Anti-Spam Techniques - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Software // Enterprise Applications
News
8/28/2003
02:59 PM
50%
50%

Anti-Spam Techniques

Anti-Spam Techniques
TECHNIQUE PROS CONS
Keyword Filtering – Specific strings are searched for in an E-mail message. Simple to implement. Already available in many E-mail packages. Not very accurate. Frequent false positives (good E-mail messages flagged as spam)
Rule-Based Filtering – E-mail messages are filtered and scored by keyword and context using a set of rules. Can be very accurate. Requires ongoing rule updating. May miss well-crafted spam messages.
Bayesian Filtering – A type of statistical analysis derived from Bayesian logic. Learns to recognize spam. Returns percentage probabilities instead of scores. Can be very accurate. Depends somewhat on the quality of spam used to teach it. May need to be customized for each user.
Blacklists – Lists of IP addresses that have been identified to originate spam. Good at blocking known spam sources. Requires constant updating. Misses well-crafted spam messages and spam that isn't coming from known mail relays.
Fingerprinting – Identification of spam based on similarity to previously received spam messages. Can quickly recognize spam with a high rate of accuracy. Doesn't recognize new spam messages. Requires constant updating from a central source.
Challenge-Response – E-mail senders are challenged to prove their identity before E-mail messages are delivered. Very high degree of spam prevention. Creates more E-mail traffic. May block valid E-mail sent by machines. May require foreign-language support.
Secure Messaging – E-mail is sent with encrypted credentials or on an encrypted transport, so that the sender or sending machine can be authenticated. Very high degree of spam prevention. Reliable identification of E-mail source. Requires widespread acceptance and support for digital-identity standards. May require expensive infrastructure enhancements.

Return to main story, Tech Guide: Many Strategies Against Spam Can't Stem Frustration

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
11 Things IT Professionals Wish They Knew Earlier in Their Careers
Lisa Morgan, Freelance Writer,  4/6/2021
News
Time to Shift Your Job Search Out of Neutral
Jessica Davis, Senior Editor, Enterprise Apps,  3/31/2021
Commentary
Does Identity Hinder Hybrid-Cloud and Multi-Cloud Adoption?
Joao-Pierre S. Ruth, Senior Writer,  4/1/2021
White Papers
Register for InformationWeek Newsletters
Video
Current Issue
Successful Strategies for Digital Transformation
Download this report to learn about the latest technologies and best practices or ensuring a successful transition from outdated business transformation tactics.
Slideshows
Flash Poll