SlideShare a Scribd company logo
Introduction
In today’s world electronic mail (or
popularly known as e-mail) is a very
powerful medium for transferring messages
to other users.
Like every powerful medium it is prone to
be misused.
One such case of misuse is the posting of
unsolicited emails known as spam.
 Too noisy Inbox.
Misleading information
distribution.
 Virus spreading programs
and Mails
Wastage of allocated
memory space for Inbox.
Spam filtering comes in two
forms
Server side filtering
Client side filtering
The filtering occurs on the server
before the emails are seen.
User filters that are created by
the email client, redirects emails
that are 'marked as Spam’ to a
specific 'Spam' folder
 Recognizing the words that are likely to appear as spam.
 universal virus definitions.
 universal block list of IP addresses(UBL).
Client side filtering
 Checking the mails against Subject and from Email ID specified
by the user.
 Checking the mails against the size limit of the mail specified by
the User.
Reporting a message as “spam” by the user.

Architecture
Admin: This module deals with the management of the application by a
person called Administrator who is responsible for taking all the mails coming to
the people working in the organization, and invoking the filtering mechanism
can also specify UBL IP addresses and Universal Virus definitions in order to
protect the systems from attack.
User:
This module deals with user processing. In this module user can
specify what he doesn’t want.
Filtering:
This module deals with the major task of Mail Filter
Spam filtering mechanism in gmail
How messages are marked as Spam in
Gmail???
Gmail has an automated system that helps detect
spam by identifying viruses and suspicious
messages and learning
from what Gmail users like
us commonly
mark as spam.
why that a particular message in
GMAIL is placed in Spam?
Phishing scams
Messages from an unconfirmed sender.
Message content is empty
Messages you sent to Spam
Administrator-set policies
Messages from an
unconfirmed sender
Spammers can forge a message to make it
look like it's sent by a real website or
company that you might trust. To help
protect you from such messages, Google
tries to verify the real sender using email
authentication
 Messages you sent to Spam
You previously marked these messages as spam by clicking
the "Report spam" or "Report phishing" button
 Administrator-set policies
If your organization uses Gmail, the administrator within
your group can decide what messages will be marked as spam.
Increased productivity
Personalized filter.
Phishing scam protection
White listing capabilities.
Users who receive a low volume of email will have to wait
longer to establish an adequate database.
Word based filters and list based filters have lots of
disadvantages
Disadvantages
 Email filter is used to inspect outgoing email at some
companies to ensure that employees comply with
appropriate laws.
 Malware can comprise a user's sensitive private data
by capturing bank account information, usernames
and passwords. Spam blocker applications can assist a
user in preventing these types of PC contaminations.
Web mail filter is a mechanism for classifying
message as either spam or non-spam.
Its reduces the overhead for the users by filtering
out unwanted or uninvited messages in the inbox.
It provides security for your mailbox by filtering
out contaminated messages.
Based on the future security issues, security can be
improved using emerging technologies.
 A survey on spam
filtering:www.scirp.org/journal/PaperInformation.aspx
 en.wikipedia.org/wiki/Anti-spam_techniques
 Defeating spam:www.techtarget.com
 Email Spam Filtering:Gordon V. Cormack
 www.howstuffworks.com
 www.ieee.org/documents/ieeecitationref.pdf
Seminar   on   web mail filter

More Related Content

What's hot

Detecting disposable email addresses
Detecting disposable email addressesDetecting disposable email addresses
Detecting disposable email addresses
unRFP
 
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
Manjunatha Kg
 
Serv Quest Cleantelligent
Serv Quest CleantelligentServ Quest Cleantelligent
Serv Quest Cleantelligent
arthagopian
 
Email List Verification Process Explained
Email List Verification Process ExplainedEmail List Verification Process Explained
Email List Verification Process Explained
eHygienics
 
1and1Mail Advanced Features - Auto Remove Bounced and Unsubscribed
 1and1Mail Advanced Features - Auto Remove Bounced and Unsubscribed 1and1Mail Advanced Features - Auto Remove Bounced and Unsubscribed
1and1Mail Advanced Features - Auto Remove Bounced and Unsubscribed
YeteSoft
 
1and1Mail Advanced Features - Auto IP Switcher
1and1Mail Advanced Features - Auto IP Switcher1and1Mail Advanced Features - Auto IP Switcher
1and1Mail Advanced Features - Auto IP Switcher
YeteSoft
 
1and1Mail Quickstart Guide - View Reports
1and1Mail Quickstart Guide - View Reports1and1Mail Quickstart Guide - View Reports
1and1Mail Quickstart Guide - View Reports
YeteSoft
 
Email Validation for Improved Deliverability and Marketing Results
Email Validation for Improved Deliverability and Marketing ResultsEmail Validation for Improved Deliverability and Marketing Results
Email Validation for Improved Deliverability and Marketing Results
Scott Valentine, MBA, CSPO
 
higi Salesforce integration demo
higi Salesforce integration demohigi Salesforce integration demo
higi Salesforce integration demo
drkhan
 

What's hot (9)

Detecting disposable email addresses
Detecting disposable email addressesDetecting disposable email addresses
Detecting disposable email addresses
 
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
 
Serv Quest Cleantelligent
Serv Quest CleantelligentServ Quest Cleantelligent
Serv Quest Cleantelligent
 
Email List Verification Process Explained
Email List Verification Process ExplainedEmail List Verification Process Explained
Email List Verification Process Explained
 
1and1Mail Advanced Features - Auto Remove Bounced and Unsubscribed
 1and1Mail Advanced Features - Auto Remove Bounced and Unsubscribed 1and1Mail Advanced Features - Auto Remove Bounced and Unsubscribed
1and1Mail Advanced Features - Auto Remove Bounced and Unsubscribed
 
1and1Mail Advanced Features - Auto IP Switcher
1and1Mail Advanced Features - Auto IP Switcher1and1Mail Advanced Features - Auto IP Switcher
1and1Mail Advanced Features - Auto IP Switcher
 
1and1Mail Quickstart Guide - View Reports
1and1Mail Quickstart Guide - View Reports1and1Mail Quickstart Guide - View Reports
1and1Mail Quickstart Guide - View Reports
 
Email Validation for Improved Deliverability and Marketing Results
Email Validation for Improved Deliverability and Marketing ResultsEmail Validation for Improved Deliverability and Marketing Results
Email Validation for Improved Deliverability and Marketing Results
 
higi Salesforce integration demo
higi Salesforce integration demohigi Salesforce integration demo
higi Salesforce integration demo
 

Similar to Seminar on web mail filter

Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
Wan Solo
 
SPAM FILTERS
SPAM FILTERSSPAM FILTERS
SPAM FILTERS
BismaSajjad9
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
Wan Solo
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
Umar Alharaky
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docx
Patricia Rountree
 
B2B Email Deliverability Whitepaper
B2B Email Deliverability WhitepaperB2B Email Deliverability Whitepaper
B2B Email Deliverability Whitepaper
B2B Email Experts
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
AbdulHaseebKhan34
 
Glossary of important email marketing terms
Glossary of important email marketing termsGlossary of important email marketing terms
Glossary of important email marketing terms
InamDurrani2
 
Email Deliverability Guide For 2013
Email Deliverability Guide For 2013Email Deliverability Guide For 2013
Email Deliverability Guide For 2013
Learnhomebusiness.com
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
cactussky
 
Network paperthesis1
Network paperthesis1Network paperthesis1
Network paperthesis1
Dhara Shah
 
NetworkPaperthesis1
NetworkPaperthesis1NetworkPaperthesis1
NetworkPaperthesis1
Dhara Shah
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
Chippy Thomas
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharya
sankhadeep
 
DEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERING
DEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERINGDEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERING
DEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERING
International Journal of Technical Research & Application
 
Email deliverability
Email deliverabilityEmail deliverability
Email deliverability
Anton Panaitesco
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your Network
GFI Software
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniques
ranjit banshpal
 
Maximizing Email Deliverability - Accurate List Inc
Maximizing Email Deliverability - Accurate List IncMaximizing Email Deliverability - Accurate List Inc
Maximizing Email Deliverability - Accurate List Inc
Joan Ginther
 
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERSAN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
ijsrd.com
 

Similar to Seminar on web mail filter (20)

Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
 
SPAM FILTERS
SPAM FILTERSSPAM FILTERS
SPAM FILTERS
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docx
 
B2B Email Deliverability Whitepaper
B2B Email Deliverability WhitepaperB2B Email Deliverability Whitepaper
B2B Email Deliverability Whitepaper
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
 
Glossary of important email marketing terms
Glossary of important email marketing termsGlossary of important email marketing terms
Glossary of important email marketing terms
 
Email Deliverability Guide For 2013
Email Deliverability Guide For 2013Email Deliverability Guide For 2013
Email Deliverability Guide For 2013
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
 
Network paperthesis1
Network paperthesis1Network paperthesis1
Network paperthesis1
 
NetworkPaperthesis1
NetworkPaperthesis1NetworkPaperthesis1
NetworkPaperthesis1
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharya
 
DEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERING
DEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERINGDEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERING
DEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERING
 
Email deliverability
Email deliverabilityEmail deliverability
Email deliverability
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your Network
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniques
 
Maximizing Email Deliverability - Accurate List Inc
Maximizing Email Deliverability - Accurate List IncMaximizing Email Deliverability - Accurate List Inc
Maximizing Email Deliverability - Accurate List Inc
 
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERSAN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
 

Recently uploaded

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
GDSC PJATK
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 

Recently uploaded (20)

Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!Finale of the Year: Apply for Next One!
Finale of the Year: Apply for Next One!
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 

Seminar on web mail filter

  • 1.
  • 2. Introduction In today’s world electronic mail (or popularly known as e-mail) is a very powerful medium for transferring messages to other users. Like every powerful medium it is prone to be misused. One such case of misuse is the posting of unsolicited emails known as spam.
  • 3.  Too noisy Inbox. Misleading information distribution.  Virus spreading programs and Mails Wastage of allocated memory space for Inbox.
  • 4.
  • 5. Spam filtering comes in two forms Server side filtering Client side filtering The filtering occurs on the server before the emails are seen. User filters that are created by the email client, redirects emails that are 'marked as Spam’ to a specific 'Spam' folder
  • 6.  Recognizing the words that are likely to appear as spam.  universal virus definitions.  universal block list of IP addresses(UBL). Client side filtering  Checking the mails against Subject and from Email ID specified by the user.  Checking the mails against the size limit of the mail specified by the User. Reporting a message as “spam” by the user. 
  • 8. Admin: This module deals with the management of the application by a person called Administrator who is responsible for taking all the mails coming to the people working in the organization, and invoking the filtering mechanism can also specify UBL IP addresses and Universal Virus definitions in order to protect the systems from attack. User: This module deals with user processing. In this module user can specify what he doesn’t want. Filtering: This module deals with the major task of Mail Filter
  • 9. Spam filtering mechanism in gmail How messages are marked as Spam in Gmail??? Gmail has an automated system that helps detect spam by identifying viruses and suspicious messages and learning from what Gmail users like us commonly mark as spam.
  • 10. why that a particular message in GMAIL is placed in Spam? Phishing scams Messages from an unconfirmed sender. Message content is empty Messages you sent to Spam Administrator-set policies
  • 11. Messages from an unconfirmed sender Spammers can forge a message to make it look like it's sent by a real website or company that you might trust. To help protect you from such messages, Google tries to verify the real sender using email authentication
  • 12.  Messages you sent to Spam You previously marked these messages as spam by clicking the "Report spam" or "Report phishing" button  Administrator-set policies If your organization uses Gmail, the administrator within your group can decide what messages will be marked as spam.
  • 13. Increased productivity Personalized filter. Phishing scam protection White listing capabilities. Users who receive a low volume of email will have to wait longer to establish an adequate database. Word based filters and list based filters have lots of disadvantages Disadvantages
  • 14.  Email filter is used to inspect outgoing email at some companies to ensure that employees comply with appropriate laws.  Malware can comprise a user's sensitive private data by capturing bank account information, usernames and passwords. Spam blocker applications can assist a user in preventing these types of PC contaminations.
  • 15. Web mail filter is a mechanism for classifying message as either spam or non-spam. Its reduces the overhead for the users by filtering out unwanted or uninvited messages in the inbox. It provides security for your mailbox by filtering out contaminated messages. Based on the future security issues, security can be improved using emerging technologies.
  • 16.  A survey on spam filtering:www.scirp.org/journal/PaperInformation.aspx  en.wikipedia.org/wiki/Anti-spam_techniques  Defeating spam:www.techtarget.com  Email Spam Filtering:Gordon V. Cormack  www.howstuffworks.com  www.ieee.org/documents/ieeecitationref.pdf