www.1001TopWords.com |
How Spammers Fool Rule-based and Signature-Based Spam Filters
Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. The old ways of blocking the bad guys just don't work anymore. Examining spam and spam-blocking technology can illuminate how this evolution is taking place and what can be done to combat spam and reclaim e-mail as the efficient, effective communication tool it was intended to be. Heuristics (Rule-based Filtering) One method used to combat spam is Rule-based, or Heuristic Filtering. Rule-based filters scan email content for predetermined words or phrases that may indicate a message is spam. For example, if an email administrator includes the word "sex" on a company's rule-based list, any email containing this word will be filtered. The major drawback of this approach is the difficulty in identifying keywords that are consistently indicative of spam. While spammers may frequently use the words "sex" and 'Viagra" in spam emails, these words are also used in legitimate business correspondence, particularly in the healthcare industry. Additionally, spammers have learned to obfuscate suspect words by using spellings such as "S*E*X", or "VI a a GRR A". It is impossible to develop dictionaries that identify every possible misspelling of "spammy" keywords. Additionally, because filtering for certain keywords produces large numbers of false positives, many organizations have found they cannot afford to rely solely on rule-based filters to identify spam. Signature-Based Spam Filters Another method used to combat spam is Signature-based Filtering. Signature-based filters examine the contents of known spam, usually derived from honey pots, or dummy email addresses set up specifically to collect spam. Once a honey pot receives a spam message, the content is examined and given a unique identifier. The unique identifier is obtained by assigning a value to each character in the email. Once all characters have been assigned a value, the values are totaled, creating the spam's signature. The signature is added to a signature database and sent as a regular update to the email service's subscribers. The signature is compared to every email coming in to the network and all matching messages are discarded as spam. The benefit of signature-based filters is that they rarely produce false-positives, or legitimate email incorrectly identified as spam. The drawback of signature-based filters is that they are very easy to defeat. Because they are backward-looking, they only deal with spam that has already been sent. By the time the honey pot receives a spam message, the system assigns a signature, and the update is sent and installed on the subscribers' network, the spammer has already sent millions of emails. A slight modification of the email message will render the existing signature useless. Furthermore, spammers can easily evade signature-based filters by using special email software that adds random strings of content to the subject line and body of the email. Because the variable content alters the signature of each email sent by the spammer, signature-based spam filters are unable to match the email to known pieces of spam. Developers of signature-based spam filters have learned to identify the tell-tale signs of automated random character generation. But as is often the case, spammers remain a step ahead and have developed more sophisticated methods for inserting random content. As a result, most spam continues to fool signature-based filters. The Solution When used individually, each anti-spam technique has been systematically overcome by spammers. Grandiose plans to rid the world of spam, such as charging a penny for each e-mail received or forcing servers to solve mathematical problems before delivering e-mail, have been proposed with few results. These schemes are not realistic and would require a large percentage of the population to adopt the same anti-spam method in order to be effective. You can learn more about the fight against spam by visiting our website at www.ciphertrust.com and downloading our whitepapers. Dr. Paul Judge is a noted scholar and entrepreneur. He is Chief Technology Officer at CipherTrust, the industry's largest provider of enterprise email security. The company's flagship product, IronMail provides a best of breed enterprise anti spam solution designed to stop spam, phishing attacks and other email-based threats. Learn more by visiting http://www.ciphertrust.com/products/spam_and_fraud_protection today.
|
RELATED ARTICLES
Getting Back To Basics. While we all agree that there`s way too much spamming/junk-mailing going on in our email boxes, there are a couple of things we can do to reduce the amount of mails we actually have to sift through, without having to resort to paying for expensive software that can be a real pain to set up properly. Firstly, and this is a great, little known tip. You can get yourself a free email account, (the bigger the better) which is a great thing to have if you use a lot of FFA`s, Classified sites, Search Engine Submittals etc. When you create the junkmail account, be sure to save the information you`ve used to create it with into a Wordpad/Notepad file. When the account is full, flit through it quickly, just to make sure there`s nothing of real importance there. If there is, copy and paste it to your favourite text document. Then just go ahead and delete the whole junkmail account. You`ve saved the info you used to create it with in the first place, so it`ll only take a couple of minutes to re-create it. Next, whenever you join a program or a site, have your email client open at the same time, so you get the welcome mails immediately. Confirm the welcome immediately, then put the mail into a special folder, created for all emails from that particular address. That way, different emails go to different folders, without getting too mixed up. If and when you decide to leave that program, delete all the mail you`ve saved from them, but please make sure that you DO actually opt-out before doing this. Another thing to remember is if you`re getting mails from someplace and you`re pretty darned sure you have absolutely no reason to be getting them, DON`T click on the remove me link! What you`re really doing, is letting the spammers know that they`ve mailed to a real, used address, and they`ll mail more and more, and never stop. Some of the more unscrupulous ones will even sell your address to be used as part of a mailing list, which in turn with result in even MORE spam. A lot of people seem to have forgotten where the delete button is, and scream the dreaded word "SPAM!!" as soon as an unfamiliar looking email drops into their inbox. This can be very damaging to legitimate business owners, so please, don`t ever say spam, unless it well and truly is. If you really don`t have time or inclination to follow these tips, there IS software out there that can filter your mails automatically for you. The biggest drawback with these is that they can actually stop you receiving mail that you WANT to get if you don`t set it up properly. Setting up the software filters can also be very confusing and time consuming, so if that`s the way you choose to go, make sure you set aside some time for it, and don`t get distracted by anything else until it`s done. May you be prosperous in everything you do. A War on SPAM: Attacking The Evil As most small, medium and large businesses in this country have seen the SPAM Emails have hurt our productivity and caused excessive costs. The Trouble With Spam Is.... Each day we all face the same challenge. Spam. It doesn't matter if you're a home computer user or the head of IT for a multinational limiting or totally preventing the distribution of junk email to your computer(s) is now a daily chore. How to Write a Privacy Policy A Privacy Policy can be defined as the policy under which a company or organization operating a web site handles the personal information collected about visitors to the site. For most of us consumers, privacy involves protecting our integrity and our right to disclose or not our personal information to third parties, without letting anybody bother us with unsolicited communications if we do not want to be contacted. Dont Give the Spammers Your Address From Your Page Spammers get email addresses from web pages using programs called spiders which tour the internet capturing letter strings with the "@" character in it. Winning the War On Spam For years I didn't worry much about spam. Do Not Spam The temptation among internet marketers to SPAM is greater than ever. By now, most people know that SPAM isn't the popular food from Hormel but a pseudonym for "unsolicited commercial email," also known as UCE. Take Back Control of Your Inbox: Eliminate Annoying and Potentially Harmful E-mails Are you tired of spam stealing your time, your money, your bandwidth and your hard disc space? The Definition of Spam Spam can bring down your website faster than a speeding bullet, but what is spam? Originally, spam referred to unwanted emails. We all hate the tons of email we receive day after day trying to get us to buy that or click this. I can't go a day without someone trying to steal my personal information so they can get into my bank account. Does everyone else get the fake paypal emails? They look just like paypal emails, but usually if you look at the links they have ip numbers instead of paypal.com in the address. Obviously, letters from Nigeria, fake paypal emails, and the host of other either crooked or just plain annoying emails can clearly be defined as spam. Of course, email newsletters that have been subscribed to are wanted and would not be spam. I love getting my daily webmaster newsletters. They are great for helping me stay on top of what is going on in the website development world. How Spammers Fool Bayesian Filters - And How to Stop Them Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. The old ways of blocking the bad guys just don't work anymore. Eight Quick Tips For Stopping SPAM If you are buried in SPAM then you're not alone. It's been suggested that asmuch as 50% to 75% of the e-mail traffic on any given day is SPAM. Readingthrough SPAM is a waste of your time and it subjects you to potential viruses,trojan horses, and sexual material which can be quite offensive. Here are sometips on how to win the SPAM war: The Fastest Delete Finger in the Midwest! There are hundreds of thousands of people who are trying to make an honest living on the Internet these days. The Internet is a great opportunity for starting your own business. There is not a lot of start-up cost, you can reach the whole world from a small corner of your own house, and the income can be exceptional. Your Dolphin E-mail Caught In Spam Tuna Net? Let me ask a couple of questions: Why Your ISP Takes Bribes From Spammers The lifeblood of the spammer is email. They need to be able to send lots of it on an ongoing basis to stay in "business". High profile spammers can send 80 million pieces of junk email every single day. Yes one single person. How To Identify Spam Most of us have opened our email program and found, alongside correspondence from people that we know, offers for products from commercial web sites. Some of these emails we expect. We have asked to be notified of sales and other opportunities or joined a mailing list offered by the company. Avoiding the Spam Trap: Get Your Message Delivered! Your message is not being delivered. How Spammers Fool Spam Blacklists - And How to Stop Them Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. The old ways of blocking the bad guys just don't work anymore. SPAM: A Nutrious Food or a Waste of Time? Unless the filters on your computer are really good, you're getting at least an occasional SPAM message in your email Inbox. For most of us, we spend more time sorting through and deleting the SPAM than we care to. In fact, my husband told me tonight that of 30 messages he receives each day on our home computer 29 of them are SPAM. The War on Spam: Google Fights Back Google is engaged in a war. It is a war on spam. With new strategies and filters ready to put into place, the search engine is adding new firepower to its arsenal almost daily. Webmasters and SEO Consultants alike are terrified; fearing what the future holds for them. But for those of us that believe in the cause, the future isn't scary. In fact, the future looks very bright. 5 Zero-Cost Spam Prevention Tools For All Situations! Anyone who uses email knows what Spam is! |
© Athifea Distribution LLC - 2013 |