CSC 379:Week 1, Group 4: Difference between revisions
Jump to navigation
Jump to search
(→Internal Use Only: Modified the example rating system code) |
(→Comparison of Techniques: Added rating system code) |
||
Line 54: | Line 54: | ||
| | | | ||
*Lots of spam still gets through (put in percent from sbl/sbl-faq) | *Lots of spam still gets through (put in percent from sbl/sbl-faq) | ||
| | | | ||
{| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | |||
|- | |||
| style="background:#00ff00;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
|} | |||
|- | |- | ||
|require users to request permission to send you e-mail (eg Earthlink spam blocker) | |require users to request permission to send you e-mail (eg Earthlink spam blocker) | ||
Line 64: | Line 72: | ||
*Time consuming to send short notes | *Time consuming to send short notes | ||
*Impossible to implement correctly | *Impossible to implement correctly | ||
| | | | ||
{| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | |||
|- | |||
| style="background:#00ff00;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
|} | |||
|- | |- | ||
|Charge for e-mail sent | |Charge for e-mail sent | ||
Line 72: | Line 88: | ||
*Defeats the purpose of email | *Defeats the purpose of email | ||
*Where does the money go? | *Where does the money go? | ||
| | | | ||
{| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | |||
|- | |||
| style="background:#00ff00;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
|} | |||
|- | |- | ||
|opt-in for commercial email | |opt-in for commercial email | ||
Line 80: | Line 104: | ||
| | | | ||
*There are many fraudulent emails in which the opt-out link sends you to an unwanted web page. | *There are many fraudulent emails in which the opt-out link sends you to an unwanted web page. | ||
| | | | ||
{| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | |||
|- | |||
| style="background:#00ff00;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
|} | |||
|- | |- | ||
|domain authentication | |domain authentication | ||
Line 90: | Line 122: | ||
*Lots of infrastructure and therefore money involved for something as simple as a mail server | *Lots of infrastructure and therefore money involved for something as simple as a mail server | ||
*Hard for independents/individuals to set up their own mail server | *Hard for independents/individuals to set up their own mail server | ||
| | | | ||
{| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | |||
|- | |||
| style="background:#00ff00;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
|} | |||
|- | |- | ||
|bounties | |bounties | ||
Line 98: | Line 138: | ||
| | | | ||
*Costs government (tax-payers) money | *Costs government (tax-payers) money | ||
| | | | ||
{| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | |||
|- | |||
| style="background:#00ff00;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
|} | |||
|- | |- | ||
|The "goodmail" approach | |The "goodmail" approach | ||
Line 105: | Line 153: | ||
| | | | ||
*Companies can bypass the spam filter by paying money | *Companies can bypass the spam filter by paying money | ||
| | | | ||
{| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | |||
|- | |||
| style="background:#00ff00;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
|} | |||
|- | |- | ||
|Bonds with escrow agencies | |Bonds with escrow agencies | ||
|pro | |pro | ||
|con | |con | ||
| | | | ||
{| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | |||
|- | |||
| style="background:#00ff00;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
|} | |||
|- | |- | ||
|client-side filtering | |client-side filtering | ||
Line 116: | Line 180: | ||
| | | | ||
*Only as good as user or algorithms/heuristics at identifying spam | *Only as good as user or algorithms/heuristics at identifying spam | ||
| | | | ||
{| border="1" cellpadding="1" cellspacing="0" style="border:1px solid white" | |||
|- | |||
| style="background:#00ff00;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
| style="background:#cccccc;border:1px solid white" width=2px | | |||
|} | |||
|} | |} | ||
Revision as of 01:07, 7 July 2007
Internal Use Only
Group members: Nick Principe / naprinci@gmail.com / AIM: mahoubaka
- block domains or even top-level domains "known" to be large senders of spam
- Spamhaus Block List
- see faq also
- Spamhaus Block List
- require users to request permission to send you e-mail (eg Earthlink spam blocker)
- Charge for e-mail sent
- opt-in for commercial email
- domain authentication
- bounties
- the "goodmail" approach
- bond with escrow agencies
- client-side filtering
Spam Prevention Techniques
Comparison of Techniques
Technique Name | Pros | Cons | Our Rating | |||||
---|---|---|---|---|---|---|---|---|
Block domains of "known" spammers |
|
|
| |||||
require users to request permission to send you e-mail (eg Earthlink spam blocker) |
|
|
| |||||
Charge for e-mail sent |
|
|
| |||||
opt-in for commercial email |
|
|
| |||||
domain authentication |
|
|
| |||||
bounties |
|
|
| |||||
The "goodmail" approach |
|
|
| |||||
Bonds with escrow agencies | pro | con |
| |||||
client-side filtering | pro |
|
|
Technique Details
Block domains of "known" spammers
- Summary point 1
- Summary point 2
- Link 1