SlideShare a Scribd company logo
1 of 18
A POP3 Proxy Platform for
E-Mail Filtering
PREPARED BY –
DARSHAN BHATT
(150320705001)
M.E (EC) – SEM 2
Content
• Introduction
• Goals of E-mail client system
• Different Spam filtering methods
• Basics of E-Mail
• E-mail filtering platform
• Design goal of PEMF
• Work flow of PEMF
• Types of connections
• Conclusion
• References
Introduction
• An E-Mail that the recipient did not request or agree
to receive is known as “Spam”. [1]
• According to the survey, Internet Users of China
received 17.68 junk mails weekly on average and the
proportion of spam was 57.52%. [1]
• As spam volumes have increased, anti-spam
techniques have developed rapidly over the last few
years. [1]
Goals of E-Mail Client System
• Two main goals of E-Mail client system are [2] –
1. Filtering out junk E-Mails
2. Blocking E-Mails sent out by malicious code
• There are many spam filtering methods available used
to block E-Mails sent by malicious code. [2]
Spam Filtering Methods
• Spam filtering methods can generally be divided into-
1. Access control Method
2. Authentication Method
3. Content based filtering Method …………….[1]
• We will discuss content based filtering method
because it receives more and more attention because
of high accuracy rate and practicality.
Basics of E-Mail
• E-Mail is an electronic mail which is one of the most
popular Internet service allows a message including
text, audio & video. [4]
• In general, E-Mail system is composed of three sub-
systems : MUA, MTA and MDA [1][3]
• E-mail filtering program based on MUA has
advantage of easy achievement and maintenance. [1]
Basics of E-Mail
Fig 1 : MUA, MTA and MDA
E-Mail Filtering Platform
• A Platform based on MUA for filtering email named
PEMF : POP3 Proxy Platform for E-Mail Filtering.
• This platform is compatible with different content
based filtering methods. [1]
• It has an advantage of transparent connection
between e-mail server and e-mail client and has high
communication efficiency. [1]
Design goals of PEMF
• PEMF achieves three design goals :
1. It has Universality – Design universal system
2. It ensures the transparency requirements. – User need
not install any application
3. It has high efficiency and stability. – It improves
efficiency and stability of system using thread pool
mechanism.
Fig 2 : Work-flow of PEMF
Work flow of PEMF
• E-Mail client could be Foxmail, Outlook Express etc.
applications.
• PEMF consists of two components : MFS and MFM.
• MFS is a mail filtering service and MFM is mail
filtering model.
Types of connections
• There are two possibilities of connections between
E-Mail client and E-mail server :
1. Synchronous connection
2. Asynchronous connection
• In PEMF system, asynchronous simulation is used to
achive transparent connection between client and
server. [1]
Fig-3 : Synchronous Connection
Fig-4 : Asynchronous Connection
Thread pool technology
• In computer programming, thread pool pattern
consists of a number ‘m’ of threads created to
perform number ‘n’ of tasks used to improve
processing efficiency. [3]
Conclusion
• PEMF is a platform with high efficiency and stability
for filtering e-mails. It is compatible with all content
based filtering methods. It achieved transparent
connection between E-Mail server and E-Mail client.
It supported multi-account simultaneous connections.
It is not only used to be anti-spam system but also
used as test platform for different e-mail filtering
methods.
References
[1]. W.Zhang, Li Zhang, “A POP3 Proxy Platform for
E-Mail Filtering”, IEEE conference on
computational intelligence and software
engineering, 2009
[2]. S.J.Horng, M.Yang su, C-yi Wu, “An E-Mail
Client Implementation with Spam filtering and
security mechanisms”
[3]. www.Wikipedia.org
[4].“Data communication and networking” by
B.A.Forouzan
THANK YOUTHANK YOU

More Related Content

Viewers also liked

Transformation of Random variables & noise concepts
Transformation of Random variables & noise concepts Transformation of Random variables & noise concepts
Transformation of Random variables & noise concepts Darshan Bhatt
 
GRAMSAT - For rural development & tele-education
GRAMSAT - For rural development & tele-educationGRAMSAT - For rural development & tele-education
GRAMSAT - For rural development & tele-educationDarshan Bhatt
 
SALMAN KHAN - The Contributor personality
SALMAN KHAN -  The Contributor personality SALMAN KHAN -  The Contributor personality
SALMAN KHAN - The Contributor personality Darshan Bhatt
 
Applications of Information Theory
Applications of Information TheoryApplications of Information Theory
Applications of Information TheoryDarshan Bhatt
 
Protocolos- SMTP, POP3 e IMAP4
Protocolos- SMTP, POP3 e IMAP4Protocolos- SMTP, POP3 e IMAP4
Protocolos- SMTP, POP3 e IMAP4Felipe Weizenmann
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standardsMidhun Menon
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolRajan Pandey
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 
Guidelines for Modelling Groundwater Surface Water Interaction in eWater Source
Guidelines for Modelling Groundwater Surface Water Interaction in eWater SourceGuidelines for Modelling Groundwater Surface Water Interaction in eWater Source
Guidelines for Modelling Groundwater Surface Water Interaction in eWater SourceeWater
 
Appendex d
Appendex dAppendex d
Appendex dswavicky
 
Appendex c
Appendex cAppendex c
Appendex cswavicky
 
Appendex b
Appendex bAppendex b
Appendex bswavicky
 
300 Years of Groundwater Management, Charles Porter
300 Years of Groundwater Management, Charles Porter300 Years of Groundwater Management, Charles Porter
300 Years of Groundwater Management, Charles PorterTXGroundwaterSummit
 
LiDAR Aided Decision Making
LiDAR Aided Decision MakingLiDAR Aided Decision Making
LiDAR Aided Decision MakingLidar Blog
 
Aquifer Storage and Recovery, Kelley Neumann
Aquifer Storage and Recovery, Kelley NeumannAquifer Storage and Recovery, Kelley Neumann
Aquifer Storage and Recovery, Kelley NeumannTXGroundwaterSummit
 
Setting up a gmail account
Setting up a gmail accountSetting up a gmail account
Setting up a gmail accountkeelyswitzer
 

Viewers also liked (20)

Research skills
Research skillsResearch skills
Research skills
 
Cpd presentation
Cpd presentationCpd presentation
Cpd presentation
 
Transformation of Random variables & noise concepts
Transformation of Random variables & noise concepts Transformation of Random variables & noise concepts
Transformation of Random variables & noise concepts
 
GRAMSAT - For rural development & tele-education
GRAMSAT - For rural development & tele-educationGRAMSAT - For rural development & tele-education
GRAMSAT - For rural development & tele-education
 
MY CPD PRESENTATION
MY CPD PRESENTATIONMY CPD PRESENTATION
MY CPD PRESENTATION
 
SALMAN KHAN - The Contributor personality
SALMAN KHAN -  The Contributor personality SALMAN KHAN -  The Contributor personality
SALMAN KHAN - The Contributor personality
 
Applications of Information Theory
Applications of Information TheoryApplications of Information Theory
Applications of Information Theory
 
Protocolos- SMTP, POP3 e IMAP4
Protocolos- SMTP, POP3 e IMAP4Protocolos- SMTP, POP3 e IMAP4
Protocolos- SMTP, POP3 e IMAP4
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standards
 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Guidelines for Modelling Groundwater Surface Water Interaction in eWater Source
Guidelines for Modelling Groundwater Surface Water Interaction in eWater SourceGuidelines for Modelling Groundwater Surface Water Interaction in eWater Source
Guidelines for Modelling Groundwater Surface Water Interaction in eWater Source
 
Appendex d
Appendex dAppendex d
Appendex d
 
Appendex c
Appendex cAppendex c
Appendex c
 
Appendex b
Appendex bAppendex b
Appendex b
 
300 Years of Groundwater Management, Charles Porter
300 Years of Groundwater Management, Charles Porter300 Years of Groundwater Management, Charles Porter
300 Years of Groundwater Management, Charles Porter
 
LiDAR Aided Decision Making
LiDAR Aided Decision MakingLiDAR Aided Decision Making
LiDAR Aided Decision Making
 
Aquifer Storage and Recovery, Kelley Neumann
Aquifer Storage and Recovery, Kelley NeumannAquifer Storage and Recovery, Kelley Neumann
Aquifer Storage and Recovery, Kelley Neumann
 
Unix Master
Unix MasterUnix Master
Unix Master
 
Setting up a gmail account
Setting up a gmail accountSetting up a gmail account
Setting up a gmail account
 

Similar to POP3 Proxy platform for e-mail filtering

Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit vJAIGANESH SEKAR
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mailtumetr1
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITDeepraj Bhujel
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptxYouTubeCONTRA
 
window server 2008 mail configuration
window server 2008 mail configurationwindow server 2008 mail configuration
window server 2008 mail configurationanwarkade1
 
Standard client server protocol.pptx
Standard client server protocol.pptxStandard client server protocol.pptx
Standard client server protocol.pptxNavanathDarwante1
 
E-Mail Header- A Forensic Key to Examine an E-Mail
E-Mail Header- A Forensic Key to Examine an E-MailE-Mail Header- A Forensic Key to Examine an E-Mail
E-Mail Header- A Forensic Key to Examine an E-MailIRJET Journal
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applicationsOnline
 
A New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender SideA New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender SideIDES Editor
 
Presentation client mail_Android
Presentation client mail_AndroidPresentation client mail_Android
Presentation client mail_AndroidMejri Hassen
 
Mail server PPT By Mukesh
Mail server PPT By MukeshMail server PPT By Mukesh
Mail server PPT By MukeshMukesh Kumar
 

Similar to POP3 Proxy platform for e-mail filtering (20)

Computer networks unit v
Computer networks    unit vComputer networks    unit v
Computer networks unit v
 
retrieving the mail
retrieving the mailretrieving the mail
retrieving the mail
 
Unit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - ITUnit 3 - Protocols and Client-Server Applications - IT
Unit 3 - Protocols and Client-Server Applications - IT
 
how email works
how email workshow email works
how email works
 
Ch22 system administration
Ch22 system administration Ch22 system administration
Ch22 system administration
 
presentation on email.pptx
presentation on email.pptxpresentation on email.pptx
presentation on email.pptx
 
window server 2008 mail configuration
window server 2008 mail configurationwindow server 2008 mail configuration
window server 2008 mail configuration
 
Standard client server protocol.pptx
Standard client server protocol.pptxStandard client server protocol.pptx
Standard client server protocol.pptx
 
E mail flow
E mail flowE mail flow
E mail flow
 
E-Mail Header- A Forensic Key to Examine an E-Mail
E-Mail Header- A Forensic Key to Examine an E-MailE-Mail Header- A Forensic Key to Examine an E-Mail
E-Mail Header- A Forensic Key to Examine an E-Mail
 
Tcpip services and applications
Tcpip services and applicationsTcpip services and applications
Tcpip services and applications
 
Email ftp
Email ftpEmail ftp
Email ftp
 
Electronic Mail.ppt
Electronic Mail.pptElectronic Mail.ppt
Electronic Mail.ppt
 
Email ftp
Email ftpEmail ftp
Email ftp
 
Computer networks
Computer networksComputer networks
Computer networks
 
A New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender SideA New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender Side
 
Why Messaging system?
Why Messaging system?Why Messaging system?
Why Messaging system?
 
Presentation client mail_Android
Presentation client mail_AndroidPresentation client mail_Android
Presentation client mail_Android
 
Email Client Server System
Email Client Server SystemEmail Client Server System
Email Client Server System
 
Mail server PPT By Mukesh
Mail server PPT By MukeshMail server PPT By Mukesh
Mail server PPT By Mukesh
 

More from Darshan Bhatt

Unit 1-PN junction Diode.pptx
Unit 1-PN junction Diode.pptxUnit 1-PN junction Diode.pptx
Unit 1-PN junction Diode.pptxDarshan Bhatt
 
Overview of an OSI reference Model
Overview of an OSI reference ModelOverview of an OSI reference Model
Overview of an OSI reference ModelDarshan Bhatt
 
Antenna Measurements
Antenna MeasurementsAntenna Measurements
Antenna MeasurementsDarshan Bhatt
 
Basics of microstrip slot line
Basics of microstrip slot lineBasics of microstrip slot line
Basics of microstrip slot lineDarshan Bhatt
 
Side Lobe Level (SLL) Reduction Methods in Antenna
Side Lobe Level (SLL) Reduction Methods in AntennaSide Lobe Level (SLL) Reduction Methods in Antenna
Side Lobe Level (SLL) Reduction Methods in AntennaDarshan Bhatt
 
Prediction methods of Rayleigh scattering losses
Prediction methods of Rayleigh scattering lossesPrediction methods of Rayleigh scattering losses
Prediction methods of Rayleigh scattering lossesDarshan Bhatt
 
Concept of Flip OFDM and its applications
Concept of Flip OFDM and its applicationsConcept of Flip OFDM and its applications
Concept of Flip OFDM and its applicationsDarshan Bhatt
 

More from Darshan Bhatt (8)

Unit 1-PN junction Diode.pptx
Unit 1-PN junction Diode.pptxUnit 1-PN junction Diode.pptx
Unit 1-PN junction Diode.pptx
 
Z Transform
Z TransformZ Transform
Z Transform
 
Overview of an OSI reference Model
Overview of an OSI reference ModelOverview of an OSI reference Model
Overview of an OSI reference Model
 
Antenna Measurements
Antenna MeasurementsAntenna Measurements
Antenna Measurements
 
Basics of microstrip slot line
Basics of microstrip slot lineBasics of microstrip slot line
Basics of microstrip slot line
 
Side Lobe Level (SLL) Reduction Methods in Antenna
Side Lobe Level (SLL) Reduction Methods in AntennaSide Lobe Level (SLL) Reduction Methods in Antenna
Side Lobe Level (SLL) Reduction Methods in Antenna
 
Prediction methods of Rayleigh scattering losses
Prediction methods of Rayleigh scattering lossesPrediction methods of Rayleigh scattering losses
Prediction methods of Rayleigh scattering losses
 
Concept of Flip OFDM and its applications
Concept of Flip OFDM and its applicationsConcept of Flip OFDM and its applications
Concept of Flip OFDM and its applications
 

Recently uploaded

The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 

POP3 Proxy platform for e-mail filtering

  • 1. A POP3 Proxy Platform for E-Mail Filtering PREPARED BY – DARSHAN BHATT (150320705001) M.E (EC) – SEM 2
  • 2. Content • Introduction • Goals of E-mail client system • Different Spam filtering methods • Basics of E-Mail • E-mail filtering platform • Design goal of PEMF • Work flow of PEMF • Types of connections • Conclusion • References
  • 3. Introduction • An E-Mail that the recipient did not request or agree to receive is known as “Spam”. [1] • According to the survey, Internet Users of China received 17.68 junk mails weekly on average and the proportion of spam was 57.52%. [1] • As spam volumes have increased, anti-spam techniques have developed rapidly over the last few years. [1]
  • 4. Goals of E-Mail Client System • Two main goals of E-Mail client system are [2] – 1. Filtering out junk E-Mails 2. Blocking E-Mails sent out by malicious code • There are many spam filtering methods available used to block E-Mails sent by malicious code. [2]
  • 5. Spam Filtering Methods • Spam filtering methods can generally be divided into- 1. Access control Method 2. Authentication Method 3. Content based filtering Method …………….[1] • We will discuss content based filtering method because it receives more and more attention because of high accuracy rate and practicality.
  • 6. Basics of E-Mail • E-Mail is an electronic mail which is one of the most popular Internet service allows a message including text, audio & video. [4] • In general, E-Mail system is composed of three sub- systems : MUA, MTA and MDA [1][3] • E-mail filtering program based on MUA has advantage of easy achievement and maintenance. [1]
  • 7. Basics of E-Mail Fig 1 : MUA, MTA and MDA
  • 8. E-Mail Filtering Platform • A Platform based on MUA for filtering email named PEMF : POP3 Proxy Platform for E-Mail Filtering. • This platform is compatible with different content based filtering methods. [1] • It has an advantage of transparent connection between e-mail server and e-mail client and has high communication efficiency. [1]
  • 9. Design goals of PEMF • PEMF achieves three design goals : 1. It has Universality – Design universal system 2. It ensures the transparency requirements. – User need not install any application 3. It has high efficiency and stability. – It improves efficiency and stability of system using thread pool mechanism.
  • 10. Fig 2 : Work-flow of PEMF
  • 11. Work flow of PEMF • E-Mail client could be Foxmail, Outlook Express etc. applications. • PEMF consists of two components : MFS and MFM. • MFS is a mail filtering service and MFM is mail filtering model.
  • 12. Types of connections • There are two possibilities of connections between E-Mail client and E-mail server : 1. Synchronous connection 2. Asynchronous connection • In PEMF system, asynchronous simulation is used to achive transparent connection between client and server. [1]
  • 13. Fig-3 : Synchronous Connection
  • 14. Fig-4 : Asynchronous Connection
  • 15. Thread pool technology • In computer programming, thread pool pattern consists of a number ‘m’ of threads created to perform number ‘n’ of tasks used to improve processing efficiency. [3]
  • 16. Conclusion • PEMF is a platform with high efficiency and stability for filtering e-mails. It is compatible with all content based filtering methods. It achieved transparent connection between E-Mail server and E-Mail client. It supported multi-account simultaneous connections. It is not only used to be anti-spam system but also used as test platform for different e-mail filtering methods.
  • 17. References [1]. W.Zhang, Li Zhang, “A POP3 Proxy Platform for E-Mail Filtering”, IEEE conference on computational intelligence and software engineering, 2009 [2]. S.J.Horng, M.Yang su, C-yi Wu, “An E-Mail Client Implementation with Spam filtering and security mechanisms” [3]. www.Wikipedia.org [4].“Data communication and networking” by B.A.Forouzan

Editor's Notes

  1. MUA – Mail USER agent MTA – Mail transfer agent – programs that transfer email from one client to other MDA – Mail delivery agent – It is a computer program responsible for the delivery of e-mail msg to recipient’s mail box.
  2. MUA – Mail USER agent MTA – Mail transfer agent – programs that transfer email from one client to other MDA – Mail delivery agent – It is a computer program responsible for the delivery of e-mail msg to recipient’s mail box.
  3. MUA – Mail USER agent MTA – Mail transfer agent – programs that transfer email from one client to other MDA – Mail delivery agent – It is a computer program responsible for the delivery of e-mail msg to recipient’s mail box.
  4. MUA – Mail USER agent MTA – Mail transfer agent – programs that transfer email from one client to other MDA – Mail delivery agent – It is a computer program responsible for the delivery of e-mail msg to recipient’s mail box.
  5. MUA – Mail USER agent MTA – Mail transfer agent – programs that transfer email from one client to other MDA – Mail delivery agent – It is a computer program responsible for the delivery of e-mail msg to recipient’s mail box.
  6. MUA – Mail USER agent MTA – Mail transfer agent – programs that transfer email from one client to other MDA – Mail delivery agent – It is a computer program responsible for the delivery of e-mail msg to recipient’s mail box.
  7. MUA – Mail USER agent MTA – Mail transfer agent – programs that transfer email from one client to other MDA – Mail delivery agent – It is a computer program responsible for the delivery of e-mail msg to recipient’s mail box.
  8. MUA – Mail USER agent MTA – Mail transfer agent – programs that transfer email from one client to other MDA – Mail delivery agent – It is a computer program responsible for the delivery of e-mail msg to recipient’s mail box.
  9. MUA – Mail USER agent MTA – Mail transfer agent – programs that transfer email from one client to other MDA – Mail delivery agent – It is a computer program responsible for the delivery of e-mail msg to recipient’s mail box.
  10. MUA – Mail USER agent MTA – Mail transfer agent – programs that transfer email from one client to other MDA – Mail delivery agent – It is a computer program responsible for the delivery of e-mail msg to recipient’s mail box.
  11. MUA – Mail USER agent MTA – Mail transfer agent – programs that transfer email from one client to other MDA – Mail delivery agent – It is a computer program responsible for the delivery of e-mail msg to recipient’s mail box.
  12. MUA – Mail USER agent MTA – Mail transfer agent – programs that transfer email from one client to other MDA – Mail delivery agent – It is a computer program responsible for the delivery of e-mail msg to recipient’s mail box.