Spam Blocking Information |
|
Spam Filters Explained
What do they do? How do they work? Which one is right for me? By Alan Hearnshaw Spam is a very real problem that many people have to deal with on a daily basis. For those that have decided to do something about it and start to investigate the options available in spam filtering, this article provides a brief introduction to your options and the types of spam filters available. Despite the bewildering array of spam filters available today, all claiming to the best one "of its kind" there are really just five filtering methodologies in general use today and all products rely on one, or a combination of these: Content-Based Filters "In the beginning, there were content-based filters." These filters scan the contents of the and look for tell-tale signs that the message is spam. In the early days of spamming it was quite simple to look out for "Kill Words" such as "Lose Weight" and mark a message as spam if it was found. Very soon though, spammers got wise to this and started resorting to all kinds of tricks to get their message past the filters. The days of "obfuscation" had begun. We started getting messages containing the phrase "L0se Welght" (Notice the zero for "o" and "l" for "i") and even more bizarre ? and sometimes quite ingenious ? variations. This rendered basic content-based filters somewhat ineffective, although there are one or two on the market now that are clever enough to "see through" theses attempts and still provide good results. Bayesian Based Filters "The Reverend Bayes comes to the rescue" Born in London 1702, the son of a minister, Thomas Bayes developed a formula which allowed him to determine the probability of an event occurring based on the probabilities of two or more independent evidentiary events. Bayesian filters "learn" from studying known good and bad messages. Each message is split into single "word bytes", or tokens and these tokens are placed into a database along with how often they are found in each kind of message. When a new message arrives to be tested by the filter, the new message is also split into tokens and each token is looked up in the database. Extrapolating results from the database and applying a form of the good reverend's formula, know as the a "Naive Bayesian" formula, the message is given a "spamicity" rating and can be dealt with accordingly. Bayesian filters typically are capable of achieving very good accuracy rates (>97% is not uncommon), and require very little on-going maintenance. Whitelist/Blacklist Filters "Who goes there, friend or foe?" This very basic form of filtering is seldom used on its own nowadays, but can be useful as part of a larger filtering strategy. A "whitelist" is nothing more than a list of e-mail addresses from which you wish to accept communications. A whitelist filter would only accept messages from these people and all others would be rejected A "blacklist", conversely, is a list of e-mail addresses - and sometimes IP Addresses (computer identification addresses) - from which communications will not be accepted. While this may seem like a good idea from the outset, a whitelist methodology is too restrictive for most people and, as virtually all spam e-mails carry a forged "from" address, there is little point in collecting this address to ban it in future as it is very unlikely to be the same next time. There are bodies on the internet that maintain a list of known "bad" sources of e-mail. Many filters today have the ability to query these servers to see if the message they are looking at comes from a source identified by this Internet-based blacklist, or RBL. While being quite effective, they do tend to suffer from "false positives" where good messages are incorrectly identified as spam. This happens often with newsletters. Challenge/Response Filters "Open sesame!" Challenge/Response filters are characterised by their ability to automatically send a response to a previously unknown sender asking them to take some further action before their message will be delivered. This is often referred to as a "Turing Test" - named after a test devised by British mathematician Alan Turing to determine if machines could "think". Recent years have seen the appearance of some internet services which automatically perform this Challenge/Response function for the user and require the sender of an e-mail to visit their web site to facilitate the receipt of their message. Critics of this system claim it to be too drastic a measure and that it sends a message that "my time is more important than yours" to the people trying to communicate with you. For some low traffic e-mail users though, this system alone may be a perfectly acceptable method of completely eliminating spam from their inbox - one step above the "Whitelist" system outlined above. Community Filters "A united front" These types of filters work on the principal of "communal knowledge" of spam. When a user receives a spam message, they simply mark it as such in their filter. This information is sent to a central server where a "fingerprint" of the message is stored. After enough people have "voted" this message to be spam, then it is stopped from reaching all the other people in the community. This type of filtering can prove to be quite effective, although it stands to reason that it can never be 100% effective as a few people have to receive the spam for it to be "flagged" in the first place. Just like its similar cousin the Internet black list (RBL), this system also can suffer from "false positives", or messages incorrectly identified as spam. Hopefully you are now armed with a little more information to be able to make an informed decision on the best spam filter for you. For further information, consider reading the reviews and articles found at http://www.whichspamfilter.com Alan Hearnshaw is a computer programmer and the owner of http://www.whichspamfilter.com, a web site which conducts weekly in-depth reviews of current spam filters, provides help and guidance in the fight against spam and provides a useful community forum. [email protected]
|
RELATED ARTICLES
How To Analyze A Rip-Off Scheme This review is taken DIRECTLY from a piece of "junk mail." It is or the program that starts out with the heading: "Before You Decide To Throw This Away, Please Read The Enclosed At Least Once - Then Decide. This is Not a Chain Letter! I Threw The Program in The Trash." Stop Spam: How To Escape The Spam Hell-Hole If you're anything like me, you're pretty sick of it, and just want it to stop. What? Spam, of course. This article gives you a solution to radically, and quickly, reduce the amount of spam messages you receive to a bare minimum. Eight Quick Tips For Stopping SPAM If you are buried in SPAM then you're not alone. It's been suggested that as much as 50% to 75% of the e-mail traffic on any given day is SPAM. Reading through SPAM is a waste of your time and it subjects you to potential viruses, trojan horses, and sexual material which can be quite offensive. Here are some tips on how to win the SPAM war: Is Email Dying? 2004 was really a year when the whole subject of email and spam has been at the forefront of the minds of internet marketers. Spam eMails Are Not Just Annoying - They Are A Main Distributor Of Viruses Why is someone from India, Africa, or elsewhere writing you for information about your bank account with shady promises of depositing thousands of dollars within? (Many, many people have fallen for this real scam.) It's costing us ALL money - more on this in a bit. Blackhole or Fail - Which One Is Better For Your Mail Server? Very often SPAMMERS take advantage of catch-all email setup on webservers. Every email no matter what the recipients email address is will be caught by the default email account. It is highly recommended not to use catch-all email accounts and to discard SPAM send to non-existing email addresses. SPAM will clog up your SMTP server and consum resources like bandwidth and disk space in mailboxes. In most mail servers and web control panels (like cPanel) the user or admin can decide what will happen to emails with no existing recipient on the server. Refuse to the let emails onto the server and to let the sender's mail server deal with it (option: ":fail:") or to accept these incoming messages but then to delete them right away (option: ":blackhole:". Winning the War On Spam For years I didn't worry much about spam. Quickly Eliminate 100% of Your Junk Email Why do so many people think I need to take Viagra? I guess it's for the same reason others believe I want to re-finance my home, invest in a new stock and sell my business. All About Spam Spam is annoying. Period. Why people would want to send all of us stupid messages about buying prescription drugs or getting some outrageously good mortgage rate is beyond me. Well, not really. A Practical Approach to Eliminate Spam Spam is out of control! I guess that would be the understatement of the year. Like any other annoying fact of life, you let it drive you crazy or you deal with it. How Spammers Fool Rule-based and Signature-Based Spam Filters Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. The old ways of blocking the bad guys just don't work anymore. Spamicide: Man Spammed to Death While Checking His E-mail Death by spam is now possible with a new device by Microsoft. The device when implanted in the user's skull allows downloading of email directly into the brain. Is Your Website Blacklisted? A blacklist, as the name implies, is a list of people or companies who have met with the disapproval of others. In the online world a blacklist refers to those people who have been marked as responsible for generating spam in a very big way. Blacklists are also known as blocklists. How to Avoid Spam Complaints in Your Emails Spam filters are responsible for deleting a high percentage of legitimate business emails from people who have no wish to spam. Here are some tips to avoid spam complaints in your emails or ezine. Lockspam Free 3.0 Released! 6 August, 2004: Polesoft Inc., home of Professional anti spam software, announced today that Lockspam Free 3.0 (see also Lockspam Pro 3.0 in the end) is now available. Dont Look Spammy! We all hate spam and get way too much of it ? agreed? Now that we have that out of the way it is important to realize that in everyone's zest to minimize their spam, we are deleting legitimate e-mails ? and those e-mail could be YOUR business messages! Two factors are at play - not reviewing your trash before you empty it and sending e-mail with indicators that trip spam filters. Stuffing the Spammers! I'm really, truly fed up with spam. Every day when the spam arrives and Norton Security moves it into the Norton Anti-spam folder of my Outlook email client, I wonder how anyone can be so incredibly stupid as to waste their time sending me such garbage. The Fastest Delete Finger in the Midwest! There are hundreds of thousands of people who are trying to make an honest living on the Internet these days. The Internet is a great opportunity for starting your own business. There is not a lot of start-up cost, you can reach the whole world from a small corner of your own house, and the income can be exceptional. Phishing for an Identity Phishing is rapidly becoming on the largest threats to your personal, financial, and emotional wellbeing. No I am not talking about Saturday afternoons out on the boat with your grandfather, listening to stories that being with "When I was your age?"-now while these probably conjure up horrific childhood memories of such stores, they in no way come close to the horror felt by victims of Phishing. Of Spam and Sandboxes About a month ago I had the privilege of giving a demo of the next version of Sonic Page Blaster to the attendees at Yanik Silver's "Underground Online Marketing Seminar". I fielded a couple questions afterwards that bear a better treatment than I could manage on the spur of the moment and in less than 60 seconds. |
home | site map |
© 2005 |