Anti-Spam Techniques - InformationWeek
IoT
IoT
Software // Enterprise Applications
News
8/28/2003
02:59 PM
50%
50%

Anti-Spam Techniques

Anti-Spam Techniques
TECHNIQUE PROS CONS
Keyword Filtering – Specific strings are searched for in an E-mail message. Simple to implement. Already available in many E-mail packages. Not very accurate. Frequent false positives (good E-mail messages flagged as spam)
Rule-Based Filtering – E-mail messages are filtered and scored by keyword and context using a set of rules. Can be very accurate. Requires ongoing rule updating. May miss well-crafted spam messages.
Bayesian Filtering – A type of statistical analysis derived from Bayesian logic. Learns to recognize spam. Returns percentage probabilities instead of scores. Can be very accurate. Depends somewhat on the quality of spam used to teach it. May need to be customized for each user.
Blacklists – Lists of IP addresses that have been identified to originate spam. Good at blocking known spam sources. Requires constant updating. Misses well-crafted spam messages and spam that isn't coming from known mail relays.
Fingerprinting – Identification of spam based on similarity to previously received spam messages. Can quickly recognize spam with a high rate of accuracy. Doesn't recognize new spam messages. Requires constant updating from a central source.
Challenge-Response – E-mail senders are challenged to prove their identity before E-mail messages are delivered. Very high degree of spam prevention. Creates more E-mail traffic. May block valid E-mail sent by machines. May require foreign-language support.
Secure Messaging – E-mail is sent with encrypted credentials or on an encrypted transport, so that the sender or sending machine can be authenticated. Very high degree of spam prevention. Reliable identification of E-mail source. Requires widespread acceptance and support for digital-identity standards. May require expensive infrastructure enhancements.

Return to main story, Tech Guide: Many Strategies Against Spam Can't Stem Frustration

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Tech Vendors to Watch in 2019
Susan Fogarty, Editor in Chief,  11/13/2018
Commentary
Getting DevOps Wrong: Top 5 Mistakes Organizations Make
Bill Kleyman, Writer/Blogger/Speaker,  11/2/2018
Commentary
AI & Machine Learning: An Enterprise Guide
James M. Connolly, Executive Managing Editor, InformationWeekEditor in Chief,  9/27/2018
Register for InformationWeek Newsletters
Video
Current Issue
The Next Generation of IT Support
The workforce is changing as businesses become global and technology erodes geographical and physical barriers.IT organizations are critical to enabling this transition and can utilize next-generation tools and strategies to provide world-class support regardless of location, platform or device
White Papers
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll