CSC 379:Week 1, Group 4

From Expertiza_Wiki
Revision as of 01:00, 7 July 2007 by Naprinci (talk | contribs) (added example rating system code)
Jump to navigation Jump to search

Internal Use Only

Group members: Nick Principe / naprinci@gmail.com / AIM: mahoubaka

huge paper on this subject

Example rating system
         

Spam Prevention Techniques

Comparison of Techniques

Technique Name Pros Cons Our Rating
Block domains of "known" spammers
  • Gets rid of a large amount of spam
  • Low chance of blocking legitimate email (sbl-faq)
    • Mechanism to allow legitimate sources to know they were blocked (sbl-faq)
  • Lots of spam still gets through (put in percent from sbl/sbl-faq)
x stars!
require users to request permission to send you e-mail (eg Earthlink spam blocker)
  • Robots cannot easily send spam
  • False identity doesn't work
  • Emergency emails don't send quickly
  • Time consuming to send short notes
  • Impossible to implement correctly
4
Charge for e-mail sent
  • Forces targeted selection
  • Defeats the purpose of email
  • Where does the money go?
4
opt-in for commercial email
  • Companies can send advertisements without sending spam
  • Users can freely restrict the influx of mail from their many online affiliations
  • There are many fraudulent emails in which the opt-out link sends you to an unwanted web page.
4
domain authentication
  • Very little spam gets through
  • Lots of false positives
  • Could be very difficult for mail servers to initiate contact (certificate negotation crap (see SSH/SSL))
  • Lots of infrastructure and therefore money involved for something as simple as a mail server
  • Hard for independents/individuals to set up their own mail server
4
bounties
  • Gets rid of big spammers with incentive
  • Possible deterrent
  • Costs government (tax-payers) money
4
The "goodmail" approach
  • Mass emails cost money so mass spammers don't work
  • Companies can bypass the spam filter by paying money
4
Bonds with escrow agencies pro con 4
client-side filtering pro
  • Only as good as user or algorithms/heuristics at identifying spam
4

Technique Details

Block domains of "known" spammers

  • Summary point 1
  • Summary point 2
  • Link 1

Require users to request permission to send mail

Charge for email sent