informa
/
1 MIN READ
Feature

Anti-Spam Techniques

Anti-spam techniques table
Anti-Spam Techniques
TECHNIQUE PROS CONS
Keyword Filtering – Specific strings are searched for in an E-mail message. Simple to implement. Already available in many E-mail packages. Not very accurate. Frequent false positives (good E-mail messages flagged as spam)
Rule-Based Filtering – E-mail messages are filtered and scored by keyword and context using a set of rules. Can be very accurate. Requires ongoing rule updating. May miss well-crafted spam messages.
Bayesian Filtering – A type of statistical analysis derived from Bayesian logic. Learns to recognize spam. Returns percentage probabilities instead of scores. Can be very accurate. Depends somewhat on the quality of spam used to teach it. May need to be customized for each user.
Blacklists – Lists of IP addresses that have been identified to originate spam. Good at blocking known spam sources. Requires constant updating. Misses well-crafted spam messages and spam that isn't coming from known mail relays.
Fingerprinting – Identification of spam based on similarity to previously received spam messages. Can quickly recognize spam with a high rate of accuracy. Doesn't recognize new spam messages. Requires constant updating from a central source.
Challenge-Response – E-mail senders are challenged to prove their identity before E-mail messages are delivered. Very high degree of spam prevention. Creates more E-mail traffic. May block valid E-mail sent by machines. May require foreign-language support.
Secure Messaging – E-mail is sent with encrypted credentials or on an encrypted transport, so that the sender or sending machine can be authenticated. Very high degree of spam prevention. Reliable identification of E-mail source. Requires widespread acceptance and support for digital-identity standards. May require expensive infrastructure enhancements.

Return to main story, Tech Guide: Many Strategies Against Spam Can't Stem Frustration

Editor's Choice
Brandon Taylor, Digital Editorial Program Manager
Jessica Davis, Senior Editor
Terry White, Associate Chief Analyst, Omdia
Richard Pallardy, Freelance Writer
Cynthia Harvey, Freelance Journalist, InformationWeek
Pam Baker, Contributing Writer