SlideShare ist ein Scribd-Unternehmen logo
1 von 24
JSS ACADEMY OF TECHNICAL EDUCATION, BANGALORE
                 (Affiliated to Visveshwaraya Technological University, Belgaum)




          INFORMATION SCIENCE Department



Ashish Sharma
1JS08IS006
Technical Seminar on
      MAILBOOK
 A Social Network Against Spamming
Aim

                   Spam Mail
                               To provide a collaborative spam
  Legitimate
     Mail

                               filter over a social network by
               Spam Mail


                               exchanging vote databases
                               among its users.
 Legitimate Mail
Content
          1.   Introduction
          2.   Related work
          3.   Design and architecture
          4.   Conclusion
          5.   References
          6.   Questions and Answers
Introduction

               Email

               Spam

               Spam Filters
Mailbook
           • Users exchange databases with fingerprints
             of emails identified as spam.
           • Vote Databases.
           • Fingerprints are the hash values of the
             email’s content.
           • Central Repository.
           • Email Service.
Related Work
               •   White lists.
               •   Black lists.
               •   Grey lists.
               •   Domain key identified mail.
               •   Content based filtering.
               •   Bayesian filtering.
               •   Collaborative filtering.
Design and Architecture


                   • Based on social collaboration
                     among trusted users(friends).

                   • Exchange of vote databases.
Generic Architecture of Mailbook
Vote Database Exchange Among Friends
Logic
        Implementation of the logic for database
        exchange is based on:

        • Trusted friends.
        • Profile characteristic.
        • Group membership.
Mailbook Functions
Import And Export Functions




        Import
                 Export
MD-5 Message Digest Algorithm

               The MD5 Message-Digest Algorithm
               is a widely used cryptographic hash
               function that produces a 128-bit (16-
               byte) hash value.
Current Work

          Linux      Apache
                  LAMP
         MySQL           PHP
Linux

        •   Operating system
        •   Free and open source
        •   Customizable
        •   Necessary security features
        •   Programming language
            support
Apache HTTP Server

                     • Web Server Software.
                     • Free.
                     • Most Popular.
MySQL

        •   Handling Database.
        •   Reliable and easy to use.
        •   Open source and free.
        •   More than 20 platforms.
PHP

      •   Scripting language.
      •   Server side technology.
      •   Fast and stable.
      •   Secure and reliable.
Conclusion
             • Addressing the problem of spamming.
             • A social network to disperse
               fingerprints.
             • User Friendly.
             • Easy email characterization.
             • Efficient design.
             • Flexible.
             • Global Solution.
References
[1] Wikipedia.2011.Whitelist.[Online] . Available: http://en.wikipedia.org/wiki/Whitelist#Email_whitelists
[2] Jaeyeon Jung and Emil Sit, “An Empirical Study of Spam Traffic and the Use of DNS Black Lists,” in Proc. 4th ACM SIGCOMM
Conference on Internet measurement, Oct. 25-27, 2004, pp.370-375.
[3] Wikipedia. 2011. DNSB. [Online] . Available: http://en.wikipedia.org/wiki/DNSBL
[4] Wikipedia. 2011. Content filtering. [Online]. Available: http://en.wikipedia.org/wiki/Content_filtering
[5] E. P. Sanz, J. M. G. Hidalgo and J. C. C. Pérez, “Email Spam Filtering,” in Advances in computers, vol 74, 2008, ch. 3, pp. 45-
114.
[6] M. R. Islam and W. Zhou, “An innovative analyzer for email classification based on grey list analysis,” in Proc. of the IFIP
International Conference on Network and Parallel Computing, Sep.18-21, 2007, pp. 176–182.
[7] Wikipedia. 2011 . Botnet, [Online]. Available: http://en.wikipedia.org/wiki/Botnet
[8] B. Leiba and J. Fento, “DomainKeys Identified mails (DKIM): Using Digital signatures for Domain Verifcation”, in CEAS 2007,
4th Conference on E-mail and Anti-Spam, Aug. 2-3, 2007.
[9] H. Esquivel, Aditya Akella and T. Mori, “On the Effectiveness of IP Reputation for Spam Filtering,” in Proc. 2nd Int. Conference
Commun. Syst. and Networks (COMSNETS), Jan. 5-9, 2010, pp. 1-10.
[10] Wikipedia. 2011 . CAPTCHA. [Online] . Available: http://en.wikipedia.org/wiki/CAPTCHA
[11] Carnegie Mellon University. 2000-2010. The Official CAPTCHA Site. [Online]. Available:
http://www.atm.comhttp://www.captcha.net
[12] A. Obied, 2007. Bayesian Spam Filtering. [Online]. Available: http://ahmed.obied.net/research/papers/spam_paper.pdf
[13] M. Sahami, S. Dumais, D. Heckerman and E. Horvitz, “A Bayesian approach to filtering junk e-mail,” in Proc. AAAI Workshop
on Learning for Text Categorization, 1998, pp. 55-62.
[14] E. Damiani, S. De Capitani di Vimercati, S. Paraboschi and P. Samarati, “P2P-Based Collaborative Spam Detection and
Filtering,” in Proc. 4th Int. Conference on Peer-to-Peer Computing, Aug. 25-27, 2004, pp. 176-183.
[15] Wikipedia. 2011 . MD5. [Online] . Available: http://en.wikipedia.org/wiki/MD5
[16] Wikipedia. 2011 . LAMP. [Online] . Available: http://en.wikipedia.org/wiki/LAMP_(software_bundle)
[17] Wikipedia. 2011. Linux. [Online] . Available: http://en.wikipedia.org/wiki/Linux
[18] Wikipedia. 2011. Apache HTTP Server. [Online]. Available: http://en.wikipedia.org/wiki/Apache_HTTP_Server
[19] Oracle Corporation and/or its affiliates. 2011. MySQL. [Online]. Available: http://www.mysql.com/why-mysql
[20] Wikipedia. 2011 . MySQL. [Online] . Available: http://en.wikipedia.org/wiki/MySQL
[21] The PHP Group. 2001-2011. PHP: Hypertext Preprocessor. [Online]. Available: http://gr.php.net
[22] C. Stewart, 2006. The Advantages of PHP. [Online]. Available: http://www.designersplayground.com/articles/118/1/The-
Advantages-of- PHP/Page1.html
[23] cplucpluc.com. Information on the C++ language. [Online]. Available: http://www.cplusplus.com/info
[24] Oracle. Java. [Online]. Available: http://java.com/en
[25] Python Software Foundation. 1990-2011. Python Programming Language. [Online]. Available: http://www.python.org
[26] Wikipedia. 2011 . Javascript. [Online]. Available: http://en.wikipedia.org/wiki/Javascript
Thank You
Do you still have any question ?

Weitere ähnliche Inhalte

Ähnlich wie Mail Book

2006 bio it web services
2006 bio it web services2006 bio it web services
2006 bio it web servicesChris Dwan
 
Lei_Resume-it.doc
Lei_Resume-it.docLei_Resume-it.doc
Lei_Resume-it.docbutest
 
International collaborative efforts to share threat data in a vetted member c...
International collaborative efforts to share threat data in a vetted member c...International collaborative efforts to share threat data in a vetted member c...
International collaborative efforts to share threat data in a vetted member c...CODE BLUE
 
Building genomic data cyberinfrastructure with the online database software T...
Building genomic data cyberinfrastructure with the online database software T...Building genomic data cyberinfrastructure with the online database software T...
Building genomic data cyberinfrastructure with the online database software T...mestato
 
Ict uses in libraries
Ict uses in librariesIct uses in libraries
Ict uses in librariesLiaquat Rahoo
 
New information service
New information serviceNew information service
New information serviceSaeid Nezareh
 
Impact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and EducationImpact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and EducationMANENDRASINGH30
 
New ICT Trends and Issues of Librarianship
New ICT Trends and Issues of LibrarianshipNew ICT Trends and Issues of Librarianship
New ICT Trends and Issues of LibrarianshipLiaquat Rahoo
 
Software Analytics: Data Analytics for Software Engineering
Software Analytics: Data Analytics for Software EngineeringSoftware Analytics: Data Analytics for Software Engineering
Software Analytics: Data Analytics for Software EngineeringTao Xie
 
Application of Library Management Software: NewGenLib
Application of Library Management Software: NewGenLibApplication of Library Management Software: NewGenLib
Application of Library Management Software: NewGenLibDavid Nzoputa Ofili
 
Model of semantic textual document clustering
Model of semantic textual document clusteringModel of semantic textual document clustering
Model of semantic textual document clusteringSK Ahammad Fahad
 
Presention on Facebook in f Distributed systems
Presention on Facebook in f Distributed systemsPresention on Facebook in f Distributed systems
Presention on Facebook in f Distributed systemsAhmad Yar
 
MS Word version
MS Word versionMS Word version
MS Word versionbutest
 
MS Word version
MS Word versionMS Word version
MS Word versionbutest
 
IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...
IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...
IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...IAEME Publication
 
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...Emmanuel E C
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
Introduction to apache spark and machine learning
Introduction to apache spark and machine learningIntroduction to apache spark and machine learning
Introduction to apache spark and machine learningAwoyemi Ezekiel
 
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010Yahoo Developer Network
 

Ähnlich wie Mail Book (20)

2006 bio it web services
2006 bio it web services2006 bio it web services
2006 bio it web services
 
Lei_Resume-it.doc
Lei_Resume-it.docLei_Resume-it.doc
Lei_Resume-it.doc
 
International collaborative efforts to share threat data in a vetted member c...
International collaborative efforts to share threat data in a vetted member c...International collaborative efforts to share threat data in a vetted member c...
International collaborative efforts to share threat data in a vetted member c...
 
Building genomic data cyberinfrastructure with the online database software T...
Building genomic data cyberinfrastructure with the online database software T...Building genomic data cyberinfrastructure with the online database software T...
Building genomic data cyberinfrastructure with the online database software T...
 
Ict uses in libraries
Ict uses in librariesIct uses in libraries
Ict uses in libraries
 
New information service
New information serviceNew information service
New information service
 
Impact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and EducationImpact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and Education
 
New ICT Trends and Issues of Librarianship
New ICT Trends and Issues of LibrarianshipNew ICT Trends and Issues of Librarianship
New ICT Trends and Issues of Librarianship
 
Digital libraries
Digital librariesDigital libraries
Digital libraries
 
Software Analytics: Data Analytics for Software Engineering
Software Analytics: Data Analytics for Software EngineeringSoftware Analytics: Data Analytics for Software Engineering
Software Analytics: Data Analytics for Software Engineering
 
Application of Library Management Software: NewGenLib
Application of Library Management Software: NewGenLibApplication of Library Management Software: NewGenLib
Application of Library Management Software: NewGenLib
 
Model of semantic textual document clustering
Model of semantic textual document clusteringModel of semantic textual document clustering
Model of semantic textual document clustering
 
Presention on Facebook in f Distributed systems
Presention on Facebook in f Distributed systemsPresention on Facebook in f Distributed systems
Presention on Facebook in f Distributed systems
 
MS Word version
MS Word versionMS Word version
MS Word version
 
MS Word version
MS Word versionMS Word version
MS Word version
 
IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...
IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...
IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...
 
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Introduction to apache spark and machine learning
Introduction to apache spark and machine learningIntroduction to apache spark and machine learning
Introduction to apache spark and machine learning
 
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
 

Kürzlich hochgeladen

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Kürzlich hochgeladen (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Mail Book

  • 1. JSS ACADEMY OF TECHNICAL EDUCATION, BANGALORE (Affiliated to Visveshwaraya Technological University, Belgaum) INFORMATION SCIENCE Department Ashish Sharma 1JS08IS006
  • 2. Technical Seminar on MAILBOOK A Social Network Against Spamming
  • 3. Aim Spam Mail To provide a collaborative spam Legitimate Mail filter over a social network by Spam Mail exchanging vote databases among its users. Legitimate Mail
  • 4. Content 1. Introduction 2. Related work 3. Design and architecture 4. Conclusion 5. References 6. Questions and Answers
  • 5. Introduction Email Spam Spam Filters
  • 6. Mailbook • Users exchange databases with fingerprints of emails identified as spam. • Vote Databases. • Fingerprints are the hash values of the email’s content. • Central Repository. • Email Service.
  • 7. Related Work • White lists. • Black lists. • Grey lists. • Domain key identified mail. • Content based filtering. • Bayesian filtering. • Collaborative filtering.
  • 8. Design and Architecture • Based on social collaboration among trusted users(friends). • Exchange of vote databases.
  • 10. Vote Database Exchange Among Friends
  • 11. Logic Implementation of the logic for database exchange is based on: • Trusted friends. • Profile characteristic. • Group membership.
  • 13. Import And Export Functions Import Export
  • 14. MD-5 Message Digest Algorithm The MD5 Message-Digest Algorithm is a widely used cryptographic hash function that produces a 128-bit (16- byte) hash value.
  • 15. Current Work Linux Apache LAMP MySQL PHP
  • 16. Linux • Operating system • Free and open source • Customizable • Necessary security features • Programming language support
  • 17. Apache HTTP Server • Web Server Software. • Free. • Most Popular.
  • 18. MySQL • Handling Database. • Reliable and easy to use. • Open source and free. • More than 20 platforms.
  • 19. PHP • Scripting language. • Server side technology. • Fast and stable. • Secure and reliable.
  • 20. Conclusion • Addressing the problem of spamming. • A social network to disperse fingerprints. • User Friendly. • Easy email characterization. • Efficient design. • Flexible. • Global Solution.
  • 21. References [1] Wikipedia.2011.Whitelist.[Online] . Available: http://en.wikipedia.org/wiki/Whitelist#Email_whitelists [2] Jaeyeon Jung and Emil Sit, “An Empirical Study of Spam Traffic and the Use of DNS Black Lists,” in Proc. 4th ACM SIGCOMM Conference on Internet measurement, Oct. 25-27, 2004, pp.370-375. [3] Wikipedia. 2011. DNSB. [Online] . Available: http://en.wikipedia.org/wiki/DNSBL [4] Wikipedia. 2011. Content filtering. [Online]. Available: http://en.wikipedia.org/wiki/Content_filtering [5] E. P. Sanz, J. M. G. Hidalgo and J. C. C. Pérez, “Email Spam Filtering,” in Advances in computers, vol 74, 2008, ch. 3, pp. 45- 114. [6] M. R. Islam and W. Zhou, “An innovative analyzer for email classification based on grey list analysis,” in Proc. of the IFIP International Conference on Network and Parallel Computing, Sep.18-21, 2007, pp. 176–182. [7] Wikipedia. 2011 . Botnet, [Online]. Available: http://en.wikipedia.org/wiki/Botnet [8] B. Leiba and J. Fento, “DomainKeys Identified mails (DKIM): Using Digital signatures for Domain Verifcation”, in CEAS 2007, 4th Conference on E-mail and Anti-Spam, Aug. 2-3, 2007. [9] H. Esquivel, Aditya Akella and T. Mori, “On the Effectiveness of IP Reputation for Spam Filtering,” in Proc. 2nd Int. Conference Commun. Syst. and Networks (COMSNETS), Jan. 5-9, 2010, pp. 1-10. [10] Wikipedia. 2011 . CAPTCHA. [Online] . Available: http://en.wikipedia.org/wiki/CAPTCHA [11] Carnegie Mellon University. 2000-2010. The Official CAPTCHA Site. [Online]. Available: http://www.atm.comhttp://www.captcha.net [12] A. Obied, 2007. Bayesian Spam Filtering. [Online]. Available: http://ahmed.obied.net/research/papers/spam_paper.pdf [13] M. Sahami, S. Dumais, D. Heckerman and E. Horvitz, “A Bayesian approach to filtering junk e-mail,” in Proc. AAAI Workshop on Learning for Text Categorization, 1998, pp. 55-62.
  • 22. [14] E. Damiani, S. De Capitani di Vimercati, S. Paraboschi and P. Samarati, “P2P-Based Collaborative Spam Detection and Filtering,” in Proc. 4th Int. Conference on Peer-to-Peer Computing, Aug. 25-27, 2004, pp. 176-183. [15] Wikipedia. 2011 . MD5. [Online] . Available: http://en.wikipedia.org/wiki/MD5 [16] Wikipedia. 2011 . LAMP. [Online] . Available: http://en.wikipedia.org/wiki/LAMP_(software_bundle) [17] Wikipedia. 2011. Linux. [Online] . Available: http://en.wikipedia.org/wiki/Linux [18] Wikipedia. 2011. Apache HTTP Server. [Online]. Available: http://en.wikipedia.org/wiki/Apache_HTTP_Server [19] Oracle Corporation and/or its affiliates. 2011. MySQL. [Online]. Available: http://www.mysql.com/why-mysql [20] Wikipedia. 2011 . MySQL. [Online] . Available: http://en.wikipedia.org/wiki/MySQL [21] The PHP Group. 2001-2011. PHP: Hypertext Preprocessor. [Online]. Available: http://gr.php.net [22] C. Stewart, 2006. The Advantages of PHP. [Online]. Available: http://www.designersplayground.com/articles/118/1/The- Advantages-of- PHP/Page1.html [23] cplucpluc.com. Information on the C++ language. [Online]. Available: http://www.cplusplus.com/info [24] Oracle. Java. [Online]. Available: http://java.com/en [25] Python Software Foundation. 1990-2011. Python Programming Language. [Online]. Available: http://www.python.org [26] Wikipedia. 2011 . Javascript. [Online]. Available: http://en.wikipedia.org/wiki/Javascript
  • 24. Do you still have any question ?