SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Introduction
In today’s world electronic mail (or
popularly known as e-mail) is a very
powerful medium for transferring messages
to other users.
Like every powerful medium it is prone to
be misused.
One such case of misuse is the posting of
unsolicited emails known as spam.
 Too noisy Inbox.
Misleading information
distribution.
 Virus spreading programs
and Mails
Wastage of allocated
memory space for Inbox.
Spam filtering comes in two
forms
Server side filtering
Client side filtering
The filtering occurs on the server
before the emails are seen.
User filters that are created by
the email client, redirects emails
that are 'marked as Spam’ to a
specific 'Spam' folder
 Recognizing the words that are likely to appear as spam.
 universal virus definitions.
 universal block list of IP addresses(UBL).
Client side filtering
 Checking the mails against Subject and from Email ID specified
by the user.
 Checking the mails against the size limit of the mail specified by
the User.
Reporting a message as “spam” by the user.

Architecture
Admin: This module deals with the management of the application by a
person called Administrator who is responsible for taking all the mails coming to
the people working in the organization, and invoking the filtering mechanism
can also specify UBL IP addresses and Universal Virus definitions in order to
protect the systems from attack.
User:
This module deals with user processing. In this module user can
specify what he doesn’t want.
Filtering:
This module deals with the major task of Mail Filter
Spam filtering mechanism in gmail
How messages are marked as Spam in
Gmail???
Gmail has an automated system that helps detect
spam by identifying viruses and suspicious
messages and learning
from what Gmail users like
us commonly
mark as spam.
why that a particular message in
GMAIL is placed in Spam?
Phishing scams
Messages from an unconfirmed sender.
Message content is empty
Messages you sent to Spam
Administrator-set policies
Messages from an
unconfirmed sender
Spammers can forge a message to make it
look like it's sent by a real website or
company that you might trust. To help
protect you from such messages, Google
tries to verify the real sender using email
authentication
 Messages you sent to Spam
You previously marked these messages as spam by clicking
the "Report spam" or "Report phishing" button
 Administrator-set policies
If your organization uses Gmail, the administrator within
your group can decide what messages will be marked as spam.
Increased productivity
Personalized filter.
Phishing scam protection
White listing capabilities.
Users who receive a low volume of email will have to wait
longer to establish an adequate database.
Word based filters and list based filters have lots of
disadvantages
Disadvantages
 Email filter is used to inspect outgoing email at some
companies to ensure that employees comply with
appropriate laws.
 Malware can comprise a user's sensitive private data
by capturing bank account information, usernames
and passwords. Spam blocker applications can assist a
user in preventing these types of PC contaminations.
Web mail filter is a mechanism for classifying
message as either spam or non-spam.
Its reduces the overhead for the users by filtering
out unwanted or uninvited messages in the inbox.
It provides security for your mailbox by filtering
out contaminated messages.
Based on the future security issues, security can be
improved using emerging technologies.
 A survey on spam
filtering:www.scirp.org/journal/PaperInformation.aspx
 en.wikipedia.org/wiki/Anti-spam_techniques
 Defeating spam:www.techtarget.com
 Email Spam Filtering:Gordon V. Cormack
 www.howstuffworks.com
 www.ieee.org/documents/ieeecitationref.pdf
Seminar   on   web mail filter

Weitere Àhnliche Inhalte

Was ist angesagt?

Detecting disposable email addresses
Detecting disposable email addressesDetecting disposable email addresses
Detecting disposable email addressesunRFP
 
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...Manjunatha Kg
 
Serv Quest Cleantelligent
Serv Quest CleantelligentServ Quest Cleantelligent
Serv Quest Cleantelligentarthagopian
 
Email List Verification Process Explained
Email List Verification Process ExplainedEmail List Verification Process Explained
Email List Verification Process ExplainedeHygienics
 
1and1Mail Advanced Features - Auto Remove Bounced and Unsubscribed
 1and1Mail Advanced Features - Auto Remove Bounced and Unsubscribed 1and1Mail Advanced Features - Auto Remove Bounced and Unsubscribed
1and1Mail Advanced Features - Auto Remove Bounced and UnsubscribedYeteSoft
 
1and1Mail Advanced Features - Auto IP Switcher
1and1Mail Advanced Features - Auto IP Switcher1and1Mail Advanced Features - Auto IP Switcher
1and1Mail Advanced Features - Auto IP SwitcherYeteSoft
 
1and1Mail Quickstart Guide - View Reports
1and1Mail Quickstart Guide - View Reports1and1Mail Quickstart Guide - View Reports
1and1Mail Quickstart Guide - View ReportsYeteSoft
 
Email Validation for Improved Deliverability and Marketing Results
Email Validation for Improved Deliverability and Marketing ResultsEmail Validation for Improved Deliverability and Marketing Results
Email Validation for Improved Deliverability and Marketing ResultsScott Valentine, MBA, CSPO
 
higi Salesforce integration demo
higi Salesforce integration demohigi Salesforce integration demo
higi Salesforce integration demodrkhan
 

Was ist angesagt? (9)

Detecting disposable email addresses
Detecting disposable email addressesDetecting disposable email addresses
Detecting disposable email addresses
 
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
Email Delivery Optimization Techniques from Email Marketing Solutions Provide...
 
Serv Quest Cleantelligent
Serv Quest CleantelligentServ Quest Cleantelligent
Serv Quest Cleantelligent
 
Email List Verification Process Explained
Email List Verification Process ExplainedEmail List Verification Process Explained
Email List Verification Process Explained
 
1and1Mail Advanced Features - Auto Remove Bounced and Unsubscribed
 1and1Mail Advanced Features - Auto Remove Bounced and Unsubscribed 1and1Mail Advanced Features - Auto Remove Bounced and Unsubscribed
1and1Mail Advanced Features - Auto Remove Bounced and Unsubscribed
 
1and1Mail Advanced Features - Auto IP Switcher
1and1Mail Advanced Features - Auto IP Switcher1and1Mail Advanced Features - Auto IP Switcher
1and1Mail Advanced Features - Auto IP Switcher
 
1and1Mail Quickstart Guide - View Reports
1and1Mail Quickstart Guide - View Reports1and1Mail Quickstart Guide - View Reports
1and1Mail Quickstart Guide - View Reports
 
Email Validation for Improved Deliverability and Marketing Results
Email Validation for Improved Deliverability and Marketing ResultsEmail Validation for Improved Deliverability and Marketing Results
Email Validation for Improved Deliverability and Marketing Results
 
higi Salesforce integration demo
higi Salesforce integration demohigi Salesforce integration demo
higi Salesforce integration demo
 

Ähnlich wie Seminar on web mail filter

Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refinedWan Solo
 
SPAM FILTERS
SPAM FILTERSSPAM FILTERS
SPAM FILTERSBismaSajjad9
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentationWan Solo
 
Spam Filtering
Spam FilteringSpam Filtering
Spam FilteringUmar Alharaky
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxPatricia Rountree
 
B2B Email Deliverability Whitepaper
B2B Email Deliverability WhitepaperB2B Email Deliverability Whitepaper
B2B Email Deliverability WhitepaperB2B Email Experts
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptxAbdulHaseebKhan34
 
Glossary of important email marketing terms
Glossary of important email marketing termsGlossary of important email marketing terms
Glossary of important email marketing termsInamDurrani2
 
Email Deliverability Guide For 2013
Email Deliverability Guide For 2013Email Deliverability Guide For 2013
Email Deliverability Guide For 2013Learnhomebusiness.com
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fvcactussky
 
Network paperthesis1
Network paperthesis1Network paperthesis1
Network paperthesis1Dhara Shah
 
NetworkPaperthesis1
NetworkPaperthesis1NetworkPaperthesis1
NetworkPaperthesis1Dhara Shah
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filteringChippy Thomas
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharyasankhadeep
 
Email deliverability
Email deliverabilityEmail deliverability
Email deliverabilityAnton Panaitesco
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkGFI Software
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniquesranjit banshpal
 
Maximizing Email Deliverability - Accurate List Inc
Maximizing Email Deliverability - Accurate List IncMaximizing Email Deliverability - Accurate List Inc
Maximizing Email Deliverability - Accurate List IncJoan Ginther
 
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERSAN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERSijsrd.com
 

Ähnlich wie Seminar on web mail filter (20)

Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
 
SPAM FILTERS
SPAM FILTERSSPAM FILTERS
SPAM FILTERS
 
Cyber security and emails presentation
Cyber security and emails presentationCyber security and emails presentation
Cyber security and emails presentation
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
Email campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docxEmail campaigns are the lifeblood of most industries.docx
Email campaigns are the lifeblood of most industries.docx
 
B2B Email Deliverability Whitepaper
B2B Email Deliverability WhitepaperB2B Email Deliverability Whitepaper
B2B Email Deliverability Whitepaper
 
Presentation on Email phishing.pptx
Presentation on Email phishing.pptxPresentation on Email phishing.pptx
Presentation on Email phishing.pptx
 
Glossary of important email marketing terms
Glossary of important email marketing termsGlossary of important email marketing terms
Glossary of important email marketing terms
 
Email Deliverability Guide For 2013
Email Deliverability Guide For 2013Email Deliverability Guide For 2013
Email Deliverability Guide For 2013
 
2010 Spam Filtered World Fv
2010 Spam Filtered World Fv2010 Spam Filtered World Fv
2010 Spam Filtered World Fv
 
Network paperthesis1
Network paperthesis1Network paperthesis1
Network paperthesis1
 
NetworkPaperthesis1
NetworkPaperthesis1NetworkPaperthesis1
NetworkPaperthesis1
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharya
 
DEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERING
DEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERINGDEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERING
DEVELOPMENT OF AN EFFECTIVE BAYESIAN APPROACH FOR SPAM FILTERING
 
Email deliverability
Email deliverabilityEmail deliverability
Email deliverability
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your Network
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniques
 
Maximizing Email Deliverability - Accurate List Inc
Maximizing Email Deliverability - Accurate List IncMaximizing Email Deliverability - Accurate List Inc
Maximizing Email Deliverability - Accurate List Inc
 
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERSAN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
 

KĂŒrzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Christopher Logan Kennedy
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 

KĂŒrzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Seminar on web mail filter

  • 1.
  • 2. Introduction In today’s world electronic mail (or popularly known as e-mail) is a very powerful medium for transferring messages to other users. Like every powerful medium it is prone to be misused. One such case of misuse is the posting of unsolicited emails known as spam.
  • 3.  Too noisy Inbox. Misleading information distribution.  Virus spreading programs and Mails Wastage of allocated memory space for Inbox.
  • 4.
  • 5. Spam filtering comes in two forms Server side filtering Client side filtering The filtering occurs on the server before the emails are seen. User filters that are created by the email client, redirects emails that are 'marked as Spam’ to a specific 'Spam' folder
  • 6.  Recognizing the words that are likely to appear as spam.  universal virus definitions.  universal block list of IP addresses(UBL). Client side filtering  Checking the mails against Subject and from Email ID specified by the user.  Checking the mails against the size limit of the mail specified by the User. Reporting a message as “spam” by the user. 
  • 8. Admin: This module deals with the management of the application by a person called Administrator who is responsible for taking all the mails coming to the people working in the organization, and invoking the filtering mechanism can also specify UBL IP addresses and Universal Virus definitions in order to protect the systems from attack. User: This module deals with user processing. In this module user can specify what he doesn’t want. Filtering: This module deals with the major task of Mail Filter
  • 9. Spam filtering mechanism in gmail How messages are marked as Spam in Gmail??? Gmail has an automated system that helps detect spam by identifying viruses and suspicious messages and learning from what Gmail users like us commonly mark as spam.
  • 10. why that a particular message in GMAIL is placed in Spam? Phishing scams Messages from an unconfirmed sender. Message content is empty Messages you sent to Spam Administrator-set policies
  • 11. Messages from an unconfirmed sender Spammers can forge a message to make it look like it's sent by a real website or company that you might trust. To help protect you from such messages, Google tries to verify the real sender using email authentication
  • 12.  Messages you sent to Spam You previously marked these messages as spam by clicking the "Report spam" or "Report phishing" button  Administrator-set policies If your organization uses Gmail, the administrator within your group can decide what messages will be marked as spam.
  • 13. Increased productivity Personalized filter. Phishing scam protection White listing capabilities. Users who receive a low volume of email will have to wait longer to establish an adequate database. Word based filters and list based filters have lots of disadvantages Disadvantages
  • 14.  Email filter is used to inspect outgoing email at some companies to ensure that employees comply with appropriate laws.  Malware can comprise a user's sensitive private data by capturing bank account information, usernames and passwords. Spam blocker applications can assist a user in preventing these types of PC contaminations.
  • 15. Web mail filter is a mechanism for classifying message as either spam or non-spam. Its reduces the overhead for the users by filtering out unwanted or uninvited messages in the inbox. It provides security for your mailbox by filtering out contaminated messages. Based on the future security issues, security can be improved using emerging technologies.
  • 16.  A survey on spam filtering:www.scirp.org/journal/PaperInformation.aspx  en.wikipedia.org/wiki/Anti-spam_techniques  Defeating spam:www.techtarget.com  Email Spam Filtering:Gordon V. Cormack  www.howstuffworks.com  www.ieee.org/documents/ieeecitationref.pdf