Spam Blocker Information |
How Spammers Fool Rule-based and Signature-Based Spam Filters
Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. The old ways of blocking the bad guys just don't work anymore. Examining spam and spam-blocking technology can illuminate how this evolution is taking place and what can be done to combat spam and reclaim e-mail as the efficient, effective communication tool it was intended to be. Heuristics (Rule-based Filtering) One method used to combat spam is Rule-based, or Heuristic Filtering. Rule-based filters scan email content for predetermined words or phrases that may indicate a message is spam. For example, if an email administrator includes the word "sex" on a company's rule-based list, any email containing this word will be filtered. The major drawback of this approach is the difficulty in identifying keywords that are consistently indicative of spam. While spammers may frequently use the words "sex" and 'Viagra" in spam emails, these words are also used in legitimate business correspondence, particularly in the healthcare industry. Additionally, spammers have learned to obfuscate suspect words by using spellings such as "S*E*X", or "VI a a GRR A". It is impossible to develop dictionaries that identify every possible misspelling of "spammy" keywords. Additionally, because filtering for certain keywords produces large numbers of false positives, many organizations have found they cannot afford to rely solely on rule-based filters to identify spam. Signature-Based Spam Filters Another method used to combat spam is Signature-based Filtering. Signature-based filters examine the contents of known spam, usually derived from honey pots, or dummy email addresses set up specifically to collect spam. Once a honey pot receives a spam message, the content is examined and given a unique identifier. The unique identifier is obtained by assigning a value to each character in the email. Once all characters have been assigned a value, the values are totaled, creating the spam's signature. The signature is added to a signature database and sent as a regular update to the email service's subscribers. The signature is compared to every email coming in to the network and all matching messages are discarded as spam. The benefit of signature-based filters is that they rarely produce false-positives, or legitimate email incorrectly identified as spam. The drawback of signature-based filters is that they are very easy to defeat. Because they are backward-looking, they only deal with spam that has already been sent. By the time the honey pot receives a spam message, the system assigns a signature, and the update is sent and installed on the subscribers' network, the spammer has already sent millions of emails. A slight modification of the email message will render the existing signature useless. Furthermore, spammers can easily evade signature-based filters by using special email software that adds random strings of content to the subject line and body of the email. Because the variable content alters the signature of each email sent by the spammer, signature-based spam filters are unable to match the email to known pieces of spam. Developers of signature-based spam filters have learned to identify the tell-tale signs of automated random character generation. But as is often the case, spammers remain a step ahead and have developed more sophisticated methods for inserting random content. As a result, most spam continues to fool signature-based filters. The Solution When used individually, each anti-spam technique has been systematically overcome by spammers. Grandiose plans to rid the world of spam, such as charging a penny for each e-mail received or forcing servers to solve mathematical problems before delivering e-mail, have been proposed with few results. These schemes are not realistic and would require a large percentage of the population to adopt the same anti-spam method in order to be effective. You can learn more about the fight against spam by visiting our website at www.ciphertrust.com and downloading our whitepapers. Dr. Paul Judge is a noted scholar and entrepreneur. He is Chief Technology Officer at CipherTrust, the industry's largest provider of enterprise email security. The company's flagship product, IronMail provides a best of breed enterprise anti spam solution designed to stop spam, phishing attacks and other email-based threats. Learn more by visiting http://www.ciphertrust.com/products/spam_and_fraud_protection today.
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
Getting Back To Basics. While we all agree that there`s way too much spamming/junk-mailing going on in our email boxes, there are a couple of things we can do to reduce the amount of mails we actually have to sift through, without having to resort to paying for expensive software that can be a real pain to set up properly. Firstly, and this is a great, little known tip. How To Stop Spam I imagine you have seen, heard about, or already know what spam is. But just in case you don't, it is unsolicited and unwanted emails that arrive in your email inbox from a person or company that you don't know. Learn Simple Strategies That Will Stop Spammers From Bombarding Your Inbox! Spam filter is the solution that most people resort when they try to steam the flood of junk mails and spam.However, there is a problem!First: Some spam will still get through. Do Not Spam The temptation among internet marketers to SPAM is greater than ever. By now, most people know that SPAM isn't the popular food from Hormel but a pseudonym for "unsolicited commercial email," also known as UCE. 5 Zero-Cost Spam Prevention Tools For All Situations! Anyone who uses email knows what Spam is!It's annoying and time consuming to wade through volumes offraud, con and obscene emails to filter out the really importantones. And I am sure you are affected by this menace in some form or other. FTC Botches Fight on SPAM, Microsoft Takes Over the Battle While the Federal Trade Commission is busy fighting over definitions of "What is SPAM;" Microsoft and Bill Gates are taking it to the enemy. Today Microsoft announced another case and legal action, which is being taken against a spammer who is in Germany. The Fastest Delete Finger in the Midwest! There are hundreds of thousands of people who are trying to make an honest living on the Internet these days. The Internet is a great opportunity for starting your own business. Email Chain Letters - Harmless Fun or Not? I'm sure I'm not the only person on the planet that remembers getting the occasional chain letter in school.. Stuffing the Spammers! I'm really, truly fed up with spam. Every day when the spam arrives and Norton Security moves it into the Norton Anti-spam folder of my Outlook email client, I wonder how anyone can be so incredibly stupid as to waste their time sending me such garbage. Stop Spam! New Spam Blockers News last week that Internet service provider Verizon settled its lawsuit against Detroit-based spam king Al Ralsky was of little comfort. Ralsky agreed to pay a fine and stop spamming Verizon customers, but he still has plenty of other targets. How to Write a Privacy Policy A Privacy Policy can be defined as the policy under which a company or organization operating a web site handles the personal information collected about visitors to the site. For most of us consumers, privacy involves protecting our integrity and our right to disclose or not our personal information to third parties, without letting anybody bother us with unsolicited communications if we do not want to be contacted. How To Identify Spam Most of us have opened our email program and found, alongside correspondence from people that we know, offers for products from commercial web sites. Some of these emails we expect. The Definition of Spam Spam can bring down your website faster than a speeding bullet, but what is spam? Originally, spam referred to unwanted emails. We all hate the tons of email we receive day after day trying to get us to buy that or click this. Is Your Website Blacklisted? A blacklist, as the name implies, is a list of people or companies who have met with the disapproval of others. In the online world a blacklist refers to those people who have been marked as responsible for generating spam in a very big way. The Vanishing Mail Am I Just Being Paranoid Or Are The Robots Out To Get Me?It all started in the early part of the twenty-first century.In the early days of email we were thrilled with its speed and reliability, far superior to "snail mail" but there's always somebody who has to go and spoil things for everyone else. Junk Mail Works! Junk mail works.Why does it work?How does it work?These are very important questions. What Exactly is Spam? Spam, as defined in the context of computers, the Internet and electronic messaging, is a term used to designate unsolicited bulk electronic messaging and communication. In particular, spam is unsolicited bulk mailings that are commercially oriented. The War on Spam: Google Fights Back Google is engaged in a war. It is a war on spam. How Can I Stop Getting Spam? Are you getting too much spam? We all are, but if you're a webmaster the word spam takes on a whole new meaning.It's not uncommon for the luckiest of email users to receive a dozen or so spam messages each day, while those of us who aren't so fortunate receive hundreds. Edating Readers One of our Australian clients sent out a campaign using a list which had been complied manually.The message contained information relevant for the specific job position that these recipients held. |
home | site map | contact us |