Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. The old ways of blocking the bad guys just don't work anymore.
Examining spam and spam-blocking technology can illuminate how this evolution is taking place and what can be done to combat spam and reclaim e-mail as the efficient, effective communication tool it was intended to be.
Heuristics (Rule-based Filtering)
One method used to combat spam is Rule-based, or Heuristic Filtering. Rule-based filters scan email content for predetermined words or phrases that may indicate a message is spam. For example, if an email administrator includes the word "sex" on a company's rule-based list, any email containing this word will be filtered.
The major drawback of this approach is the difficulty in identifying keywords that are consistently indicative of spam. While spammers may frequently use the words "sex" and 'Viagra" in spam emails, these words are also used in legitimate business correspondence, particularly in the healthcare industry. Additionally, spammers have learned to obfuscate suspect words by using spellings such as "S*E*X", or "VI a a GRR A".
It is impossible to develop dictionaries that identify every possible misspelling of "spammy" keywords. Additionally, because filtering for certain keywords produces large numbers of false positives, many organizations have found they cannot afford to rely solely on rule-based filters to identify spam.
Signature-Based Spam Filters
Another method used to combat spam is Signature-based Filtering. Signature-based filters examine the contents of known spam, usually derived from honey pots, or dummy email addresses set up specifically to collect spam. Once a honey pot receives a spam message, the content is examined and given a unique identifier. The unique identifier is obtained by assigning a value to each character in the email. Once all characters have been assigned a value, the values are totaled, creating the spam's signature. The signature is added to a signature database and sent as a regular update to the email service's subscribers. The signature is compared to every email coming in to the network and all matching messages are discarded as spam.
The benefit of signature-based filters is that they rarely produce false-positives, or legitimate email incorrectly identified as spam. The drawback of signature-based filters is that they are very easy to defeat. Because they are backward-looking, they only deal with spam that has already been sent. By the time the honey pot receives a spam message, the system assigns a signature, and the update is sent and installed on the subscribers' network, the spammer has already sent millions of emails. A slight modification of the email message will render the existing signature useless.
Furthermore, spammers can easily evade signature-based filters by using special email software that adds random strings of content to the subject line and body of the email. Because the variable content alters the signature of each email sent by the spammer, signature-based spam filters are unable to match the email to known pieces of spam.
Developers of signature-based spam filters have learned to identify the tell-tale signs of automated random character generation. But as is often the case, spammers remain a step ahead and have developed more sophisticated methods for inserting random content. As a result, most spam continues to fool signature-based filters.
The Solution
When used individually, each anti-spam technique has been systematically overcome by spammers. Grandiose plans to rid the world of spam, such as charging a penny for each e-mail received or forcing servers to solve mathematical problems before delivering e-mail, have been proposed with few results. These schemes are not realistic and would require a large percentage of the population to adopt the same anti-spam method in order to be effective. You can learn more about the fight against spam by visiting our website at www.ciphertrust.com and downloading our whitepapers.
Dr. Paul Judge is a noted scholar and entrepreneur. He is Chief Technology Officer at CipherTrust, the industry's largest provider of enterprise email security. The company's flagship product, IronMail provides a best of breed enterprise anti spam solution designed to stop spam, phishing attacks and other email-based threats. Learn more by visiting http://www.ciphertrust.com/prod ucts/spam_and_fraud_protection today.
![]() |
|
![]() |
|
![]() |
|
![]() |
Stop intrusive pop-up ads and regain control of your online... Read More
You're not alone!Who hasn't surfed the web looking for information... Read More
We've all become familiar with the term spam. It's become... Read More
This review is taken DIRECTLY from a piece of "junk... Read More
Spam is out of control! I guess that would be... Read More
While we all admit that unsolicited commercial email is a... Read More
The lifeblood of the spammer is email. They need to... Read More
Like everybody who will ever read this, I get spam... Read More
Anyone who uses email knows what Spam is!It's annoying and... Read More
Block Spam and Other Email Threats From Entering Your Gateway... Read More
Q: I am so sick of all the spam that... Read More
While we all agree that there`s way too much spamming/junk-mailing... Read More
A friend asked me: I don't get it. Why do... Read More
Junk mail works. Why does it work? How does it... Read More
Junk e-mail or spam has become the scourge of the... Read More
What comes to your mind when you think about your... Read More
Microsoft scores one for the good guysScott Richter, the self-proclaimed... Read More
I must be the luckiest person alive! My inbox is... Read More
Although there still seem to be some differences among the... Read More
It seems like the volume of email spam has doubled... Read More
You can stop unwanted email spam, you can choose to... Read More
English, German, Italian - It's All SPAM To MeHas anyone... Read More
RSS is the answer to the Spam epidemic of the... Read More
If you are buried in SPAM then you're not alone.... Read More
Spam can bring down your website faster than a speeding... Read More
You may have already received a do not spam list... Read More
No doubt about it."Spam" (unsolicited commercial email) threatens to paralyze... Read More
Effectively stopping spam over the long-term requires much more than... Read More
5 Ways Spam Is Affecting Your Business And what we... Read More
I imagine you have seen, heard about, or already know... Read More
We receive so much information on the Internet, especially via... Read More
If you're anything like me, you're pretty sick of it,... Read More
The first thing I do every morning when I wake... Read More
Like everybody who will ever read this, I get spam... Read More
Did you know that there are software programs that view... Read More
Very often SPAMMERS take advantage of catch-all email setup on... Read More
E-mails now have a connection back to their servers. I... Read More
No doubt about it."Spam" (unsolicited commercial email) threatens to paralyze... Read More
With SPAM being such a problem it might seem the... Read More
Over the past few years you've all become familiar with... Read More
My friends in the web hosting business have recently informed... Read More
A friend of mine received a chilling email message from... Read More
The lifeblood of the spammer is email. They need to... Read More
Spam can bring down your website faster than a speeding... Read More
Spam. Those annoying, time-consuming emails that clog your Inbox and... Read More
Spammers get email addresses from web pages using programs called... Read More
If you've been around the interenet any length of time... Read More
You may have already received a do not spam list... Read More
Spam is out of control! I guess that would be... Read More
A blacklist, as the name implies, is a list of... Read More
2004 was really a year when the whole subject of... Read More
You all tear your hair out in frustration every time... Read More
They're sneaky. And stealthy. They're quiet and mostly unobtrusive, but... Read More
We've all become familiar with the term spam. It's become... Read More
Will other spammers take heed? Don't count on it.Jeremy Jaynes... Read More
Effectively stopping spam over the long-term requires much more than... Read More
Junk mail works. Why does it work? How does it... Read More
What do they do? How do they work? Which one... Read More
Most of us have opened our email program and found,... Read More
While the Federal Trade Commission is busy fighting over definitions... Read More
In 1998, nearly 10% of all email traffic on the... Read More
Anyone who uses email knows what Spam is!It's annoying and... Read More
You can stop unwanted email spam, you can choose to... Read More
Block Spam and Other Email Threats From Entering Your Gateway... Read More
Stop intrusive pop-up ads and regain control of your online... Read More
... and you'd better sit up and take notice! Customers... Read More
Spam Blocking |