SlideShare a Scribd company logo
This presentation uses some slides from lecture slides of Associate Prof.
Tran Quang Anh from FIT - HANU
&&
Anti-spamAnti-spam
Group No 2C12Group No 2C12
Contents
1.Background knowledge
2.Spam
3.Anti spam techniques
4.An introduction to Gmail anti-spam
5.Q&A
1. Background knowledge
1.1 Email format: 2 components
• Header
• Body
Separated by a free line.
1. Background knowledge
PRIMARY
FIELDS
SECONDARY FIELDS MIME FIELDS
1. From
2. To
3. Subject
4. Date
5. Message-ID
6. Bcc (Blind Carbon Copy)
7. Cc (Carbon copy)
8. Content-Type
9. Importance
10.In-Reply-To
11.Precedence
12.Received
13.Return-Path
14.Sender
15. X-Originating-IP
16.MIME format
17.Content encoding
18.Content type
19.Content-
Disposition
1. Background knowledge
1.2 Email sending steps
If server Gmail wants to send an email to
manhnv@hanu.edu.vn, it will
Step 1: Check MX record (IP) of
hanu.edu.vn
Step 2: Connect to port 25 in that IP
address
Step 3: Follow SMTP protocol
2. Email Spam
2.1 What is email spam?
UBE (Unsolicited Bulk Email)
Same content but lots of mails
Purposes: Advertisement,
phishing, spreading malware, etc.
2. Email Spam
2.2 Why is email spam?
o Technical consideration
o Sender is anonymous
o Internet (email, ADSL) is prevalent
o Economical consideration
o Low cost to send an email
o Demand of advertisement
2. Email Spam
2.3 Problems caused by
email spam:
o Denied of service (full mail box,
wrong delete)
2. Email Spam
2.3 Problems caused by email
spam:
oVirus
2. Email Spam
2.3 Problems caused by email
spam:
oPhishing
3. Anti-spam
3.1 Anti-spam framework:
3. Anti - spam
3.2 Anti-spam techniques
 Content-based method
 Header-based method
 Protocol-based method
 Sender authentication
 Social network
3. Anti - spam
Content-based method
o Analyze the frequency of top keywords in email (SpamAssassin)
o Effective algorithm: Bayesian filtering algorithm
o Example: giá, c h i, siêu, mi n phí (Vietnamese keywords), free, like,ơ ộ ễ
subscribe, Facebook, hot deal, sale off (English keywords)
3. Anti - spam
 Header-based method
o Examines the headers of email messages to detect spam
o Approaches:
o Whitelist: email addresses of legitimate email in a database
o Blacklist schemes collect the IP addresses of all known spammer
3. Anti - spam
Source: http://www.mcafee.com/threat-intelligence/ip/spam-senders.aspx
3. Anti – spam
 Protocol-based method
3. Anti - spam
 Sender authentication
o Spammer can fake identity (they can claim who they are).
o Sender authentication treat this way.
o How does SA work?
1. SA adds a “marker” to the DNS server, which inform the designated email
servers for a specific domain.
2. A server verify if a received email message actually came from on these email
servers.
o Example: Sender Policy Framework (AOL, HANU), SenderID (Microsoft),
DomainKeys (Yahoo)
3. Anti-spam
 Social network
o PageRank (Google)
o Graph theory:
• Consider an email network with nodes
are users and links are email
transaction activities
• Coefficient: low (do not exchange email
frequently), high
4. Gmail anti-spam
4.1 Gmail anti-spam technique
o Gmail uses multiple techniques:
o SPF (Sender Policy Framework),
o DomainKeys
o DKIM (DomainKeys Identified Mail)
4. Gmail anti-spam
4.2 Gmail header format
o How to read a header? (Demonstration with web browser)
Spam and Anti Spam Techniques

More Related Content

What's hot

Kerberos authentication
Kerberos authenticationKerberos authentication
Kerberos authentication
Suraj Singh
 
CISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 9. Software Development SecurityCISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 9. Software Development Security
Sam Bowne
 
LDAP
LDAPLDAP
Kerberos
KerberosKerberos
Kerberos
Sparkbit
 
Https
HttpsHttps
Kerberos
KerberosKerberos
Kerberos
Sutanu Paul
 
Email security
Email securityEmail security
Email security
Baliram Yadav
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
UTD Computer Security Group
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
Sagar Verma
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
DarshanPatil82
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigation
edwardbel
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
Gol D Roger
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
Sina Manavi
 
CNIT 123: 6: Enumeration
CNIT 123: 6: EnumerationCNIT 123: 6: Enumeration
CNIT 123: 6: Enumeration
Sam Bowne
 
Message authentication
Message authenticationMessage authentication
Message authentication
CAS
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1
Shobhit Sharma
 
Message Authentication Requirement-MAC
Message Authentication Requirement-MACMessage Authentication Requirement-MAC
Message Authentication Requirement-MAC
Sou Jana
 
Three way handshake
Three way handshakeThree way handshake
Three way handshake
SKMohamedKasim
 
What Is Sliding Window Protocol?
What Is Sliding Window Protocol?What Is Sliding Window Protocol?
What Is Sliding Window Protocol?
Simplilearn
 
Wireshark
WiresharkWireshark
Wireshark
Sourav Roy
 

What's hot (20)

Kerberos authentication
Kerberos authenticationKerberos authentication
Kerberos authentication
 
CISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 9. Software Development SecurityCISSP Prep: Ch 9. Software Development Security
CISSP Prep: Ch 9. Software Development Security
 
LDAP
LDAPLDAP
LDAP
 
Kerberos
KerberosKerberos
Kerberos
 
Https
HttpsHttps
Https
 
Kerberos
KerberosKerberos
Kerberos
 
Email security
Email securityEmail security
Email security
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigation
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
 
Password Cracking
Password Cracking Password Cracking
Password Cracking
 
CNIT 123: 6: Enumeration
CNIT 123: 6: EnumerationCNIT 123: 6: Enumeration
CNIT 123: 6: Enumeration
 
Message authentication
Message authenticationMessage authentication
Message authentication
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1
 
Message Authentication Requirement-MAC
Message Authentication Requirement-MACMessage Authentication Requirement-MAC
Message Authentication Requirement-MAC
 
Three way handshake
Three way handshakeThree way handshake
Three way handshake
 
What Is Sliding Window Protocol?
What Is Sliding Window Protocol?What Is Sliding Window Protocol?
What Is Sliding Window Protocol?
 
Wireshark
WiresharkWireshark
Wireshark
 

Viewers also liked

Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam Filtering
iNazneen
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
Umar Alharaky
 
Spam
SpamSpam
E Mail & Spam Presentation
E Mail & Spam PresentationE Mail & Spam Presentation
E Mail & Spam Presentation
newsan2001
 
10 tips to promote your content without spamming people
10 tips to promote your content without spamming people10 tips to promote your content without spamming people
10 tips to promote your content without spamming people
Mark Schaefer
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniques
ranjit banshpal
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ict
siewying
 
What is SPAM?
What is SPAM?What is SPAM?
What is SPAM?
Yavuz Adabalı
 

Viewers also liked (8)

Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam Filtering
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
Spam
SpamSpam
Spam
 
E Mail & Spam Presentation
E Mail & Spam PresentationE Mail & Spam Presentation
E Mail & Spam Presentation
 
10 tips to promote your content without spamming people
10 tips to promote your content without spamming people10 tips to promote your content without spamming people
10 tips to promote your content without spamming people
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniques
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ict
 
What is SPAM?
What is SPAM?What is SPAM?
What is SPAM?
 

Similar to Spam and Anti Spam Techniques

spam.ppt
spam.pptspam.ppt
Identification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using VotingIdentification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using Voting
Editor IJCATR
 
Network paperthesis1
Network paperthesis1Network paperthesis1
Network paperthesis1
Dhara Shah
 
NetworkPaperthesis1
NetworkPaperthesis1NetworkPaperthesis1
NetworkPaperthesis1
Dhara Shah
 
What is Email Header - Understanding Email Anatomy
What is Email Header - Understanding Email AnatomyWhat is Email Header - Understanding Email Anatomy
What is Email Header - Understanding Email Anatomy
email_header
 
A New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender SideA New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender Side
IDES Editor
 
miniproject.ppt.pptx
miniproject.ppt.pptxminiproject.ppt.pptx
miniproject.ppt.pptx
Anush90
 
Identifying Valid Email Spam Emails Using Decision Tree
Identifying Valid Email Spam Emails Using Decision TreeIdentifying Valid Email Spam Emails Using Decision Tree
Identifying Valid Email Spam Emails Using Decision Tree
Editor IJCATR
 
Analysis of an image spam in email based on content analysis
Analysis of an image spam in email based on content analysisAnalysis of an image spam in email based on content analysis
Analysis of an image spam in email based on content analysis
ijnlc
 
Jt3616901697
Jt3616901697Jt3616901697
Jt3616901697
IJERA Editor
 
Email
EmailEmail
Email
Roy Thomas
 
Aseem - AntiSpam - Understanding the good, the bad and the ugly - ClubHack2008
Aseem - AntiSpam - Understanding the good, the bad and the ugly - ClubHack2008Aseem - AntiSpam - Understanding the good, the bad and the ugly - ClubHack2008
Aseem - AntiSpam - Understanding the good, the bad and the ugly - ClubHack2008
ClubHack
 
AntiSpam - Understanding the good, the bad and the ugly
AntiSpam - Understanding the good, the bad and the uglyAntiSpam - Understanding the good, the bad and the ugly
AntiSpam - Understanding the good, the bad and the ugly
amiable_indian
 
Blockmail Technical White Paper
Blockmail   Technical White PaperBlockmail   Technical White Paper
Blockmail Technical White Paper
niallmmackey
 
B0940509
B0940509B0940509
B0940509
IOSR Journals
 
402 406
402 406402 406
CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015
CoLaboraDK
 
La seguridad sí importa: Windows Live & IE9
La seguridad sí importa: Windows Live & IE9La seguridad sí importa: Windows Live & IE9
La seguridad sí importa: Windows Live & IE9
Eventos Creativos
 
Technical Background Overview Ppt
Technical Background Overview PptTechnical Background Overview Ppt
Technical Background Overview Ppt
Antonio Ieranò
 
Detecting Spambot as an Antispam Technique for Web Internet BBS
Detecting Spambot as an Antispam Technique for Web Internet BBSDetecting Spambot as an Antispam Technique for Web Internet BBS
Detecting Spambot as an Antispam Technique for Web Internet BBS
ijsrd.com
 

Similar to Spam and Anti Spam Techniques (20)

spam.ppt
spam.pptspam.ppt
spam.ppt
 
Identification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using VotingIdentification of Spam Emails from Valid Emails by Using Voting
Identification of Spam Emails from Valid Emails by Using Voting
 
Network paperthesis1
Network paperthesis1Network paperthesis1
Network paperthesis1
 
NetworkPaperthesis1
NetworkPaperthesis1NetworkPaperthesis1
NetworkPaperthesis1
 
What is Email Header - Understanding Email Anatomy
What is Email Header - Understanding Email AnatomyWhat is Email Header - Understanding Email Anatomy
What is Email Header - Understanding Email Anatomy
 
A New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender SideA New Method to Stop Spam Emails in Sender Side
A New Method to Stop Spam Emails in Sender Side
 
miniproject.ppt.pptx
miniproject.ppt.pptxminiproject.ppt.pptx
miniproject.ppt.pptx
 
Identifying Valid Email Spam Emails Using Decision Tree
Identifying Valid Email Spam Emails Using Decision TreeIdentifying Valid Email Spam Emails Using Decision Tree
Identifying Valid Email Spam Emails Using Decision Tree
 
Analysis of an image spam in email based on content analysis
Analysis of an image spam in email based on content analysisAnalysis of an image spam in email based on content analysis
Analysis of an image spam in email based on content analysis
 
Jt3616901697
Jt3616901697Jt3616901697
Jt3616901697
 
Email
EmailEmail
Email
 
Aseem - AntiSpam - Understanding the good, the bad and the ugly - ClubHack2008
Aseem - AntiSpam - Understanding the good, the bad and the ugly - ClubHack2008Aseem - AntiSpam - Understanding the good, the bad and the ugly - ClubHack2008
Aseem - AntiSpam - Understanding the good, the bad and the ugly - ClubHack2008
 
AntiSpam - Understanding the good, the bad and the ugly
AntiSpam - Understanding the good, the bad and the uglyAntiSpam - Understanding the good, the bad and the ugly
AntiSpam - Understanding the good, the bad and the ugly
 
Blockmail Technical White Paper
Blockmail   Technical White PaperBlockmail   Technical White Paper
Blockmail Technical White Paper
 
B0940509
B0940509B0940509
B0940509
 
402 406
402 406402 406
402 406
 
CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015
 
La seguridad sí importa: Windows Live & IE9
La seguridad sí importa: Windows Live & IE9La seguridad sí importa: Windows Live & IE9
La seguridad sí importa: Windows Live & IE9
 
Technical Background Overview Ppt
Technical Background Overview PptTechnical Background Overview Ppt
Technical Background Overview Ppt
 
Detecting Spambot as an Antispam Technique for Web Internet BBS
Detecting Spambot as an Antispam Technique for Web Internet BBSDetecting Spambot as an Antispam Technique for Web Internet BBS
Detecting Spambot as an Antispam Technique for Web Internet BBS
 

Recently uploaded

Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 

Spam and Anti Spam Techniques

  • 1. This presentation uses some slides from lecture slides of Associate Prof. Tran Quang Anh from FIT - HANU && Anti-spamAnti-spam Group No 2C12Group No 2C12
  • 2. Contents 1.Background knowledge 2.Spam 3.Anti spam techniques 4.An introduction to Gmail anti-spam 5.Q&A
  • 3. 1. Background knowledge 1.1 Email format: 2 components • Header • Body Separated by a free line.
  • 4. 1. Background knowledge PRIMARY FIELDS SECONDARY FIELDS MIME FIELDS 1. From 2. To 3. Subject 4. Date 5. Message-ID 6. Bcc (Blind Carbon Copy) 7. Cc (Carbon copy) 8. Content-Type 9. Importance 10.In-Reply-To 11.Precedence 12.Received 13.Return-Path 14.Sender 15. X-Originating-IP 16.MIME format 17.Content encoding 18.Content type 19.Content- Disposition
  • 5. 1. Background knowledge 1.2 Email sending steps If server Gmail wants to send an email to manhnv@hanu.edu.vn, it will Step 1: Check MX record (IP) of hanu.edu.vn Step 2: Connect to port 25 in that IP address Step 3: Follow SMTP protocol
  • 6. 2. Email Spam 2.1 What is email spam? UBE (Unsolicited Bulk Email) Same content but lots of mails Purposes: Advertisement, phishing, spreading malware, etc.
  • 7. 2. Email Spam 2.2 Why is email spam? o Technical consideration o Sender is anonymous o Internet (email, ADSL) is prevalent o Economical consideration o Low cost to send an email o Demand of advertisement
  • 8. 2. Email Spam 2.3 Problems caused by email spam: o Denied of service (full mail box, wrong delete)
  • 9. 2. Email Spam 2.3 Problems caused by email spam: oVirus
  • 10. 2. Email Spam 2.3 Problems caused by email spam: oPhishing
  • 12. 3. Anti - spam 3.2 Anti-spam techniques  Content-based method  Header-based method  Protocol-based method  Sender authentication  Social network
  • 13. 3. Anti - spam Content-based method o Analyze the frequency of top keywords in email (SpamAssassin) o Effective algorithm: Bayesian filtering algorithm o Example: giá, c h i, siêu, mi n phí (Vietnamese keywords), free, like,ơ ộ ễ subscribe, Facebook, hot deal, sale off (English keywords)
  • 14. 3. Anti - spam  Header-based method o Examines the headers of email messages to detect spam o Approaches: o Whitelist: email addresses of legitimate email in a database o Blacklist schemes collect the IP addresses of all known spammer
  • 15. 3. Anti - spam Source: http://www.mcafee.com/threat-intelligence/ip/spam-senders.aspx
  • 16. 3. Anti – spam  Protocol-based method
  • 17. 3. Anti - spam  Sender authentication o Spammer can fake identity (they can claim who they are). o Sender authentication treat this way. o How does SA work? 1. SA adds a “marker” to the DNS server, which inform the designated email servers for a specific domain. 2. A server verify if a received email message actually came from on these email servers. o Example: Sender Policy Framework (AOL, HANU), SenderID (Microsoft), DomainKeys (Yahoo)
  • 18. 3. Anti-spam  Social network o PageRank (Google) o Graph theory: • Consider an email network with nodes are users and links are email transaction activities • Coefficient: low (do not exchange email frequently), high
  • 19. 4. Gmail anti-spam 4.1 Gmail anti-spam technique o Gmail uses multiple techniques: o SPF (Sender Policy Framework), o DomainKeys o DKIM (DomainKeys Identified Mail)
  • 20. 4. Gmail anti-spam 4.2 Gmail header format o How to read a header? (Demonstration with web browser)