This strong tendency to use the BCC header may also provide a cue for judging whether an is junk. Although the fact that an places the receiver addresses in the BCC header does not mean that is definitely junk, such a placement may provide a cue for anti-spam filtering since almost all junk (92.8%) puts the receiver address in the BCC header. 4. DISCUSSION The analytical results of this study confirm that many unsolicited s have invalid sender addresses and put the addresses of the receiver in the BCC rather than the CC or To headers. The content analysis conducted here reveals that the validity of addresses left in the header session may provide cues for filtering spam. This study found that over 60.3% of unsolicited s had an invalid sender address. Consequently, using the receiver address as a cue for spam filtering can filter out more half of all junk s. This approach will not filter out ordinary s out since typical users always include their true addresses to facilitate reply by receivers. Additionally, this study also demonstrated that almost all junk s place the addresses of the receivers in the BCC header. However, this habit of spammers is insufficient by itself to identify an as junk because the BCC header is used frequently by ordinary users, specifically to prevent the receivers from knowing the identities of other to whom the has been sent. However, this habit of spammers still may provide an additional cue for use in anti-spam filtering. This cue can be especially helpful in preventing legitimate mail from being classified as junk. If the receiver address appears in the To or CC headers, then the is unlikely to be junk is low, since almost all junk put the receivers addresses at BCC header. This study indicated that addresses in the header section could provide a cue for filtering junk s. However, addresses in the header section are merely a supplementary or extra cue rather than a replacement for other filter out techniques. Applying the idea proposed by this 6 Journal of Research and Practice in Information Technology, Vol. 36, No. 1, February 2004
5 study in coexistence with other anti-spam filters would cause no conflict, and could boost the efficiency of anti-spam filtering. REFERENCES COHEN, W. (1996): Learning rules that classify , AAAI Spring Symposium on Machine Learning in Information Access, Palo Alto, USA: CRANOR, L. F. and LAMACCHIA, B. A. (1998): Spam. Communications of the ACM 41 (8): CROCKER, D. H. (1982): Standard for the format of ARPA internet text messages. The Requests for Comments (RFC) 822, Accessed 15 July NUCLEUS RESEARCH (2003): Spam: The silent ROI killer, Research Note D59, Nucleus Research. nucleusresearch.com. Accessed 01 July PAZZANI, M. J. (2000): Representation of electronic mail filtering profiles: A user study, Proc. the 5th International Conference on Intelligent User Interfaces, New Orleans, LA, USA, , ACM Press. POSTEL, J. (1975): On the junk mail problem. The Requests for Comments (RFC) Accessed 15 July ROBINSON, G. (2003): A statistical approach to the spam problem. Linux Journal (107): 3. SAKKIS, G., ANDROUTSOPOULOS, I., PALIOURAS, G., KARKALETSIS, V., SPYROPOULOS, C.D. and STAMATOPOULOS, P. (2003): A memory-based approach to anti-spam filtering for mailing lists. Information Retrieval, 6(1): SWARTZ, N. (2003): Spam costs businesses $13 billion annually, Information Management Journal, 37 (2): 9. BIOGRAPHICAL NOTES Chih-Chien Wang, PhD, is currently assistant professor of information management at the National Taipei University. His research interests include electronic commerce, online consumer behaviour, Internet rumours, spamming, and the impact of Internet to society. He also serves as the executive editor of Electronic Commerce Studies, a quarterly academic journal in Taiwan, and trustee council member of Association of Taiwan Electronic Commerce. Chih-Chien Wang Journal of Research and Practice in Information Technology, Vol. 36, No. 1, February
Why Content Filters Can t Eradicate spam
WHITEPAPER Why Content Filters Can t Eradicate spam About Mimecast Mimecast () delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate
Journal of Information Technology Impact
Journal of Information Technology Impact Vol. 8, No., pp. -0, 2008 Probability Modeling for Improving Spam Filtering Parameters S. C. Chiemeke University of Benin Nigeria O. B. Longe 2 University of Ibadan
REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS
REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS Rami Khasawneh, Acting Dean, College of Business, Lewis University, [email protected] Shamsuddin Ahmed, College of Business and Economics, United Arab
Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server.
Stop Spam Now! By John Buckman John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server. Copyright 1999 Lyris Technologies, Inc. Stop Spam Now! 1 Introduction
Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest?
Introduction The purpose of this memo is to explain how the email that originates from outside this organization is processed, and to describe the tools that you can use to manage your personal spam quarantine.
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
IMPROVING SPAM EMAIL FILTERING EFFICIENCY USING BAYESIAN BACKWARD APPROACH PROJECT
IMPROVING SPAM EMAIL FILTERING EFFICIENCY USING BAYESIAN BACKWARD APPROACH PROJECT M.SHESHIKALA Assistant Professor, SREC Engineering College,Warangal Email: [email protected], Abstract- Unethical
Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development
Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Author André Tschentscher Address Fachhochschule Erfurt - University of Applied Sciences Applied Computer Science
A Case-Based Approach to Spam Filtering that Can Track Concept Drift
A Case-Based Approach to Spam Filtering that Can Track Concept Drift Pádraig Cunningham 1, Niamh Nowlan 1, Sarah Jane Delany 2, Mads Haahr 1 1 Department of Computer Science, Trinity College Dublin 2 School
Anti Spamming Techniques
Anti Spamming Techniques Written by Sumit Siddharth In this article will we first look at some of the existing methods to identify an email as a spam? We look at the pros and cons of the existing methods
ModusMail Software Instructions.
ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account
How To Block Ndr Spam
How to block NDR spam Spam generates an enormous amount of traffic that is both time-consuming to handle and resource intensive. Apart from that, a large number of organizations have been victims of NDR
PROOFPOINT - EMAIL SPAM FILTER
416 Morrill Hall of Agriculture Hall Michigan State University 517-355-3776 http://support.anr.msu.edu [email protected] PROOFPOINT - EMAIL SPAM FILTER Contents PROOFPOINT - EMAIL SPAM FILTER... 1 INTRODUCTION...
AN E-MAIL SERVER-BASED SPAM FILTERING APPROACH
AN E-MAIL SERVER-BASED SPAM FILTERING APPROACH MUMTAZ MOHAMMED ALI AL-MUKHTAR College of Information Engineering, AL-Nahrain University IRAQ ABSTRACT The spam has now become a significant security issue
Emailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password
Emailing from The E2 Shop System With recent releases of E2SS (at least 7.2.7.23), we will be allowing two protocols for EMail delivery. A new protocol for EMail delivery Simple Mail Transfer Protocol
An Overview of Spam Blocking Techniques
An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
Fighting spam in Australia. A consumer guide
Fighting spam in Australia A consumer guide Fighting spam Use filtering software Install anti-virus software Use a personal firewall Download security patches Choose long and random passwords Protect your
Filtering Junk Mail with A Maximum Entropy Model
Filtering Junk Mail with A Maximum Entropy Model ZHANG Le and YAO Tian-shun Institute of Computer Software & Theory. School of Information Science & Engineering, Northeastern University Shenyang, 110004
A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering
A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering Khurum Nazir Junejo, Mirza Muhammad Yousaf, and Asim Karim Dept. of Computer Science, Lahore University of Management Sciences
Email. Service Option Description. Deltacom Product Management - updated 9/17/2007 1
Email Service Option Description Deltacom Product Management - updated 9/17/2007 1 EMAIL Business Case Table of Contents Service Description... 3 Webmail/POP mail... 3 Standard Webmail Features... 3 Web
Bayesian Spam Filtering
Bayesian Spam Filtering Ahmed Obied Department of Computer Science University of Calgary [email protected] http://www.cpsc.ucalgary.ca/~amaobied Abstract. With the enormous amount of spam messages propagating
Filtering E-mail for Spam: PC
Filtering E-mail for Spam: PC Last Revised: April 2003 Table of Contents Introduction... 1 Objectives... 1 Filtering E-mail for Spam... 2 What Is Spam?... 2 What Is UT Doing About Spam?... 2 What Can You
A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior
A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior Danilo Michalczuk Taveira and Otto Carlos Muniz Bandeira Duarte UFRJ - PEE/COPPE/GTA - DEL/POLI P.O. Box 6854-2945-97, Rio de Janeiro, RJ,
How To Stop Spam From Being A Problem
Solutions to Spam simple analysis of solutions to spam Thesis Submitted to Prof. Dr. Eduard Heindl on E-business technology in partial fulfilment for the degree of Master of Science in Business Consulting
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
A MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM E-MAIL FILTERING 1 2
UDC 004.75 A MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM E-MAIL FILTERING 1 2 I. Mashechkin, M. Petrovskiy, A. Rozinkin, S. Gerasimov Computer Science Department, Lomonosov Moscow State University,
IMF Tune Opens Exchange to Any Anti-Spam Filter
Page 1 of 8 IMF Tune Opens Exchange to Any Anti-Spam Filter September 23, 2005 10 th July 2007 Update Include updates for configuration steps in IMF Tune v3.0. IMF Tune enables any anti-spam filter to
Webmail Friends & Exceptions Guide
Webmail Friends & Exceptions Guide Add email addresses to the Exceptions List and the Friends List in your Webmail account to ensure you receive email messages from family, friends, and other important
Emails and anti-spam Page 1
Emails and anti-spam Page 1 As the spammers become increasing aggressive more and more legit emails get banned as spam. When you send emails from your webcrm system, we use the webcrm servers to send emails
IBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32
IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How
Lan, Mingjun and Zhou, Wanlei 2005, Spam filtering based on preference ranking, in Fifth International Conference on Computer and Information
Lan, Mingjun and Zhou, Wanlei 2005, Spam filtering based on preference ranking, in Fifth International Conference on Computer and Information Technology : CIT 2005 : proceedings : 21-23 September, 2005,
CAS-ICT at TREC 2005 SPAM Track: Using Non-Textual Information to Improve Spam Filtering Performance
CAS-ICT at TREC 2005 SPAM Track: Using Non-Textual Information to Improve Spam Filtering Performance Shen Wang, Bin Wang and Hao Lang, Xueqi Cheng Institute of Computing Technology, Chinese Academy of
Intercept Anti-Spam Quick Start Guide
Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5
Deliverability Counts
Deliverability Counts 10 Factors That Impact Email Deliverability Deliverability Counts 2015 Harland Clarke Digital www.hcdigital.com 1 20% of legitimate commercial email is not being delivered to inboxes.
USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security
USER S MANUAL Cloud Email Firewall 4.3.2.4 1 Contents 1. INTRODUCTION TO CLOUD EMAIL FIREWALL... 4 1.1. WHAT IS CLOUD EMAIL FIREWALL?... 4 1.1.1. What makes Cloud Email Firewall different?... 4 1.1.2.
An Efficient Spam Filtering Techniques for Email Account
American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-02, Issue-10, pp-63-73 www.ajer.org Research Paper Open Access An Efficient Spam Filtering Techniques for Email
DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise
Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How
1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5
Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. What makes Panda Cloud Email Protection different?... 4 1.1.2. Is it secure?... 4 1.2.
How to Add HealthCentral to Your Safe Senders List
How to Add HealthCentral to Your Safe Senders List Due to the growing problem of unsolicited and unwanted commercial emails, many web mail services and email applications have taken measures to automatically
How To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
Anti-Spam Configuration in Outlook 2003 INDEX. Webmail settings Page 2. Client settings Page 6. Creation date 12.12.06 Version 1.2
Anti-Spam Configuration in Outlook 2003 INDEX Webmail settings Page 2 Client settings Page 6 Creation date 12.12.06 Version 1.2 Webmail settings In this section, you will learn how to activate and configure
Spam DNA Filtering System
The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
Abstract. Find out if your mortgage rate is too high, NOW. Free Search
Statistics and The War on Spam David Madigan Rutgers University Abstract Text categorization algorithms assign texts to predefined categories. The study of such algorithms has a rich history dating back
Savita Teli 1, Santoshkumar Biradar 2
Effective Spam Detection Method for Email Savita Teli 1, Santoshkumar Biradar 2 1 (Student, Dept of Computer Engg, Dr. D. Y. Patil College of Engg, Ambi, University of Pune, M.S, India) 2 (Asst. Proff,
Efficient Spam Email Filtering using Adaptive Ontology
Efficient Spam Email Filtering using Adaptive Ontology Seongwook Youn and Dennis McLeod Computer Science Department, University of Southern California Los Angeles, CA 90089, USA {syoun, mcleod}@usc.edu
Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages in your
Overview of the Junk E-mail Filter in Outlook (Much of this text is extracted from the Outlook Help files.) Microsoft Outlook 2010 contains a Junk E-mail Filter designed to reduce unwanted e-mail messages
PROTECTION AGAINST SPAM USING PRE- CHALLENGES
PROTECTION AGAINST SPAM USING PRE- CHALLENGES Rodrigo Roman 1, Jianying Zhou 1, and Javier Lopez 2 1 Institute for Infocomm Research, 21 Heng Mui Keng Terrace, Singapore 119613; 2 E.T.S. Ingenieria Informatica,
Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY. Commercial-in-Confidence. Issue Number 1.5, 20 November 2012
Commercial in confidence TELSTRA WHOLESALE ACCEPTABLE USE POLICY Commercial-in-Confidence Issue Number 1.5, 20 November 2012 ACCEPTABLE USE POLICY The following is the Telstra Wholesale Acceptable Use
Introductory Programming Languages at Australian Universities at the Beginning of the Twenty First Century M. de Raadt and R.
Introductory Programming Languages at Australian Universities at the Beginning of the Twenty First Century M. de Raadt and R. Watson Department of Mathematics and Computing University of Southern Queensland
Managing Junk E-mail Folder in Outlook 2010. This document contains instructions for users on how to manage spam filters in Microsoft Outlook 2010.
Ready Reference 041013 Introduction Managing Junk E-mail Folder in Outlook 2010 This document contains instructions for users on how to manage spam filters in Microsoft Outlook 2010. Manual Filtering of
Achieve more with less
Energy reduction Bayesian Filtering: the essentials - A Must-take approach in any organization s Anti-Spam Strategy - Whitepaper Achieve more with less What is Bayesian Filtering How Bayesian Filtering
Why Bayesian filtering is the most effective anti-spam technology
Why Bayesian filtering is the most effective anti-spam technology Achieving a 98%+ spam detection rate using a mathematical approach This white paper describes how Bayesian filtering works and explains
Spam detection with data mining method:
Spam detection with data mining method: Ensemble learning with multiple SVM based classifiers to optimize generalization ability of email spam classification Keywords: ensemble learning, SVM classifier,
Eloqua Enhanced Branding and Deliverability More emails to the inbox means more opportunities and revenue.
Eloqua Enhanced Branding and Deliverability More emails to the inbox means more opportunities and revenue. Product Description In order to provide the best possible deliverability tool set, Eloqua has
1. INTRODUCTION. Keywords: SPAM, Arabic, Filters, E-Mail, ISPs, English.
Email SPAM Related Issues and Method of Controlling Used by Internet Service Providers [ISPs] in Saudi Arabia Hasan S. Alkahtani Robert Goodwin Paul G. Stephen EMAIL SPAM RELATED ISSUES AND METHODS OF
About this documentation
Wilkes University, Staff, and Students have a new email spam filter to protect against unwanted email messages. Barracuda SPAM Firewall will filter email for all campus email accounts before it gets to
The Unified Spam-Blocking System
The Unified Spam-Blocking System Enterprise User Guide September, 2003 Version 2.00 Copyright DigiPortal Software Inc, 2002-2003, All rights reserved Note: Any companies, services or people, other than
Email Filter for Spam Mail: A Review
Email Filter for Spam Mail: A Review Amar V. Sable 1 and Prof. Vijay S. Gulhane 2 1,2 Computer Science & Engineering Department, Sant Gadge Baba University, Amravati SIPNA College of Engineering & Technology,
Adjust Webmail Spam Settings
Adjust Webmail Spam Settings An unsolicited bulk email message is known as "spam." Spam, which usually contains some sort of commercial advertising or proposition, is sent to a large number of recipients
A Proposed Algorithm for Spam Filtering Emails by Hash Table Approach
International Research Journal of Applied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 4 (9): 2436-2441 Science Explorer Publications A Proposed Algorithm for Spam Filtering
Email. Daniel Zappala. CS 460 Computer Networking Brigham Young University
Email Daniel Zappala CS 460 Computer Networking Brigham Young University How Email Works 3/25 Major Components user agents POP, IMAP, or HTTP to exchange mail mail transfer agents (MTAs) mailbox to hold
Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011
Hosted CanIt Roaring Penguin Software Inc. 26 April 2011 1 1 Introduction Thank you for selecting Hosted CanIt. This document explains how Hosted CanIt works and how you should configure your network to
An Approach to Detect Spam Emails by Using Majority Voting
An Approach to Detect Spam Emails by Using Majority Voting Roohi Hussain Department of Computer Engineering, National University of Science and Technology, H-12 Islamabad, Pakistan Usman Qamar Faculty,
SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing
EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render
Email Management CSCU9B2 CSCU9B2 1
Email Management CSCU9B2 CSCU9B2 1 Contents Email clients choosing and using Email message header and content Emailing to lists of people In and out message management Mime attachments and HTML email SMTP,
(For purposes of this Agreement, "You", " users", and "account holders" are used interchangeably, and where applicable).
Key 2 Communications Inc. Acceptable Use Policy Please read carefully before accessing and/or using the Key 2 Communications Inc. Web site and/or before opening an account with Key 2 Communications Inc..
Anti-SPAM Solutions as a Component of Digital Communications Management
Anti-SPAM Solutions as a Component of Digital Communications Management Ron Shuck CISSP, GCIA, CCSE Agenda What is Spam & what can you do? What is the cost of Spam E-mail E to organizations? How do we
SendMIME Pro Installation & Users Guide
www.sendmime.com SendMIME Pro Installation & Users Guide Copyright 2002 SendMIME Software, All Rights Reserved. 6 Greer Street, Stittsville, Ontario Canada K2S 1H8 Phone: 613-831-4023 System Requirements
An Anti-Spam Action Plan for Canada. Industry Canada
An Anti-Spam Action Plan for Canada Industry Canada May 2004 The Problem An Anti-Spam Action Plan for Canada In just a few years, unsolicited commercial e-mail -- now generally known as spam 1 -- has gone
Configuring MDaemon for Centralized Spam Blocking and Filtering
Configuring MDaemon for Centralized Spam Blocking and Filtering Alt-N Technologies, Ltd 2201 East Lamar Blvd, Suite 270 Arlington, TX 76006 (817) 525-2005 http://www.altn.com July 26, 2004 Contents A Centralized
PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1
PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. Why is Panda Cloud Email Protection
Ipswitch IMail Server with Integrated Technology
Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these
Spam Filtering Methods for Email Filtering
Spam Filtering Methods for Email Filtering Akshay P. Gulhane Final year B.E. (CSE) E-mail: [email protected] Sakshi Gudadhe Third year B.E. (CSE) E-mail: [email protected] Shraddha A.
Spam filtering. Peter Likarish Based on slides by EJ Jung 11/03/10
Spam filtering Peter Likarish Based on slides by EJ Jung 11/03/10 What is spam? An unsolicited email equivalent to Direct Mail in postal service UCE (unsolicited commercial email) UBE (unsolicited bulk
The DMA s Analysis of Can Spam Act of 2003
The DMA s Analysis of Can Spam Act of 2003 December 11, 2003 The following is a Direct Marketing Association analysis of the Can Spam Act of 2003 (S. 877), which Congress sent to the President for signing
