SlideShare a Scribd company logo
Presentation By, Nazneen Shaikh Spamming And Spam Filtering
Introduction SPAM-Problem Statement Methodology of Spamming Implementation of Spam Mail Sender Spam Filtering Techniques Conclusion Prologue
SPAM Companies that bulked-mailed unsolicited advertising material routinely referred to it as " SPAM " - their acronym for " S ales  P romotion  A nd  M arketing Introduction
Problem Statement The  bandwidth  of long-distance communications links. The  time  of network administrators who keep the Internet working from day to day Spam   messages   waste   the   Internet's   two   most   precious   resources :
Methodology   of   Spamming There are two ways  spam email  is generally  sent  on the internet.   From an individual's email account with their ISP  Via an open relay mail server
Implementation Simple SPAM mail sender Program in HTML
Enable POP in Gmail
Configure MS Outlook Express 07
 
Spam Filtering Methods List-Based Filters Blacklist Real-Time Blackhole List Whitelist Greylist Content-Based Filters Word-Based Filters Heuristic Filters Bayesian Filters Other Filtering Methods Challenge/Response System DNS Lookup Systems Collaborative Filters
Google alert
Google Alerts  in ‘Spam’ folder!  
A Google Alert SPAM!!
Conclusion This Seminar provides a brief description of Spamming and Anti-spamming Methods.  And an implementation of a  simple spam mail sender program  using HTML with the (SMTP & POP) protocol support from Gmail and Microsoft Outlook Express ‘07.  Various types of spam filters incorporated by ISPs and other mailing service providers are discussed as a remedy.
On the Effectiveness of IP Reputation for Spam Filtering-  Holly Esquivel and Aditya Akella, University of Wisconsin-Madison, Tatsuya Mori, NTT Service Integration Laboratories   How To Minimize The Effects Of Spam- By Debbie Wilde,  Tech Support Alert, http://www.techsupportalert.com Stopping Spam, Stamping Out Unwanted Email and News Postings-,  By Alan Schwartz & Simson Garfinkel 1st Edition October 1998. References
Spamming And Spam Filtering  Presentation By, Nazneen Shaikh  Regards , Nazneen

More Related Content

What's hot (20)

PPTX
PPT on Phishing
Pankaj Yadav
 
PPTX
Sms spam classification
AnishaAgarwal41
 
PPT
E Mail & Spam Presentation
newsan2001
 
DOCX
Final Report(SuddhasatwaSatpathy)
SkyBits Technologies Pvt. Ltd.
 
PPTX
Spamming
Yash Shrivastava
 
PPTX
Sms spam-detection
Tanvirul Islam
 
PPTX
Email spam detection
PratisthaSingh5
 
PPTX
Phishing Detection using Machine Learning
Arjun BM
 
PPT
E Mail
MrsMoss
 
PPTX
Spoofing Techniques
Raza_Abidi
 
PPTX
Web crawler
poonamkenkre
 
PDF
VULNERABILITY ( CYBER SECURITY )
Kashyap Mandaliya
 
PPTX
Presentation-Detecting Spammers on Social Networks
Ashish Arora
 
PPTX
Phishing
SouganthikaSankaresw
 
PPT
Phishing
anjalika sinha
 
PPTX
Phishing Scams: 8 Helpful Tips to Keep You Safe
CheapSSLsecurity
 
PPTX
Detection of phishing websites
m srikanth
 
PPTX
Final spam-e-mail-detection
Partnered Health
 
PPSX
Brute force attack
Jamil Ali Ahmed
 
PPT on Phishing
Pankaj Yadav
 
Sms spam classification
AnishaAgarwal41
 
E Mail & Spam Presentation
newsan2001
 
Final Report(SuddhasatwaSatpathy)
SkyBits Technologies Pvt. Ltd.
 
Sms spam-detection
Tanvirul Islam
 
Email spam detection
PratisthaSingh5
 
Phishing Detection using Machine Learning
Arjun BM
 
E Mail
MrsMoss
 
Spoofing Techniques
Raza_Abidi
 
Web crawler
poonamkenkre
 
VULNERABILITY ( CYBER SECURITY )
Kashyap Mandaliya
 
Presentation-Detecting Spammers on Social Networks
Ashish Arora
 
Phishing
anjalika sinha
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
CheapSSLsecurity
 
Detection of phishing websites
m srikanth
 
Final spam-e-mail-detection
Partnered Health
 
Brute force attack
Jamil Ali Ahmed
 

Viewers also liked (6)

PPT
Spam and Anti Spam Techniques
Mạnh Nguyễn Văn
 
PPT
What is SPAM?
Yavuz Adabalı
 
PPT
Phishing
Alka Falwaria
 
PDF
10 tips to promote your content without spamming people
Mark Schaefer
 
PPT
Spamming Ict
siewying
 
Spam and Anti Spam Techniques
Mạnh Nguyễn Văn
 
What is SPAM?
Yavuz Adabalı
 
Phishing
Alka Falwaria
 
10 tips to promote your content without spamming people
Mark Schaefer
 
Spamming Ict
siewying
 
Ad

Similar to Spamming and Spam Filtering (20)

PDF
402 406
Editor IJARCET
 
PDF
A multi layer architecture for spam-detection system
csandit
 
PDF
A multi layer architecture for spam-detection system
csandit
 
PPTX
CNS ANTI SPAM TECHNIQUES.pptx
SanjuSanjay40
 
DOC
Survey on spam filtering
Chippy Thomas
 
PDF
Overview of Anti-spam filtering Techniques
IRJET Journal
 
PDF
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...
IJNSA Journal
 
PDF
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
PDF
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
PDF
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
PDF
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
PPTX
Modern Anti-Spam - Rejection, No Sorting (Version 2014)
Thomas Stensitzki
 
PDF
Analysis of an image spam in email based on content analysis
ijnlc
 
PDF
Jt3616901697
IJERA Editor
 
PDF
Identification of Spam Emails from Valid Emails by Using Voting
Editor IJCATR
 
PDF
A review of spam filtering and measures of antispam
Alexander Decker
 
PDF
Commtouch outbound-anti spam-webinar-201312-final
Cyren, Inc
 
PDF
ACO-email spam filtering
Sukhvir Singh Lal
 
DOC
E spam
zelkan19
 
DOC
E spam
zelkan19
 
A multi layer architecture for spam-detection system
csandit
 
A multi layer architecture for spam-detection system
csandit
 
CNS ANTI SPAM TECHNIQUES.pptx
SanjuSanjay40
 
Survey on spam filtering
Chippy Thomas
 
Overview of Anti-spam filtering Techniques
IRJET Journal
 
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...
IJNSA Journal
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
Modern Anti-Spam - Rejection, No Sorting (Version 2014)
Thomas Stensitzki
 
Analysis of an image spam in email based on content analysis
ijnlc
 
Jt3616901697
IJERA Editor
 
Identification of Spam Emails from Valid Emails by Using Voting
Editor IJCATR
 
A review of spam filtering and measures of antispam
Alexander Decker
 
Commtouch outbound-anti spam-webinar-201312-final
Cyren, Inc
 
ACO-email spam filtering
Sukhvir Singh Lal
 
E spam
zelkan19
 
E spam
zelkan19
 
Ad

Recently uploaded (20)

PDF
Women in Automation Presents: Reinventing Yourself — Bold Career Pivots That ...
DianaGray10
 
PDF
GITLAB-CICD_For_Professionals_KodeKloud.pdf
deepaktyagi0048
 
PPTX
Darren Mills The Migration Modernization Balancing Act: Navigating Risks and...
AWS Chicago
 
PDF
Novus Safe Lite- What is Novus Safe Lite.pdf
Novus Hi-Tech
 
PDF
How a Code Plagiarism Checker Protects Originality in Programming
Code Quiry
 
PPTX
Machine Learning Benefits Across Industries
SynapseIndia
 
PDF
Meetup Kickoff & Welcome - Rohit Yadav, CSIUG Chairman
ShapeBlue
 
PDF
UiPath vs Other Automation Tools Meeting Presentation.pdf
Tracy Dixon
 
PPTX
Simplifying End-to-End Apache CloudStack Deployment with a Web-Based Automati...
ShapeBlue
 
PDF
OpenInfra ID 2025 - Are Containers Dying? Rethinking Isolation with MicroVMs.pdf
Muhammad Yuga Nugraha
 
PPT
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
PPTX
Top Managed Service Providers in Los Angeles
Captain IT
 
PPTX
Building and Operating a Private Cloud with CloudStack and LINBIT CloudStack ...
ShapeBlue
 
PDF
Bitcoin+ Escalando sin concesiones - Parte 1
Fernando Paredes García
 
PDF
The Past, Present & Future of Kenya's Digital Transformation
Moses Kemibaro
 
DOCX
TLE9 COOKERY DLL WEEK3 technology and li
jamierha cabaero
 
PDF
Upgrading to z_OS V2R4 Part 01 of 02.pdf
Flavio787771
 
PPTX
Extensions Framework (XaaS) - Enabling Orchestrate Anything
ShapeBlue
 
PDF
Novus-Safe Pro: Brochure-What is Novus Safe Pro?.pdf
Novus Hi-Tech
 
PPTX
Earn Agentblazer Status with Slack Community Patna.pptx
SanjeetMishra29
 
Women in Automation Presents: Reinventing Yourself — Bold Career Pivots That ...
DianaGray10
 
GITLAB-CICD_For_Professionals_KodeKloud.pdf
deepaktyagi0048
 
Darren Mills The Migration Modernization Balancing Act: Navigating Risks and...
AWS Chicago
 
Novus Safe Lite- What is Novus Safe Lite.pdf
Novus Hi-Tech
 
How a Code Plagiarism Checker Protects Originality in Programming
Code Quiry
 
Machine Learning Benefits Across Industries
SynapseIndia
 
Meetup Kickoff & Welcome - Rohit Yadav, CSIUG Chairman
ShapeBlue
 
UiPath vs Other Automation Tools Meeting Presentation.pdf
Tracy Dixon
 
Simplifying End-to-End Apache CloudStack Deployment with a Web-Based Automati...
ShapeBlue
 
OpenInfra ID 2025 - Are Containers Dying? Rethinking Isolation with MicroVMs.pdf
Muhammad Yuga Nugraha
 
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
Top Managed Service Providers in Los Angeles
Captain IT
 
Building and Operating a Private Cloud with CloudStack and LINBIT CloudStack ...
ShapeBlue
 
Bitcoin+ Escalando sin concesiones - Parte 1
Fernando Paredes García
 
The Past, Present & Future of Kenya's Digital Transformation
Moses Kemibaro
 
TLE9 COOKERY DLL WEEK3 technology and li
jamierha cabaero
 
Upgrading to z_OS V2R4 Part 01 of 02.pdf
Flavio787771
 
Extensions Framework (XaaS) - Enabling Orchestrate Anything
ShapeBlue
 
Novus-Safe Pro: Brochure-What is Novus Safe Pro?.pdf
Novus Hi-Tech
 
Earn Agentblazer Status with Slack Community Patna.pptx
SanjeetMishra29
 

Spamming and Spam Filtering

  • 1. Presentation By, Nazneen Shaikh Spamming And Spam Filtering
  • 2. Introduction SPAM-Problem Statement Methodology of Spamming Implementation of Spam Mail Sender Spam Filtering Techniques Conclusion Prologue
  • 3. SPAM Companies that bulked-mailed unsolicited advertising material routinely referred to it as " SPAM " - their acronym for " S ales P romotion A nd M arketing Introduction
  • 4. Problem Statement The bandwidth of long-distance communications links. The time of network administrators who keep the Internet working from day to day Spam messages waste the Internet's two most precious resources :
  • 5. Methodology of Spamming There are two ways spam email is generally sent on the internet.   From an individual's email account with their ISP Via an open relay mail server
  • 6. Implementation Simple SPAM mail sender Program in HTML
  • 8. Configure MS Outlook Express 07
  • 9.  
  • 10. Spam Filtering Methods List-Based Filters Blacklist Real-Time Blackhole List Whitelist Greylist Content-Based Filters Word-Based Filters Heuristic Filters Bayesian Filters Other Filtering Methods Challenge/Response System DNS Lookup Systems Collaborative Filters
  • 12. Google Alerts in ‘Spam’ folder! 
  • 13. A Google Alert SPAM!!
  • 14. Conclusion This Seminar provides a brief description of Spamming and Anti-spamming Methods. And an implementation of a simple spam mail sender program using HTML with the (SMTP & POP) protocol support from Gmail and Microsoft Outlook Express ‘07. Various types of spam filters incorporated by ISPs and other mailing service providers are discussed as a remedy.
  • 15. On the Effectiveness of IP Reputation for Spam Filtering- Holly Esquivel and Aditya Akella, University of Wisconsin-Madison, Tatsuya Mori, NTT Service Integration Laboratories   How To Minimize The Effects Of Spam- By Debbie Wilde, Tech Support Alert, http://www.techsupportalert.com Stopping Spam, Stamping Out Unwanted Email and News Postings-, By Alan Schwartz & Simson Garfinkel 1st Edition October 1998. References
  • 16. Spamming And Spam Filtering Presentation By, Nazneen Shaikh  Regards , Nazneen