SlideShare a Scribd company logo
JSS ACADEMY OF TECHNICAL EDUCATION, BANGALORE
                 (Affiliated to Visveshwaraya Technological University, Belgaum)




          INFORMATION SCIENCE Department



Ashish Sharma
1JS08IS006
Technical Seminar on
      MAILBOOK
 A Social Network Against Spamming
Aim

                   Spam Mail
                               To provide a collaborative spam
  Legitimate
     Mail

                               filter over a social network by
               Spam Mail


                               exchanging vote databases
                               among its users.
 Legitimate Mail
Content
          1.   Introduction
          2.   Related work
          3.   Design and architecture
          4.   Conclusion
          5.   References
          6.   Questions and Answers
Introduction

               Email

               Spam

               Spam Filters
Mailbook
           • Users exchange databases with fingerprints
             of emails identified as spam.
           • Vote Databases.
           • Fingerprints are the hash values of the
             email’s content.
           • Central Repository.
           • Email Service.
Related Work
               •   White lists.
               •   Black lists.
               •   Grey lists.
               •   Domain key identified mail.
               •   Content based filtering.
               •   Bayesian filtering.
               •   Collaborative filtering.
Design and Architecture


                   • Based on social collaboration
                     among trusted users(friends).

                   • Exchange of vote databases.
Generic Architecture of Mailbook
Vote Database Exchange Among Friends
Logic
        Implementation of the logic for database
        exchange is based on:

        • Trusted friends.
        • Profile characteristic.
        • Group membership.
Mailbook Functions
Import And Export Functions




        Import
                 Export
MD-5 Message Digest Algorithm

               The MD5 Message-Digest Algorithm
               is a widely used cryptographic hash
               function that produces a 128-bit (16-
               byte) hash value.
Current Work

          Linux      Apache
                  LAMP
         MySQL           PHP
Linux

        •   Operating system
        •   Free and open source
        •   Customizable
        •   Necessary security features
        •   Programming language
            support
Apache HTTP Server

                     • Web Server Software.
                     • Free.
                     • Most Popular.
MySQL

        •   Handling Database.
        •   Reliable and easy to use.
        •   Open source and free.
        •   More than 20 platforms.
PHP

      •   Scripting language.
      •   Server side technology.
      •   Fast and stable.
      •   Secure and reliable.
Conclusion
             • Addressing the problem of spamming.
             • A social network to disperse
               fingerprints.
             • User Friendly.
             • Easy email characterization.
             • Efficient design.
             • Flexible.
             • Global Solution.
References
[1] Wikipedia.2011.Whitelist.[Online] . Available: http://en.wikipedia.org/wiki/Whitelist#Email_whitelists
[2] Jaeyeon Jung and Emil Sit, “An Empirical Study of Spam Traffic and the Use of DNS Black Lists,” in Proc. 4th ACM SIGCOMM
Conference on Internet measurement, Oct. 25-27, 2004, pp.370-375.
[3] Wikipedia. 2011. DNSB. [Online] . Available: http://en.wikipedia.org/wiki/DNSBL
[4] Wikipedia. 2011. Content filtering. [Online]. Available: http://en.wikipedia.org/wiki/Content_filtering
[5] E. P. Sanz, J. M. G. Hidalgo and J. C. C. Pérez, “Email Spam Filtering,” in Advances in computers, vol 74, 2008, ch. 3, pp. 45-
114.
[6] M. R. Islam and W. Zhou, “An innovative analyzer for email classification based on grey list analysis,” in Proc. of the IFIP
International Conference on Network and Parallel Computing, Sep.18-21, 2007, pp. 176–182.
[7] Wikipedia. 2011 . Botnet, [Online]. Available: http://en.wikipedia.org/wiki/Botnet
[8] B. Leiba and J. Fento, “DomainKeys Identified mails (DKIM): Using Digital signatures for Domain Verifcation”, in CEAS 2007,
4th Conference on E-mail and Anti-Spam, Aug. 2-3, 2007.
[9] H. Esquivel, Aditya Akella and T. Mori, “On the Effectiveness of IP Reputation for Spam Filtering,” in Proc. 2nd Int. Conference
Commun. Syst. and Networks (COMSNETS), Jan. 5-9, 2010, pp. 1-10.
[10] Wikipedia. 2011 . CAPTCHA. [Online] . Available: http://en.wikipedia.org/wiki/CAPTCHA
[11] Carnegie Mellon University. 2000-2010. The Official CAPTCHA Site. [Online]. Available:
http://www.atm.comhttp://www.captcha.net
[12] A. Obied, 2007. Bayesian Spam Filtering. [Online]. Available: http://ahmed.obied.net/research/papers/spam_paper.pdf
[13] M. Sahami, S. Dumais, D. Heckerman and E. Horvitz, “A Bayesian approach to filtering junk e-mail,” in Proc. AAAI Workshop
on Learning for Text Categorization, 1998, pp. 55-62.
[14] E. Damiani, S. De Capitani di Vimercati, S. Paraboschi and P. Samarati, “P2P-Based Collaborative Spam Detection and
Filtering,” in Proc. 4th Int. Conference on Peer-to-Peer Computing, Aug. 25-27, 2004, pp. 176-183.
[15] Wikipedia. 2011 . MD5. [Online] . Available: http://en.wikipedia.org/wiki/MD5
[16] Wikipedia. 2011 . LAMP. [Online] . Available: http://en.wikipedia.org/wiki/LAMP_(software_bundle)
[17] Wikipedia. 2011. Linux. [Online] . Available: http://en.wikipedia.org/wiki/Linux
[18] Wikipedia. 2011. Apache HTTP Server. [Online]. Available: http://en.wikipedia.org/wiki/Apache_HTTP_Server
[19] Oracle Corporation and/or its affiliates. 2011. MySQL. [Online]. Available: http://www.mysql.com/why-mysql
[20] Wikipedia. 2011 . MySQL. [Online] . Available: http://en.wikipedia.org/wiki/MySQL
[21] The PHP Group. 2001-2011. PHP: Hypertext Preprocessor. [Online]. Available: http://gr.php.net
[22] C. Stewart, 2006. The Advantages of PHP. [Online]. Available: http://www.designersplayground.com/articles/118/1/The-
Advantages-of- PHP/Page1.html
[23] cplucpluc.com. Information on the C++ language. [Online]. Available: http://www.cplusplus.com/info
[24] Oracle. Java. [Online]. Available: http://java.com/en
[25] Python Software Foundation. 1990-2011. Python Programming Language. [Online]. Available: http://www.python.org
[26] Wikipedia. 2011 . Javascript. [Online]. Available: http://en.wikipedia.org/wiki/Javascript
Thank You
Do you still have any question ?

More Related Content

Similar to Mail Book

2006 bio it web services
2006 bio it web services2006 bio it web services
2006 bio it web services
Chris Dwan
 
Lei_Resume-it.doc
Lei_Resume-it.docLei_Resume-it.doc
Lei_Resume-it.doc
butest
 
International collaborative efforts to share threat data in a vetted member c...
International collaborative efforts to share threat data in a vetted member c...International collaborative efforts to share threat data in a vetted member c...
International collaborative efforts to share threat data in a vetted member c...
CODE BLUE
 
Building genomic data cyberinfrastructure with the online database software T...
Building genomic data cyberinfrastructure with the online database software T...Building genomic data cyberinfrastructure with the online database software T...
Building genomic data cyberinfrastructure with the online database software T...
mestato
 
Ict uses in libraries
Ict uses in librariesIct uses in libraries
Ict uses in libraries
Liaquat Rahoo
 
New information service
New information serviceNew information service
New information service
Saeid Nezareh
 
Impact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and EducationImpact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and Education
MANENDRASINGH30
 
New ICT Trends and Issues of Librarianship
New ICT Trends and Issues of LibrarianshipNew ICT Trends and Issues of Librarianship
New ICT Trends and Issues of Librarianship
Liaquat Rahoo
 
Digital libraries
Digital librariesDigital libraries
Digital libraries
Apurva Kulkarni
 
Software Analytics: Data Analytics for Software Engineering
Software Analytics: Data Analytics for Software EngineeringSoftware Analytics: Data Analytics for Software Engineering
Software Analytics: Data Analytics for Software Engineering
Tao Xie
 
Application of Library Management Software: NewGenLib
Application of Library Management Software: NewGenLibApplication of Library Management Software: NewGenLib
Application of Library Management Software: NewGenLib
David Nzoputa Ofili
 
Model of semantic textual document clustering
Model of semantic textual document clusteringModel of semantic textual document clustering
Model of semantic textual document clustering
SK Ahammad Fahad
 
Presention on Facebook in f Distributed systems
Presention on Facebook in f Distributed systemsPresention on Facebook in f Distributed systems
Presention on Facebook in f Distributed systems
Ahmad Yar
 
MS Word version
MS Word versionMS Word version
MS Word version
butest
 
MS Word version
MS Word versionMS Word version
MS Word version
butest
 
IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...
IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...
IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...
IAEME Publication
 
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
Emmanuel E C
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
Vanessa Camilleri
 
Introduction to apache spark and machine learning
Introduction to apache spark and machine learningIntroduction to apache spark and machine learning
Introduction to apache spark and machine learning
Awoyemi Ezekiel
 
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
Yahoo Developer Network
 

Similar to Mail Book (20)

2006 bio it web services
2006 bio it web services2006 bio it web services
2006 bio it web services
 
Lei_Resume-it.doc
Lei_Resume-it.docLei_Resume-it.doc
Lei_Resume-it.doc
 
International collaborative efforts to share threat data in a vetted member c...
International collaborative efforts to share threat data in a vetted member c...International collaborative efforts to share threat data in a vetted member c...
International collaborative efforts to share threat data in a vetted member c...
 
Building genomic data cyberinfrastructure with the online database software T...
Building genomic data cyberinfrastructure with the online database software T...Building genomic data cyberinfrastructure with the online database software T...
Building genomic data cyberinfrastructure with the online database software T...
 
Ict uses in libraries
Ict uses in librariesIct uses in libraries
Ict uses in libraries
 
New information service
New information serviceNew information service
New information service
 
Impact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and EducationImpact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and Education
 
New ICT Trends and Issues of Librarianship
New ICT Trends and Issues of LibrarianshipNew ICT Trends and Issues of Librarianship
New ICT Trends and Issues of Librarianship
 
Digital libraries
Digital librariesDigital libraries
Digital libraries
 
Software Analytics: Data Analytics for Software Engineering
Software Analytics: Data Analytics for Software EngineeringSoftware Analytics: Data Analytics for Software Engineering
Software Analytics: Data Analytics for Software Engineering
 
Application of Library Management Software: NewGenLib
Application of Library Management Software: NewGenLibApplication of Library Management Software: NewGenLib
Application of Library Management Software: NewGenLib
 
Model of semantic textual document clustering
Model of semantic textual document clusteringModel of semantic textual document clustering
Model of semantic textual document clustering
 
Presention on Facebook in f Distributed systems
Presention on Facebook in f Distributed systemsPresention on Facebook in f Distributed systems
Presention on Facebook in f Distributed systems
 
MS Word version
MS Word versionMS Word version
MS Word version
 
MS Word version
MS Word versionMS Word version
MS Word version
 
IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...
IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...
IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...
 
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Introduction to apache spark and machine learning
Introduction to apache spark and machine learningIntroduction to apache spark and machine learning
Introduction to apache spark and machine learning
 
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
 

Recently uploaded

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 

Recently uploaded (20)

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 

Mail Book

  • 1. JSS ACADEMY OF TECHNICAL EDUCATION, BANGALORE (Affiliated to Visveshwaraya Technological University, Belgaum) INFORMATION SCIENCE Department Ashish Sharma 1JS08IS006
  • 2. Technical Seminar on MAILBOOK A Social Network Against Spamming
  • 3. Aim Spam Mail To provide a collaborative spam Legitimate Mail filter over a social network by Spam Mail exchanging vote databases among its users. Legitimate Mail
  • 4. Content 1. Introduction 2. Related work 3. Design and architecture 4. Conclusion 5. References 6. Questions and Answers
  • 5. Introduction Email Spam Spam Filters
  • 6. Mailbook • Users exchange databases with fingerprints of emails identified as spam. • Vote Databases. • Fingerprints are the hash values of the email’s content. • Central Repository. • Email Service.
  • 7. Related Work • White lists. • Black lists. • Grey lists. • Domain key identified mail. • Content based filtering. • Bayesian filtering. • Collaborative filtering.
  • 8. Design and Architecture • Based on social collaboration among trusted users(friends). • Exchange of vote databases.
  • 10. Vote Database Exchange Among Friends
  • 11. Logic Implementation of the logic for database exchange is based on: • Trusted friends. • Profile characteristic. • Group membership.
  • 13. Import And Export Functions Import Export
  • 14. MD-5 Message Digest Algorithm The MD5 Message-Digest Algorithm is a widely used cryptographic hash function that produces a 128-bit (16- byte) hash value.
  • 15. Current Work Linux Apache LAMP MySQL PHP
  • 16. Linux • Operating system • Free and open source • Customizable • Necessary security features • Programming language support
  • 17. Apache HTTP Server • Web Server Software. • Free. • Most Popular.
  • 18. MySQL • Handling Database. • Reliable and easy to use. • Open source and free. • More than 20 platforms.
  • 19. PHP • Scripting language. • Server side technology. • Fast and stable. • Secure and reliable.
  • 20. Conclusion • Addressing the problem of spamming. • A social network to disperse fingerprints. • User Friendly. • Easy email characterization. • Efficient design. • Flexible. • Global Solution.
  • 21. References [1] Wikipedia.2011.Whitelist.[Online] . Available: http://en.wikipedia.org/wiki/Whitelist#Email_whitelists [2] Jaeyeon Jung and Emil Sit, “An Empirical Study of Spam Traffic and the Use of DNS Black Lists,” in Proc. 4th ACM SIGCOMM Conference on Internet measurement, Oct. 25-27, 2004, pp.370-375. [3] Wikipedia. 2011. DNSB. [Online] . Available: http://en.wikipedia.org/wiki/DNSBL [4] Wikipedia. 2011. Content filtering. [Online]. Available: http://en.wikipedia.org/wiki/Content_filtering [5] E. P. Sanz, J. M. G. Hidalgo and J. C. C. Pérez, “Email Spam Filtering,” in Advances in computers, vol 74, 2008, ch. 3, pp. 45- 114. [6] M. R. Islam and W. Zhou, “An innovative analyzer for email classification based on grey list analysis,” in Proc. of the IFIP International Conference on Network and Parallel Computing, Sep.18-21, 2007, pp. 176–182. [7] Wikipedia. 2011 . Botnet, [Online]. Available: http://en.wikipedia.org/wiki/Botnet [8] B. Leiba and J. Fento, “DomainKeys Identified mails (DKIM): Using Digital signatures for Domain Verifcation”, in CEAS 2007, 4th Conference on E-mail and Anti-Spam, Aug. 2-3, 2007. [9] H. Esquivel, Aditya Akella and T. Mori, “On the Effectiveness of IP Reputation for Spam Filtering,” in Proc. 2nd Int. Conference Commun. Syst. and Networks (COMSNETS), Jan. 5-9, 2010, pp. 1-10. [10] Wikipedia. 2011 . CAPTCHA. [Online] . Available: http://en.wikipedia.org/wiki/CAPTCHA [11] Carnegie Mellon University. 2000-2010. The Official CAPTCHA Site. [Online]. Available: http://www.atm.comhttp://www.captcha.net [12] A. Obied, 2007. Bayesian Spam Filtering. [Online]. Available: http://ahmed.obied.net/research/papers/spam_paper.pdf [13] M. Sahami, S. Dumais, D. Heckerman and E. Horvitz, “A Bayesian approach to filtering junk e-mail,” in Proc. AAAI Workshop on Learning for Text Categorization, 1998, pp. 55-62.
  • 22. [14] E. Damiani, S. De Capitani di Vimercati, S. Paraboschi and P. Samarati, “P2P-Based Collaborative Spam Detection and Filtering,” in Proc. 4th Int. Conference on Peer-to-Peer Computing, Aug. 25-27, 2004, pp. 176-183. [15] Wikipedia. 2011 . MD5. [Online] . Available: http://en.wikipedia.org/wiki/MD5 [16] Wikipedia. 2011 . LAMP. [Online] . Available: http://en.wikipedia.org/wiki/LAMP_(software_bundle) [17] Wikipedia. 2011. Linux. [Online] . Available: http://en.wikipedia.org/wiki/Linux [18] Wikipedia. 2011. Apache HTTP Server. [Online]. Available: http://en.wikipedia.org/wiki/Apache_HTTP_Server [19] Oracle Corporation and/or its affiliates. 2011. MySQL. [Online]. Available: http://www.mysql.com/why-mysql [20] Wikipedia. 2011 . MySQL. [Online] . Available: http://en.wikipedia.org/wiki/MySQL [21] The PHP Group. 2001-2011. PHP: Hypertext Preprocessor. [Online]. Available: http://gr.php.net [22] C. Stewart, 2006. The Advantages of PHP. [Online]. Available: http://www.designersplayground.com/articles/118/1/The- Advantages-of- PHP/Page1.html [23] cplucpluc.com. Information on the C++ language. [Online]. Available: http://www.cplusplus.com/info [24] Oracle. Java. [Online]. Available: http://java.com/en [25] Python Software Foundation. 1990-2011. Python Programming Language. [Online]. Available: http://www.python.org [26] Wikipedia. 2011 . Javascript. [Online]. Available: http://en.wikipedia.org/wiki/Javascript
  • 24. Do you still have any question ?