IT BEST PRACTICES

Subscribe to
IT Best Practices.

STAY CONNECTED


    Common Anti-Spam Filtering Techniques

    Email spam has been a problem for almost twenty years and continues to plague us today. This problem would be far worse if we didn’t have anti-spam software. Two common filtering techniques for blocking email spam will be discussed below:

    List Filters

    The simplest anti-spam technique makes use of lists to either allow email into or block email from an inbox. A list of domains and email addresses that are known to be used for spam is called a blacklist. Additional email addresses can typically be added to the list by flagging a given email as spam. Blacklists can be defeated through the use of multiple email addresses. Addresses can also be spoofed by the spammer to get past blacklists.

    The white-list is the opposite of a blacklist in that it contains non-spam email addresses. Emails with addresses on this list are always allowed through. Sometimes there is an option to only allow white-listed email. This is often impractical because it doesn’t allow for legitimate addresses that aren’t on the list. Spammers can defeat white-lists by spoofing email addresses harvested from address books.

    Another type of list contains words and phrases commonly used by spammers. The subject line and content of email are checked against this list and blocked if the spam words or phrases are found. This type of filter can be circumvented by altering phrases and the spelling of words. False positives can occur when an email is discussing a spam topic for legitimate reasons.

    Bayesian Filters

    The Bayesian filter uses a statistical technique that compares the content of an email message to characteristics commonly found in spam email. It then assigns a probability of the email being spam which depends on how closely the content matches the characteristics of a spam message. The threshold probability that determines whether a message is spam, can be changed depending on how aggressively one wants the filter to flag spam. The setting is a trade-off between reducing spam that gets through the filter and the number of false positives.

    When the user flags email as spam, its characteristics are added to the Bayesian filter’s database. In this way, the filter continually adapts to the changing nature of spam.

    For more information on how our services can help your business, please contact us.

    Common Anti-Spam Filtering Techniques

    Email spam has been a problem for almost twenty years and continues to plague us today. This problem would be far worse if we didn’t have anti-spam software. Two common filtering techniques for blocking email spam will be discussed below:

    List Filters

    The simplest anti-spam technique makes use of lists to either allow email into or block email from an inbox. A list of domains and email addresses that are known to be used for spam is called a blacklist. Additional email addresses can typically be added to the list by flagging a given email as spam. Blacklists can be defeated through the use of multiple email addresses. Addresses can also be spoofed by the spammer to get past blacklists.

    The white-list is the opposite of a blacklist in that it contains non-spam email addresses. Emails with addresses on this list are always allowed through. Sometimes there is an option to only allow white-listed email. This is often impractical because it doesn’t allow for legitimate addresses that aren’t on the list. Spammers can defeat white-lists by spoofing email addresses harvested from address books.

    Another type of list contains words and phrases commonly used by spammers. The subject line and content of email are checked against this list and blocked if the spam words or phrases are found. This type of filter can be circumvented by altering phrases and the spelling of words. False positives can occur when an email is discussing a spam topic for legitimate reasons.

    Bayesian Filters

    The Bayesian filter uses a statistical technique that compares the content of an email message to characteristics commonly found in spam email. It then assigns a probability of the email being spam which depends on how closely the content matches the characteristics of a spam message. The threshold probability that determines whether a message is spam, can be changed depending on how aggressively one wants the filter to flag spam. The setting is a trade-off between reducing spam that gets through the filter and the number of false positives.

    When the user flags email as spam, its characteristics are added to the Bayesian filter’s database. In this way, the filter continually adapts to the changing nature of spam.

    For more information on how our services can help your business, please contact us.

    Subscribe to
    IT Best Practices.

    STAY CONNECTED


      ALL ARTICLES

      Blog

      Shining Light on Our Clients’ Biggest Areas of Vulnerability

      READ MORE
      Cloud Services

      How Cloud Services Can Improve Your Bottom Line

      READ MORE
      Cloud Services

      Does Moving to Cloud Services Mean Losing Control of My Data?

      READ MORE
      Cloud Services

      How Inefficient Data Center Management May be Crippling Your Business

      READ MORE
      Uncategorized

      Ariat Western Wear, Indonesia, and the Cloud: a Global IP Networks Update

      READ MORE
      Blog

      Employees are Going Back to the Office: Should Your Business Keep Cloud Services?

      READ MORE
      Blog

      3 Ways the Cloud Can Boost the Efficiency of Your Supply Chain

      READ MORE
      Uncategorized

      “Tenacious Technology”: Global IP Networks’ Approach to Five-Star Service Delivery

      READ MORE
      Blog

      3 Unexpected Ways NaaS Creates Business Value

      READ MORE
      Blog

      Why IT Assessments For Healthcare Organizations Are Vital

      READ MORE

      You Have The Momentum. We Help Keep It Going.

      At Global IP Networks, our mission is to keep your net working. Our team of dedicated, certified IT experts is 100% committed to your success. For over 20 years, we’ve relentlessly helped companies like yours tackle their IT challenges to maximize the security, uptime and performance of their networks.

      That’s tenacity. That’s Global IP Networks.

      wLearn More