List Categories | List All Articles | List Articles By Title
How Spammers Fool Rule-based and Signature-Based Spam Filters
Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. The old ways of blocking the bad guys just don't work anymore.
Examining spam and spam-blocking technology can illuminate how this evolution is taking place and what can be done to combat spam and reclaim e-mail as the efficient, effective communication tool it was intended to be.
Heuristics (Rule-based Filtering)
One method used to combat spam is Rule-based, or Heuristic Filtering. Rule-based filters scan email content for predetermined words or phrases that may indicate a message is spam. For example, if an email administrator includes the word "sex" on a company's rule-based list, any email containing this word will be filtered.
The major drawback of this approach is the difficulty in identifying keywords that are consistently indicative of spam. While spammers may frequently use the words "sex" and 'Viagra" in spam emails, these words are also used in legitimate business correspondence, particularly in the healthcare industry. Additionally, spammers have learned to obfuscate suspect words by using spellings such as "S*E*X", or "VI a a GRR A".
It is impossible to develop dictionaries that identify every possible misspelling of "spammy" keywords. Additionally, because filtering for certain keywords produces large numbers of false positives, many organizations have found they cannot afford to rely solely on rule-based filters to identify spam.
Signature-Based Spam Filters
Another method used to combat spam is Signature-based Filtering. Signature-based filters examine the contents of known spam, usually derived from honey pots, or dummy email addresses set up specifically to collect spam. Once a honey pot receives a spam message, the content is examined and given a unique identifier. The unique identifier is obtained by assigning a value to each character in the email. Once all characters have been assigned a value, the values are totaled, creating the spam's signature. The signature is added to a signature database and sent as a regular update to the email service's subscribers. The signature is compared to every email coming in to the network and all matching messages are discarded as spam.
The benefit of signature-based filters is that they rarely produce false-positives, or legitimate email incorrectly identified as spam. The drawback of signature-based filters is that they are very easy to defeat. Because they are backward-looking, they only deal with spam that has already been sent. By the time the honey pot receives a spam message, the system assigns a signature, and the update is sent and installed on the subscribers' network, the spammer has already sent millions of emails. A slight modification of the email message will render the existing signature useless.
Furthermore, spammers can easily evade signature-based filters by using special email software that adds random strings of content to the subject line and body of the email. Because the variable content alters the signature of each email sent by the spammer, signature-based spam filters are unable to match the email to known pieces of spam.
Developers of signature-based spam filters have learned to identify the tell-tale signs of automated random character generation. But as is often the case, spammers remain a step ahead and have developed more sophisticated methods for inserting random content. As a result, most spam continues to fool signature-based filters.
When used individually, each anti-spam technique has been systematically overcome by spammers. Grandiose plans to rid the world of spam, such as charging a penny for each e-mail received or forcing servers to solve mathematical problems before delivering e-mail, have been proposed with few results. These schemes are not realistic and would require a large percentage of the population to adopt the same anti-spam method in order to be effective. You can learn more about the fight against spam by visiting our website at www.ciphertrust.com and downloading our whitepapers.
Dr. Paul Judge is a noted scholar and entrepreneur. He is Chief Technology Officer at CipherTrust, the industry's largest provider of enterprise email security. The company's flagship product, IronMail provides a best of breed enterprise anti spam solution designed to stop spam, phishing attacks and other email-based threats. Learn more by visiting http://www.ciphertrust.com/products/spam_and_fraud_protection today.
Fight Spam and Fortify Your Web Site with RSS
RSS is the answer to the Spam epidemic of the past. Spam, any mass distribution of material across the Internet, can cause systems to back up and crash with unwanted and unsolicited material.
The Trouble With Spam Is....
Each day we all face the same challenge. Spam.
What to Do to Avoid Getting Banned
How would you feel if you found a link on the web that was interesting to you but when you click the link it takes you to a page that is total rubbish? You are not only disappointed but it also wastes your time. Unfortunately, this is often true in many cases.
Dealing With SPAM - An E-mail Address Strategy
With SPAM being such a problem it might seem the right thing to do is never give anyone your email address. As a strategy that's not bad but it misses one rather important point; the purpose of having an email address is to be able to exchange emails, both with friends and also as a means to receive eZines from online forums and information sites.
Is Your Website Blacklisted?
A blacklist, as the name implies, is a list of people or companies who have met with the disapproval of others. In the online world a blacklist refers to those people who have been marked as responsible for generating spam in a very big way.
How To Stop Spam
I imagine you have seen, heard about, or already know what spam is. But just in case you don't, it is unsolicited and unwanted emails that arrive in your email inbox from a person or company that you don't know.
Spammer in the Slammer: Jeremy Jaynes Sentenced to Nine Years
Will other spammers take heed? Don't count on it.Jeremy Jaynes was on top of the world.
One of our Australian clients sent out a campaign using a list which had been complied manually.The message contained information relevant for the specific job position that these recipients held.
Spamicide: Man Spammed to Death While Checking His E-mail
Death by spam is now possible with a new device by Microsoft. The device when implanted in the user's skull allows downloading of email directly into the brain.
5 Zero-Cost Spam Prevention Tools For All Situations!
Anyone who uses email knows what Spam is!It's annoying and time consuming to wade through volumes of fraud, con and obscene emails to filter out the really important ones. And I am sure you are affected by this menace in some form or other.
Pst... Pass It On... I Found Out Its a Hoax
When you receive an email telling you about a virus, what do you do with it? Do you send it to everyone in your address book to help them protect themselves too?A virus warning is probably on its way to your inbox right now, claiming to be from a credible source and warning you of a dangerous virus on the loose. Beware.
BUSTED: Anti Spam Forces Bankrupt Super-Spammer Scott Richter
Microsoft scores one for the good guysScott Richter, the self-proclaimed "Spam King," just can't seem to get enough attention. Admittedly responsible for sending literally billions of Unsolicited Commercial Email messages (UCE), Richter made headlines again recently when his spam-fed cash cow, OptInRealBig.
Take Back Control of Your Inbox: Eliminate Annoying and Potentially Harmful E-mails
Are you tired of spam stealing your time, your money, your bandwidth and your hard disc space?The time you devote each day to sort and delete spam from your inbox could be put to much better use. In the European Union alone, the working hours employees are spending on sorting and deleting spam is costing the companies and estimated 10 billion euros every year! By manually sorting out spam after it has reached your inbox you are loosing time and money, as well as bandwidth and space.
Spam Filters Explained
What do they do? How do they work? Which one is right for me? By Alan HearnshawSpam is a very real problem that many people have to deal with on a daily basis. For those that have decided to do something about it and start to investigate the options available in spam filtering, this article provides a brief introduction to your options and the types of spam filters available.
Blackhole or Fail - Which One Is Better For Your Mail Server?
Very often SPAMMERS take advantage of catch-all email setup on webservers. Every email no matter what the recipients email address is will be caught by the default email account.
Stop Intrusive Pop-up Ads and Regain Control of Your Online Experience!
Stop intrusive pop-up ads and regain control of your online world! Intrusive and distracting pop-up windows are not an unavoidable part of being online. You don't have to put up with offensive, time consuming and bandwidth stealing pop up ads.
Corporate Email Policies Lower Unnecessary Legal and Security Risks
What comes to your mind when you think about your email? Email makes possible almost instant communication with your co-workers without leaving your desk, a quick note to a family member who lives far away, but also has a very annoying downside such as junk mail. Since the introduction of the Internet, email has been one of its primary uses.
Spam eMails Are Not Just Annoying - They Are A Main Distributor Of Viruses
Why is someone from India, Africa, or elsewhere writing you for information about your bank account with shady promises of depositing thousands of dollars within? (Many, many people have fallen for this real scam.) It's costing us ALL money - more on this in a bit.
Ignoring These Tips Could Result in an Inbox Full of Spam
Although there still seem to be some differences among the US Government, the lawmakers, the anti-spam organizations and the spammers regarding what is spam and what is not, identifying it is actually pretty easy: if you did not ask for it, you did not sign up on a mailing list related to it, and did not leave your e-mail address on a web form asking for more information on it?it's spam! The spam issue is not about content, but solely about delivery method. The content of spam is and has always been irrelevant.
Is There A National Do Not Spam List?
You may have already received a do not spam list email, seen a web site or even heard a radio advertisement that promises to reduce spam email just by submitting your email address.Since the federal "Do Not Call List" became law in 2003, it seems logical that a do not spam list exists also.
home | site map
All articles are copyright to their owners.
Note: this website lists articles, We do not Write Articles !