Spam Classification Techniques

Size: px
Start display at page:

Download "Spam Classification Techniques"

Transcription

1 Spam Classification Techniques Executive Overview It costs companies nearly $2,000 per employee a year in lost productivity, double from a year ago. Nucleus Research, USA Today, June 2004 In its infancy, spam was fairly random and easily handled using keyword filters and black lists. Today, there s nothing basic or easy about spam it s tricky, sophisticated and costs corporations millions of dollars every year. Spammers are developing more sophisticated and more dangerous attacks programming their messages and creating threats designed to defeat even the most complex anti-spam and anti-virus filters. By creating blended threats those that combine mass-mailing mechanisms with worms and viruses malicious code can more easily and quickly enter office networks and exploit system vulnerabilities. Studies indicate that in 2005, percent of will be spam, viruses and other unwanted content. 1 Along with the mere frustration of cleaning up after junk attacks is the cost. According to a June 2004 USA Today article, Nucleus Research reported that spam cost companies nearly $2,000 per employee a year in lost productivity a figure that has doubled since In direct response to this increase in spam volume and sophistication, the methods to control threats are also evolving. Some are built into Message Transfer Agents (MTAs) that process mail, some are available through open source software solutions, and some are proprietary solutions created by companies specializing in Internet or security. Unfortunately, spam is a problem that is not going away. And fighting spam requires constant threat monitoring and protection. As new anti-spam techniques are developed to control the latest spam threats, spammers make every effort to stay one step ahead developing newer and even more malicious spam tactics. It is critical that organizations understand the latest spammer tactics and spamfighting techniques in order to combat spammers relentless efforts. Only by remaining aware of and implementing the latest spam protection methods can an organization mitigate the costs and risk associated with spam. 1 Ferris Research 1

2 Today, the most effective methods of detecting, classifying and controlling spam are: Multi-layered filtering is the most effective way of fighting spam. 1. Domain level black and white lists 2. Distributed black lists 3. Heuristics engines 4. Statistical classification engines 5. Honey pots 6. Peer-to-peer networks 7. Challenge-response 8. Reputation analysis 9. Sender authentication This white paper considers these methods of classifying and controlling spam, and suggests that multi-layered filtering is the most effective way of fighting spam using a solution that aggregates a number of these methods into a coordinated spam-fighting framework. Spam Classification Techniques The most effective methods for identifying, classifying and controlling spam today are outlined below. 1. DOMAIN-LEVEL BLACK AND WHITE LISTS Domain-level black and white lists are the original and most basic forms of blocking spam. Employing this method, a domain administrator simply puts an offending spammer s address on a blacklist so that all future from that address is denied. Alternatively, to ensure that from a particular sender is always accepted, administrators would add a sender s address to a white list. While black and white lists can be very useful in blocking or allowing specific addresses, this approach has its limitations. First, it is cumbersome and time-consuming requiring constant list maintenance in order to be effective. Second, spammers use hundreds or even thousands of different addresses to send out their mass mailings, so blocking only a few of these addresses is unlikely to have any significant impact on the flow of spam. Third, spammers often spoof their address, which makes it appear as though their junk is coming from a legitimate sender. In short, while developing black and white lists is a good first step in the fight against spam, this method alone will typically stop less than 10 percent of spam. 2. DISTRIBUTED BLACK LISTS 2

3 Distributed black lists take domain-level black lists to a higher level. Distributed black lists, such as those supported by the Mail Abuse Prevention System (MAPS), operate at the network level. Known spammer addresses and domains are catalogued, and that information is made available on the Internet, either free or by paid subscription. Once deployed into an anti-spam solution, these black lists will automatically block any sent from one of the known spammer addresses on the list. Many organizations have found these distributed black lists to be very useful. Unfortunately, there are instances where legitimate sender addresses have been erroneously added to the list and require significant effort to be removed. For this reason, organizations that are concerned with false positives, legitimate misidentified as spam tend to avoid using distributed black lists. 3. HEURISTICS ENGINES Heuristics are a series of rules used to score the spam probability an human-engineered rules by which a program analyses an message for spam-like characteristics. These rules may look for multiple uses of phrases like Get Rich!!! or Free Viagra! incorporating hundreds and sometimes thousands of rules in order to catch spam. Operating on a scoring-type system, point values are associated whenever a rule detects a spam-like characteristic. Therefore, a message might get a certain number of points for containing a word like Viagra, more points if it contains a click here link, and even more points if the message includes the phrase click here to unsubscribe. Depending on the parameters established, reaching a certain score would classify the message as spam and cause it to end up in quarantine. While heuristics engines have been quite effective over the years, an increase in more sophisticated spamming tactics has impacted the effectiveness of this method. Today, these rules are often available through open-source projects, or as software that can be purchased by spammers just as readily as by regular consumers. Spammers then reverse-engineer these rules to groom their messages before sending them out making sure that they can pass through the filters largely undetected. Another drawback to using heuristics is the labor required to maintain the rules. Even if a company or organization develops its own heuristics engine, the rules must be continuously updated as new spam attacks occur. 4. STATISTICAL CLASSIFICATION ENGINES Statistical classification has been one of the most effective spam fighting methods. Currently, the most common form of statistical classification is Bayesian filtering, which like heuristics, also 3

4 analyzes the content of an message. Unlike rules-based heuristics engines, however, statistical classification engines assess the probability that a given is spam based on how often certain elements, or tokens, within that have appeared previously in other spam s. To make this determination, statistical classification engines compare a large body (or corpus ) of spam with a similarly-sized corpus of legitimate . Each corpus is examined for tokens chunks of text or header information. Some tokens ( Get Rich!!! ) will appear almost entirely in spam , and almost never in legitimate . Thus, based on the prior appearance of certain tokens, statistical classification engines determine the probability that a new message containing certain tokens is spam. The overwhelming advantage of statistical classification methods is that they are extremely accurate, and require only occasional maintenance. Remarkably, statistical classification methods, such as Bayesian filtering, can essentially learn new spammer techniques with minimal human involvement. Yet even though statistical classification has been very successful in its ability to filter spam, some weaknesses have been discovered. 5. HONEY POTS The honey pot method of classifying spam involves seeding the Internet with dummy addresses. The sole purpose of these dummy addresses, or honey pots, is to attract spam. The that comes into these honey pots is then analyzed, and all instances of spam are recorded in a database. The company using this honey pot approach then provides its customers with a service that compares all of that customer s incoming with the database of known spam caught by the honey pots, and blocks any matches. While the honey pot method is very effective, it is usually reactive detecting spam attacks only after they occur. Therefore the honey pot approach works best when combined with other anti-spam solutions. 6. PEER-TO-PEER NETWORKS Peer-to-peer networks offer another interesting method of controlling spam. In short, these networks provide individual members of such a network with the capability (usually a plug-in on their client) to report instances of spam back to the network. Each time a spam appears, the individual members can simply click a button that will, in effect, delete the as spam then simultaneously report the spam back to the network so it is recognized and blocked before it reaches others 4

5 on the same network. Thus, this collaborative network can benefit from a collective effort to control spam. The obvious problem with this method is in the subjective nature of spam classification: what one person considers spam, another may not. And even though these peer-to-peer networks have mechanisms in place to protect against both draconian and overly permissive spam controls, problems with this method remain not uncommon with an approach that involves a collaborative network of users with a multiplicity of opinions. 7. CHALLENGE-RESPONSE This method of controlling spam is a modified and hyper-extended form of the white list. Like a traditional white list, only from senders already on a list of allowed senders is permitted to enter the inbox. In order for a new sender to make it onto the white list, the sender of a new must prove that the message is being sent from an actual human, not a message coming from an anonymous or autonomous spammer s computer. When an comes in from an address not on the recipient s white list, a challenge is immediately sent back to the sender with a message stating that the will only be delivered to the recipient if the sender successfully completes a challenge. These challenges are typically very simple answering a question like How many cats are in this picture? or being asked to Retype the distorted word in the image below. The questions, however, are designed so that they would only be correctly answered by a human. If the sender successfully passes the challenge, the is delivered, and the sender s address is added to the recipient s white list. While this authenticated sender method is certainly effective at blocking spam delivered by the millions from an unknown computer, many users have found the extreme restrictions of this white list-only approach to be frustrating and often unprofessional. And, with systems based on this method, the anxiety and uncertainty of missed always exists since there are times when legitimate is not delivered because the challenge is not completed whether it s because the sender is unable to answer the challenge question immediately, or because an executive feels silly viewing a picture of kittens and checking a box before his or her can be delivered. Furthermore, the recent wave of worms (Sobig, MyDoom, etc.) that can infect PCs and use them to distribute spam are often able to exploit these challenge-response mechanisms. Worms on infected PCs will hijack the address books on local hard drives and send spam to any addresses they find; if recipients of that spam have the infected PC on their allow list of trusted senders, the spam will bypass the challenge-response defense. 5

6 8. REPUTATION ANALYSIS Reputation analysis blocks spam originating from a specific Internet Protocol (IP) address or domain based on the reputation of that IP address. In other words, reputation analysis monitors IP addresses and the amount of spam sent from these addresses. If an IP address sends an enormous amount of spam, then it is usually recognized as a spam source and future attempts of that IP address to send mail will be blocked. The only problem with reputation-based analysis when used alone to stop spam is that IP addresses known to deliver volumes of spam can also send legitimate mail. Thus, reputation analysis must be mitigated with other spam-detection techniques. If reputation analysis is used as the sole method of stopping spam by simply not accepting from offending IP address it increases the risk that legitimate will be blocked. Additionally, the concept of reputation-based filtering can also be applied to anti-spam black lists, wherein black lists that block known spammers can themselves be given a reputation based on how accurate they have proven themselves. 9. SENDER AUTHENTICATION Sender authentication is a new method for blocking spam that attempts to stop spammers from spoofing legitimate domains. In order to avoid detection, spammers will modify their messages so it appears their junk is coming from trusted domains, when in fact the true source (IP address) is very different. In order to protect against this type of spoofing, sender authentication will allow all legitimate domains to provide a public list of the IP addresses associated with their domains. Thus, sender authentication technologies double-check or authenticate every that comes through, making sure that the source IP address is legitimately associated with the domain of the . If the actual IP address on the incoming does not match the IP address associated with the domain, the will be blocked. Sender authentication methodologies, of which SenderID and Sender Policy Framework (SPF) are the most likely to be implemented, are just beginning to be integrated and adopted, and will require an Internet-wide effort to work effectively. Nevertheless, sender authentication is seen as one of the most promising anti-spam technologies proposed, and it has been adopted by a number of spam-fighting companies. Summary of Spam Classification Techniques The above methods of identifying, classifying and controlling spam are not the only ones available to fight spam, but they are currently 6

7 the most common. Indeed, there are other methods, ranging from sophisticated header analysis to copyright-imbedded text that only legitimate senders can use without risking a lawsuit. In the current war on spam, however, the methods described in this white paper have proven to be the most effective. So which of these is the single best method? The only accurate answer would be none. Each one has shortcomings, and none of them are 100 percent effective at blocking spam while maintaining an acceptable false positive rate. Even the Bayesian statistical classification method arguably the current best-of-breed approach to spam control is not perfect. The best method for fighting spam is one that incorporates a number of these nine individual methods. However, incorporating a variety of these methods within one organization might involve a prohibitively complex and expensive effort. Some of these solutions are usually provided as client- or server-side software. Other solutions come in the form of appliances installed alongside a firewall. Still others are provided as services. To combine a number of these into one spam-fighting solution would, therefore, require an unwieldy, patchwork system of approaches, and managing them could become a full-time job for an organization s IT administrator. For this reason, most organizations choose one type of filtering method and work with its limitations. The best method for fighting spam is one that incorporates a number of the nine individual methods described in this white paper. There is, however, a means of combining a number of these solutions into one coordinated spam-fighting solution controlled by a single interface. Only as a managed service can multiple spam control solutions be incorporated into a unified spam control system using a single interface. MX Logic has created exactly this sort of solution in its Stacked Classification Framework. MX Logic s Stacked Classification Framework No longer considered merely a nuisance, unwanted, unsolicited is putting extreme pressure on employee productivity and network capacity across organizations worldwide. To help defend business networks with the most accurate spam filtering and protection in the market, MX Logic developed its Stacked Classification Framework. This patent-pending technology combines the most effective spam-fighting techniques in the industry to successfully block 98 percent of spam with an industry-low rate of misidentified as spam also known as false positives. 7

8 The Stacked Classification Framework uses the combined filtering power of techniques including Bayesian Statistical Analysis, Reputation-based Filtering (for both IP addresses and Realtime Blackhole Lists), Industry-wide and Proprietary Heuristics Rules- Based Analysis, Reputation Analysis, URL Filtering and Reputationbased real-time blackhole lists (RBL) filtering. (Outside of the Stacked Classification Framework, MX Logic also uses Distributed Black Lists and Global Black Lists, and Customer-Defined Deny and Allow Lists to further identify spam.) And, MX Logic will soon be integrating Sender Authentication. Each of these filters dynamically calculates the spam probability of every message. With this multi-layered approach, the different spam filters can separately assess and vote on the probability that a specific is spam. Because each filtering method has unique strengths designed to identify specific threats, the combination creates one of the most accurate and comprehensive filtering processes in the industry. The MX Logic Defense Service use a multi-layered spamfighting process to identify unsolicited junk . It provides control over spam before it can reach the enterprise network. Enterprises can set specific filtering parameters based on their established corporate policies, which include deleting, tagging, or allowing specific messages and constructing customizable black and white lists. While MX Logic boasts one of the industry s lowest false positive rates, organizations can further reduce misidentified by using the sophisticated quarantine features to define how quarantined messages should be handled in the future. In addition to the Stacked Classification Framework, the effectiveness of MX Logic s solutions is made possible by the integration of unique and advanced technology and processes including powerful perimeter-based protection, in-line message filtering, scalable and robust architecture, virus and worm engines, and around-the-clock threat management. With MX Logic s comprehensive anti-spam technologies, which provide the most advanced spam-fighting techniques available, enterprise networks remain free from offensive, unwanted, and unsolicited . About MX Logic MX Logic, Inc. provides innovative defense solutions that ensure protection and security for enterprises, service providers, government organizations, and resellers and their customers. Deployed as a managed service or on-premise software, 8

9 the company's feature-rich solution suite is the industry's most comprehensive, flexible and easy to use. MX Logic s cost-effective service provides around-the-clock protection, automatically intercepting, analyzing and blocking malicious and unsolicited messages at the network perimeter before they can enter or leave an internal network. Unlike other protection solutions, MX Logic s services act as a proxy, filtering messages in-line as they are delivered to the customer reducing the risk of message loss common to the store-and-forward method used by other providers. Using a patent-pending Stacked Classification Framework, which leverages the strengths of leading spam-fighting filters, MX Logic can accurately stop 98 percent of spam and viruses at the network perimeter. Fortifying the filtering process with two industry-leading anti-virus engines makes our Defense Service one of the most comprehensive solutions on the market today. Through the company's managed service offering, MX Logic processes millions of messages per day for over 2,500 organizations, including EnCana, Hyundai Motor America, The Sports Authority, YMCA, and ServiceMaster. In addition, MX Logic is the only defense company to offer both a managed service and a turnkey, carrier-grade software solution for service providers. For more information, visit. 9

Controlling Unwanted Content

Controlling Unwanted Content Controlling Unwanted Content Executive Overview At least 50 percent of employees receive racist, sexist, pornographic, or other inappropriate email while at work. USA Today Email has become an extremely

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

Software Engineering 4C03 SPAM

Software Engineering 4C03 SPAM Software Engineering 4C03 SPAM Introduction As the commercialization of the Internet continues, unsolicited bulk email has reached epidemic proportions as more and more marketers turn to bulk email as

More information

The benefits of using a perimeter-based managed service

The benefits of using a perimeter-based managed service W H I T E P A P E R Ensuring Email Security The benefits of using a perimeter-based managed service Ensuring Email Security page 1 Executive Overview With unsolicited email costing businesses millions

More information

An Overview of Spam Blocking Techniques

An Overview of Spam Blocking Techniques An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now

More information

Intercept Anti-Spam Quick Start Guide

Intercept Anti-Spam Quick Start Guide Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5

More information

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach

www.pandasecurity.com 100% Malware-Free E-mail: A Guaranteed Approach 100% Malware-Free E-mail: A Guaranteed Approach 2 100% Malware-Free E-mail: A Guaranteed Approach Panda Security's Mail Filtering Managed Service Guarantees Clean E-mail Table of Contents Table of Contents...

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How Hosted Email Security Inbound Filtering Adds Value to Your Existing Environment A Trend Micro White Paper l March 2010 1 Table of Contents Introduction...3

More information

Eiteasy s Enterprise Email Filter

Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer

More information

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007

COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007 COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different

More information

Why Content Filters Can t Eradicate spam

Why Content Filters Can t Eradicate spam WHITEPAPER Why Content Filters Can t Eradicate spam About Mimecast Mimecast () delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate

More information

ContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering

ContentCatcher. Voyant Strategies. Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering Voyant Strategies ContentCatcher Best Practice for E-Mail Gateway Security and Enterprise-class Spam Filtering tm No one can argue that E-mail has become one of the most important tools for the successful

More information

escan Anti-Spam White Paper

escan Anti-Spam White Paper escan Anti-Spam White Paper Document Version (esnas 14.0.0.1) Creation Date: 19 th Feb, 2013 Preface The purpose of this document is to discuss issues and problems associated with spam email, describe

More information

REPUTATION-BASED MAIL FLOW CONTROL

REPUTATION-BASED MAIL FLOW CONTROL WHITE PAPER REPUTATION-BASED MAIL FLOW CONTROL Blocking Extreme Spam and Reducing False Positives Blocking unsolicited commercial email or spam is an increasingly important but difficult task for IT staff.

More information

Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats

Commtouch RPD Technology. Network Based Protection Against Email-Borne Threats Network Based Protection Against Email-Borne Threats Fighting Spam, Phishing and Malware Spam, phishing and email-borne malware such as viruses and worms are most often released in large quantities in

More information

REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS

REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS Rami Khasawneh, Acting Dean, College of Business, Lewis University, khasawra@lewisu.edu Shamsuddin Ahmed, College of Business and Economics, United Arab

More information

Gordon State College. Spam Firewall. User Guide

Gordon State College. Spam Firewall. User Guide Gordon State College Spam Firewall User Guide Overview The Barracuda Spam Firewall is an integrated hardware and software solution that provides powerful and scalable spam and virus-blocking capabilities

More information

Global Reputation Monitoring The FortiGuard Security Intelligence Database WHITE PAPER

Global Reputation Monitoring The FortiGuard Security Intelligence Database WHITE PAPER Global Reputation Monitoring The FortiGuard Security Intelligence Database WHITE PAPER FORTINET Global Reputation Monitoring PAGE 2 Overview Fortinet s FortiGuard Security Services delivers two essential

More information

Trend Micro Hosted Email Security Stop Spam. Save Time.

Trend Micro Hosted Email Security Stop Spam. Save Time. Trend Micro Hosted Email Security Stop Spam. Save Time. How it Works: Trend Micro Hosted Email Security A Trend Micro White Paper l March 2010 Table of Contents Introduction...3 Solution Overview...4 Industry-Leading

More information

SPAM FILTER Service Data Sheet

SPAM FILTER Service Data Sheet Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic

More information

E-MAIL FILTERING FAQ

E-MAIL FILTERING FAQ V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:

More information

Antispam Security Best Practices

Antispam Security Best Practices Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers

More information

About this documentation

About this documentation Wilkes University, Staff, and Students have a new email spam filter to protect against unwanted email messages. Barracuda SPAM Firewall will filter email for all campus email accounts before it gets to

More information

Stop Spam. Save Time.

Stop Spam. Save Time. Stop Spam. Save Time. A Trend Micro White Paper I January 2015 Stop Spam. Save Time. Hosted Email Security: How It Works» A Trend Micro White Paper January 2015 TABLE OF CONTENTS Introduction 3 Solution

More information

Choose Your Own - Fighting the Battle Against Zero Day Virus Threats

Choose Your Own - Fighting the Battle Against Zero Day Virus Threats Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats 1 of 2 November, 2004 Choose Your Weapon: Fighting the Battle against Zero-Day Virus Threats Choose Your Weapon: Fighting the Battle

More information

HOW TO PREVENT SPAM AND MALWARE IN MAIL MOST EFFECTIVELY Index 1. Battling the increase in malware 2 2. Addressing the surplus of spam 3 3. The mail server A critical vulnerability 4 3.1 Denial of Service

More information

Solutions IT Ltd Virus and Antispam filtering solutions 01324 877183 Info@solutions-it.co.uk

Solutions IT Ltd Virus and Antispam filtering solutions 01324 877183 Info@solutions-it.co.uk Contents Reduce Spam & Viruses... 2 Start a free 14 day free trial to separate the wheat from the chaff... 2 Emails with Viruses... 2 Spam Bourne Emails... 3 Legitimate Emails... 3 Filtering Options...

More information

Groundbreaking Technology Redefines Spam Prevention. Analysis of a New High-Accuracy Method for Catching Spam

Groundbreaking Technology Redefines Spam Prevention. Analysis of a New High-Accuracy Method for Catching Spam Groundbreaking Technology Redefines Spam Prevention Analysis of a New High-Accuracy Method for Catching Spam October 2007 Introduction Today, numerous companies offer anti-spam solutions. Most techniques

More information

Do you need to... Do you need to...

Do you need to... Do you need to... TM Guards your Email. Kills Spam and Viruses. Do you need to... Do you need to... Scan your e-mail traffic for Viruses? Scan your e-mail traffic for Viruses? Reduce time wasted dealing with Spam? Reduce

More information

Comprehensive Anti-Spam Service

Comprehensive Anti-Spam Service Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive

More information

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection

More information

Savita Teli 1, Santoshkumar Biradar 2

Savita Teli 1, Santoshkumar Biradar 2 Effective Spam Detection Method for Email Savita Teli 1, Santoshkumar Biradar 2 1 (Student, Dept of Computer Engg, Dr. D. Y. Patil College of Engg, Ambi, University of Pune, M.S, India) 2 (Asst. Proff,

More information

We take care of your email protection, continuity and archiving so you can take care of your business. INTRODUCING: HOSTED McAFEE SERVICES

We take care of your email protection, continuity and archiving so you can take care of your business. INTRODUCING: HOSTED McAFEE SERVICES We take care of your email protection, continuity and archiving so you can take care of your business. INTRODUCING: HOSTED McAFEE SERVICES Hosted McAfee Saas Services frees Tanya Venter of the South African

More information

The Radicati Group, Inc. ...

The Radicati Group, Inc. ... . The Radicati Group, Inc. 1900 Embarcadero Rd., Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com The Radicati Group, Inc. An Analyst Review of Hotmail Anti-Spam

More information

Comprehensive Email Filtering. Whitepaper

Comprehensive Email Filtering. Whitepaper Comprehensive Email Filtering Whitepaper Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks and the alarming influx of spam, email loses

More information

Spam DNA Filtering System

Spam DNA Filtering System The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,

More information

Symantec Hosted Mail Security Getting Started Guide

Symantec Hosted Mail Security Getting Started Guide Symantec Hosted Mail Security Getting Started Guide Redirecting Your MX Record You have successfully activated your domain within the Symantec Hosted Mail Security Console. In order to begin the filtration

More information

Protecting your business from spam

Protecting your business from spam Protecting your business from spam What is spam? Spam is the common term for electronic junk mail unwanted messages sent to a person s email account or mobile phone. Spam messages vary: some simply promote

More information

Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest?

Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest? Introduction The purpose of this memo is to explain how the email that originates from outside this organization is processed, and to describe the tools that you can use to manage your personal spam quarantine.

More information

MDaemon configuration recommendations for dealing with spam related issues

MDaemon configuration recommendations for dealing with spam related issues Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did

More information

Avira Managed Email Security AMES FAQ. www.avira.com

Avira Managed Email Security AMES FAQ. www.avira.com Avira Managed Email Security AMES FAQ www.avira.com Can AMES be used immediately after an account for our organization has been set up in the MyAccount user portal? Using your account requires a change

More information

Spam Filter Message Center. User Guide

Spam Filter Message Center. User Guide Spam Filter Message Center User Guide Powered by MX Resources, LLC 10573 W. Pico Blvd., #343 Los Angeles, CA 90064 (888) 556-7788 support@mxresources.com Introduction Introduction to the Postini Message

More information

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise

More information

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5 Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed

More information

Filtering Service. Secure E-Mail Gateway (SEG) Service Administrative Guides. Revised February 2013

Filtering Service. Secure E-Mail Gateway (SEG) Service Administrative Guides. Revised February 2013 Secure E-Mail Gateway (SEG) Service Administrative Guides Filtering Service Revised February 2013 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained

More information

Anti Spamming Techniques

Anti Spamming Techniques Anti Spamming Techniques Written by Sumit Siddharth In this article will we first look at some of the existing methods to identify an email as a spam? We look at the pros and cons of the existing methods

More information

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling

When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection

More information

How to Stop Spam Emails and Bounces

How to Stop Spam Emails and Bounces Managing Your Email Reputation For most companies and organizations, email is the most important means of business communication. The value of email today, however, has been compromised by the rampant

More information

Opus One PAGE 1 1 COMPARING INDUSTRY-LEADING ANTI-SPAM SERVICES RESULTS FROM TWELVE MONTHS OF TESTING INTRODUCTION TEST METHODOLOGY

Opus One PAGE 1 1 COMPARING INDUSTRY-LEADING ANTI-SPAM SERVICES RESULTS FROM TWELVE MONTHS OF TESTING INTRODUCTION TEST METHODOLOGY Joel Snyder Opus One February, 2015 COMPARING RESULTS FROM TWELVE MONTHS OF TESTING INTRODUCTION The following analysis summarizes the spam catch and false positive rates of the leading anti-spam vendors.

More information

XGENPLUS SECURITY FEATURES...

XGENPLUS SECURITY FEATURES... Security Features Table of Contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. XGENPLUS SECURITY FEATURES... 3 3. SERVER LEVEL FEATURES... 5 4. DOMAIN LEVEL FEATURES... 8 5. USER LEVEL FEATURES...

More information

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. 2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered

More information

No filter is perfect. But with your help, MailCleaner may aim at perfection. Case Description Solution

No filter is perfect. But with your help, MailCleaner may aim at perfection. Case Description Solution A Filter inaccuracies No filter is perfect. But with your help, MailCleaner may aim at perfection. The filtering system implemented by MailCleaner relies on automated and systematic controls that cannot

More information

How To Prevent Hacker Attacks With Network Behavior Analysis

How To Prevent Hacker Attacks With Network Behavior Analysis E-Guide Signature vs. anomaly-based behavior analysis News of successful network attacks has become so commonplace that they are almost no longer news. Hackers have broken into commercial sites to steal

More information

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know I n t r o d u c t i o n Until the late 1990s, network security threats were predominantly written by programmers seeking notoriety,

More information

MXSweep Hosted Email Protection

MXSweep Hosted Email Protection ANTI SPAM SOLUTIONS TECHNOLOGY REPORT MXSweep Hosted Email Protection JANUARY 2007 www.westcoastlabs.org 2 ANTI SPAM SOLUTIONS TECHNOLOGY REPORT CONTENTS MXSweep www.mxsweep.com Tel: +44 (0)870 389 2740

More information

http://connectwise.reflexion.net/login?domain=connectwise.net

http://connectwise.reflexion.net/login?domain=connectwise.net ConnectWise Total Control: Managed Email Threat Protection Version: 1.5 Creation Date: 11-September-2009 Last Updated: 24-August-2012 LOGGING IN An e-mail will be or has sent with your username and password.

More information

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL EmailDirect is an email marketing solution provider (ESP) which serves hundreds of today s top online marketers by providing all the functionality and expertise required to send and track effective email

More information

IBM Lotus Protector for Mail Security 2.5. Empower users and extend your IBM Lotus Notes and Lotus Domino security features

IBM Lotus Protector for Mail Security 2.5. Empower users and extend your IBM Lotus Notes and Lotus Domino security features Security capabilities To support your business objectives IBM Lotus Protector for Mail Security 2.5. Empower users and extend your IBM Lotus Notes and Lotus Domino security features Give users complete

More information

How to Use Red Condor Spam Filtering

How to Use Red Condor Spam Filtering What is Spam Filtering? Spam filtering is used to detect unsolicited and unwanted email. By looking for certain words in an email's subject line, or through suspicious word patterns or word frequencies

More information

Anti Spam Best Practices

Anti Spam Best Practices 39 Anti Spam Best Practices Anti Spam Engine: Time-Tested Scanning An IceWarp White Paper October 2008 www.icewarp.com 40 Background The proliferation of spam will increase. That is a fact. Secure Computing

More information

The Growing Problem of Outbound Spam

The Growing Problem of Outbound Spam y The Growing Problem of Outbound Spam An Osterman Research Survey Report Published June 2010 SPONSORED BY! #$!#%&'()*(!!!!"#$!#%&'()*( Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058

More information

Understanding Proactive vs. Reactive Methods for Fighting Spam. June 2003

Understanding Proactive vs. Reactive Methods for Fighting Spam. June 2003 Understanding Proactive vs. Reactive Methods for Fighting Spam June 2003 Introduction Intent-Based Filtering represents a true technological breakthrough in the proper identification of unwanted junk email,

More information

Messaging Assurance Gateway: The Next-Generation in Anti-Spam & Anti-Virus Solutions

Messaging Assurance Gateway: The Next-Generation in Anti-Spam & Anti-Virus Solutions Message Assurance Gateway: Next Generation in Anti-Spam & Anti-Virus Solutions: Messaging Assurance Gateway: The Next-Generation in Anti-Spam & Anti-Virus Solutions The Problem: Spam is Growing, Unchecked

More information

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World Securing Your Web World WEBTHREATS Constantly Evolving Web Threats Require Revolutionary Security ANTI-SPYWARE ANTI-SPAM WEB REPUTATION ANTI-PHISHING WEB FILTERING Web Threats Are Serious Business Your

More information

Antispam Evaluation Guide. White Paper

Antispam Evaluation Guide. White Paper Antispam Evaluation Guide White Paper Table of Contents 1 Testing antispam products within an organization: 10 steps...3 2 What is spam?...4 3 What is a detection rate?...4 4 What is a false positive rate?...4

More information

Kaspersky Anti-Spam 3.0

Kaspersky Anti-Spam 3.0 Kaspersky Anti-Spam 3.0 Whitepaper Collecting spam samples The Linguistic Laboratory Updates to antispam databases Spam filtration servers Spam filtration is more than simply a software program. It is

More information

OVERVIEW OF SPAM FILTERS FOR MAC OS X EMAIL CLIENTS A PRESENTATION TO MACFUNDAMENTALS MADE ON WEDNESDAY, APRIL 9, 2008 BY LEE MAXWELL, FACILITATOR

OVERVIEW OF SPAM FILTERS FOR MAC OS X EMAIL CLIENTS A PRESENTATION TO MACFUNDAMENTALS MADE ON WEDNESDAY, APRIL 9, 2008 BY LEE MAXWELL, FACILITATOR OVERVIEW OF SPAM FILTERS FOR MAC OS X EMAIL CLIENTS A PRESENTATION TO MACFUNDAMENTALS MADE ON WEDNESDAY, APRIL 9, 2008 BY LEE MAXWELL, FACILITATOR FIGHTING SPAM WE ALL KNOW HOW BAD SPAM HAS BECOME: TENS,

More information

Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development

Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Author André Tschentscher Address Fachhochschule Erfurt - University of Applied Sciences Applied Computer Science

More information

The Leading Email Security Suites

The Leading Email Security Suites The Leading Email Security Suites What is SpamSniper? The Leading Email Security Suites for Your Secure Messaging SpamSniper is the leading email security solution which locates in front of mail server

More information

How To Protect Your Email From Spam On A Barracuda Spam And Virus Firewall

How To Protect Your Email From Spam On A Barracuda Spam And Virus Firewall Comprehensive Email Filtering: Barracuda Spam & Virus Firewall Safeguards Legitimate Email Email has undoubtedly become a valued communications tool among organizations worldwide. With frequent virus attacks

More information

Mailwall Remote Features Tour Datasheet

Mailwall Remote Features Tour Datasheet Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for

More information

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems

More information

Spam Filtering Methods for Email Filtering

Spam Filtering Methods for Email Filtering Spam Filtering Methods for Email Filtering Akshay P. Gulhane Final year B.E. (CSE) E-mail: akshaygulhane91@gmail.com Sakshi Gudadhe Third year B.E. (CSE) E-mail: gudadhe.sakshi25@gmail.com Shraddha A.

More information

Administration Guide Revision E. SaaS Email Protection

Administration Guide Revision E. SaaS Email Protection Administration Guide Revision E SaaS Email Protection COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK ATTRIBUTIONS

More information

PROOFPOINT - EMAIL SPAM FILTER

PROOFPOINT - EMAIL SPAM FILTER 416 Morrill Hall of Agriculture Hall Michigan State University 517-355-3776 http://support.anr.msu.edu support@anr.msu.edu PROOFPOINT - EMAIL SPAM FILTER Contents PROOFPOINT - EMAIL SPAM FILTER... 1 INTRODUCTION...

More information

Junk Email Filtering System. User Manual. Copyright Corvigo, Inc. 2002-03. All Rights Reserved. 509-8282-00 Rev. C

Junk Email Filtering System. User Manual. Copyright Corvigo, Inc. 2002-03. All Rights Reserved. 509-8282-00 Rev. C Junk Email Filtering System User Manual Copyright Corvigo, Inc. 2002-03. All Rights Reserved 509-8282-00 Rev. C The Corvigo MailGate User Manual This user manual will assist you in initial configuration

More information

FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives

FortiMail Email Filtering Course 221-v2.0. Course Overview. Course Objectives FortiMail Email Filtering Course 221-v2.0 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to configure,

More information

McAfee SaaS Email Protection

McAfee SaaS Email Protection Solution Guide McAfee SaaS Email Protection Solution Guide Table of Contents Overview 3 McAfee SaaS Email Protection The Best Defense 4 Multiple Layers of Filtering Technology 5 Additional Anti-Spam Tools

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution.

Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution. Security capabilities To support your business objectives Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution. Preemptive protection and spam control

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

Recurrent Patterns Detection Technology. White Paper

Recurrent Patterns Detection Technology. White Paper SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware

More information

WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW

WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW WEBSENSE EMAIL SECURITY SOLUTIONS OVERVIEW Challenge The nature of email threats has changed over the past few years. Gone are the days when email security, better known as anti-spam, was primarily tasked

More information

Barracuda Spam Firewall

Barracuda Spam Firewall Barracuda Spam Firewall Overview The Barracuda Spam Firewall is a network appliance that scans every piece of email our organization receives. Its main purposes are to reduce the amount of spam we receive

More information

Anglia IT Solutions Managed Anti-SPAM

Anglia IT Solutions Managed Anti-SPAM By Appointment to Her Majesty The Queen Supplier of IT Products and Support Anglia IT Solutions Limited Swaffham Anglia IT Solutions Managed Anti-SPAM A Simple Guide All Rights Reserved. This document

More information

Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam

Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam DOCUMENT REVISION DATE: October, 2010 Boundary Defense for Email Admin Guide / Table of Contents Page 2 of 34 Table of Contents 1 INTRODUCTION...

More information

An Advanced Reputation Management Approach to Stopping Emerging Email Threats

An Advanced Reputation Management Approach to Stopping Emerging Email Threats An Advanced Reputation Management Approach to Stopping Emerging Email Threats CONTENTS The Evolution of Reputation Management 2 Emerging Security Threats 2 Advanced Reputation Management (ARM) 3 How ARM

More information

How To Filter Email From A Spam Filter

How To Filter Email From A Spam Filter Spam Filtering A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction Spam filtering is a catch- all term that describes the steps that happen to an email between a sender and a receiver

More information

The Guardian Digital Control and Policy Enforcement Center

The Guardian Digital Control and Policy Enforcement Center Protects Against The Guardian Digital Control and Policy Enforcement Center P R O T E C T S A G A I N S T : Viruses Unsolicited Junk Email Malicious Code Internet Fraud & Phishing Hazardous File Attachments

More information

Spam Configuration/Training Guide

Spam Configuration/Training Guide Spam Configuration/Training Guide GWAVA4 Copyright 2007. Beginfinite, Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com CONTENTS OVERVIEW... 4 SECTION OVERVIEW...

More information

Spear Phishing Attacks Why They are Successful and How to Stop Them

Spear Phishing Attacks Why They are Successful and How to Stop Them White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear

More information

PROTECTING YOUR MAILBOXES. Features SECURITY OF INFORMATION TECHNOLOGIES

PROTECTING YOUR MAILBOXES. Features SECURITY OF INFORMATION TECHNOLOGIES PROTECTING YOUR MAILBOXES Features SECURITY OF INFORMATION TECHNOLOGIES In 2013, 50% of businesses would have experienced a virus infection by e-mail. Electronic mail remains one of the preferred vectors

More information

FortiMail Email Filtering Course 221-v2.2 Course Overview

FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering Course 221-v2.2 Course Overview FortiMail Email Filtering is a 2-day instructor-led course with comprehensive hands-on labs to provide you with the skills needed to design, configure,

More information

Panda Cloud Email Protection

Panda Cloud Email Protection Panda Cloud Email Protection 1. Introduction a) What is spam? Spam is the term used to describe unsolicited messages or messages sent from unknown senders. They are usually sent in large (even massive)

More information

EnterGroup offers multiple spam fighting technologies so that you can pick and choose one or more that are right for you.

EnterGroup offers multiple spam fighting technologies so that you can pick and choose one or more that are right for you. CONFIGURING THE ANTI-SPAM In this tutorial you will learn how to configure your anti-spam settings using the different options we provide like Challenge/Response, Whitelist and Blacklist. EnterGroup Anti-Spam

More information

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render

More information

Ipswitch IMail Server with Integrated Technology

Ipswitch IMail Server with Integrated Technology Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these

More information

Administration Guide Revision A. SaaS Email Protection

Administration Guide Revision A. SaaS Email Protection Administration Guide Revision A SaaS Email Protection COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

SonicWALL Anti-Spam Desktop User Guide

SonicWALL Anti-Spam Desktop User Guide SonicWALL Anti-Spam Desktop User Guide Version 6.2 SonicWALL, Inc. 2001 Logic Drive San Jose, CA 95124-3452 Phone: +1.408.745.9600 Fax: +1.408.745.9300 E-mail: info@sonicwall.com Part Number: 232-001812-00

More information

Manual Spamfilter Version: 1.1 Date: 20-02-2014

Manual Spamfilter Version: 1.1 Date: 20-02-2014 Manual Spamfilter Version: 1.1 Date: 20-02-2014 Table of contents Introduction... 2 Quick guide... 3 Quarantine reports...3 What to do if a message is blocked inadvertently...4 What to do if a spam has

More information