Spam has become so insidious that every company has to consider the cost and means of reducing its impact. Sometimes it’s as simple as implementing a basic spam filter and applying best practices– i.e., following a few rules for recognizing and eliminating spam. On the other end of the spectrum are the most aggressive tactics, which involve turning the tables on spammers. This article provides ten tips to help eliminate spam email from your inbox.
1. Use Spam Filters.
When email was originally designed in SMTP (Simple Mail Transfer Protocol) there was no reason to authenticate email message senders because email was originally only for trusted users such university researchers. So to make the process simpler, emails were designed to be able to “hop” from one machine to another, on to its destination. On the public Internet, this is a serious flaw [1], allowing spammers to spoof the origin of a message.
Initially, spam filters were created that used a dictionary method to filter spam if certain words were present (e.g. “Viagra” or “Sex”). It was not until years later, that IronPort (recently acquired by Cisco) devised a more robust, effective spam filtering method using a two-layer defense model [1], now used in over 20 percent of email servers.
Outer Layer: Reputation Filter
The outer layer is a reputation filter that uses a variety of factors to decide how trusted a particular sender of an email is. The email filter gets the factors needed to check a particular sender from a single global database called SenderBase:
- SenderBase collects email traffic data comes from over 100,000 networks, allowing sending patterns of mail servers to be tracked and detected.
- It measures over 150 parameters including email send and receive quantities, IP sending age, country, etc., to establish a score for each IP address.
- Mail from trusted IPs is passed through to anti-virus scanners, while bad senders are blocked.
- Those emails that remain, namely questionable senders, are then sent to layer 2.
Inner Layer: Context Analysis
Layer 2, the inner layer, is known as Context Analysis, and acts like a search engine, scanning the contents of your email in order to answer some questions related to its legitimacy:
- Who sent the email message?
- Does it have suspicious attachments (based on any current virus outbreaks)?
- Does it have embedded hyperlinks to known bad domains?
- How was the email constructed?
Read more at: http://www.itsecurity.com/features/email-inbox-security-011107/
You have remarked very interesting points! ps decent web site.
I regard something genuinely interesting about your weblog so I saved to my bookmarks .
Hello, I just stopped by to visit your blog and thought I’d say thank you.
Greeting take a look at this trackback when you have a moment
Good Morning, I just stopped in to visit your blog and thought I’d say thanks for having me.
Healing’s Dragon…
to uncover difficulties to boost my site!I suppose its alright to produce use of a couple of of your ideas!!…
This is a topic which is near to my heart… Many thanks!
Exactly where are your contact details though?
details are not listed on website..feedback form to reach me.
I got this website from my buddy who told me about this site and now
this time I am browsing this web site and reading very informative content at this time.
Writе moге, thats all I have to say. Lіteгally,
it seems аѕ thοugh you relieԁ on the viԁеo
to mаke youг point. Yοu obviously knoω what youгe
talking about, why waste уοur іntellіgenсе οn
ϳust posting vіdeoѕ to yοur
wеblog ωhen you coulԁ bе giving us something
enlightenіng to read?
Very еnergetic ρost, I enjoyеd thаt а lot.
Will theгe be a pагt 2?
Eѵery weekеnd і used to pаy a quick visit this
web pagе, as i want enjoyment, since thiѕ thіs site cοnatіons in fact ρleаsant funny stuff too.
Thanks , I’ve just been searching for info about this subject for ages and yours is the best I’ve came upon so far.
But, what concerning the bottom line? Are you certain
about the source?