SlideShare a Scribd company logo
2
Most read
3
Most read
BAPUJI INSTITUTE OF ENGINEERING AND TECHNOLOGY
CNS MINI PROJECT
ON
ANTI SPAM TECHNIQUES
PROJECT GUIDE PROJECT BY
SHWETHA G MAM AKHIL.A.K
SHRIKAR.H.M
SURYA.B.M
SANJAYA.M
Abstract
 The following presentation is a basic guide line to antispam technique
Electronic mail (E-mail) is an essential communication tool that has been
greatly abused byspammers to disseminate unwanted information
(messages) and spread malicious contents to Internet users.
CurrentInternet technologies further accelerated the distribution of
spam.
 Spam-reduction techniques have developed rapidly over the last few
years, as spam volumes have increased. We believe that no one anti-
spam solution is the “right” answer, and that the best approach is a
multifaceted one, combining various forms of filtering with infrastructure
changes, financial changes, legal recourse, and more, to provide a
stronger barrier to spam than can be achieved with one solution alone.
Introduction
 Spam-reduction techniques have developed rapidly over the last few
years, as spam volumes have increased. We believe that the spam
problem requires a multi-faceted solution that combines a broad array of
filtering techniques with various infrastructural changes, changes in
financial incentives for spammers, legal approaches, and more [1].
 This paper describes one part of a more comprehensive anti-spam
reSpamGuru, a collaborative anti-spam filter that combines several
learning, tokenization, and user interface elements to provide enterprise-
wide spam protection with high spam detection rates and low false-
positive ratesdelivery system
Propose system
 Various anti-spam techniques are used to prevent email spam
(unsolicited bulk email).No technique is a complete solution to the
spam problem, and each has trade-offs between incorrectly rejecting
legitimate email (false positives) as opposed to not rejecting all spam
email (false negatives) – and the associated costs in time, effort, and
cost of wrongfully obstructing good mail.[1]Anti-spam techniques can
be broken into four broad categories: those that require actions by
individuals, those that can be automated by email administrators,
those that can be automated by email senders and those employed by
researchers and law enforcement officials.
Methods are used in Anti-spam Software to
get rid of spam
CONTENTS
 AUTHENTICATION
 CHALLENGE/RESPONSE SYSTEM
 CHECKSUM-BASED FILTERING
 COUNTRY-BASED FILTERING
 DNS-BASED BLOKLISTS
 URL FILTERING
 STRICT ENFORCEMENT OF RFC STANDARD
 HONEYPOTS
 HAM PASSWARD
Conclusion
 Email spam has been the focus of studies for a long time. Though there are
many different techniques to block spam email messages to reach users
inbox, filtering is the most commonly used mechanism and has gained
success to some extent. Given the large number of usage of email
worldwide, email spam is still plentiful and scale of the problem is
enormous.
 Researchers and organisations make the filers smart and self-learning
but spammers are a step ahead. They keep on finding techniques to
deceive the filters and their learning mechanisms. Hence, the problem still
remains giving scope for researchers to work in the area. This work is an
effort in the same scope to reduce false negatives/spam in the inbox of the
users which has deceived the organisational filters.
 Thankyou

More Related Content

PDF
Overview of Anti-spam filtering Techniques
IRJET Journal
 
DOC
Survey on spam filtering
Chippy Thomas
 
PDF
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
PDF
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
PDF
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
PDF
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
PDF
ACO-email spam filtering
Sukhvir Singh Lal
 
PPT
Spamming and Spam Filtering
iNazneen
 
Overview of Anti-spam filtering Techniques
IRJET Journal
 
Survey on spam filtering
Chippy Thomas
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Editor IJCATR
 
ACO-email spam filtering
Sukhvir Singh Lal
 
Spamming and Spam Filtering
iNazneen
 

Similar to CNS ANTI SPAM TECHNIQUES.pptx (20)

PDF
A multi layer architecture for spam-detection system
csandit
 
PDF
A multi layer architecture for spam-detection system
csandit
 
PDF
A review of spam filtering and measures of antispam
Alexander Decker
 
PDF
402 406
Editor IJARCET
 
PDF
A Model for Fuzzy Logic Based Machine Learning Approach for Spam Filtering
IOSR Journals
 
DOCX
Spam- A Menace to Society
jsantabarbara
 
PDF
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
ijsrd.com
 
PDF
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET Journal
 
PPTX
virusesssssssssssssssssssssssssssss.pptx
minsatt32
 
PDF
Thematic and self learning method for
ijcsa
 
PPTX
ISOC-PolicyBrief-Slides-Spam-20161103.pptx
tie40558
 
PDF
E mail spamers ppt
aswinncs
 
PDF
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
IRJET Journal
 
PDF
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...
IJNSA Journal
 
PPTX
Anti-SPAM-FRAMEWORK-how-to-erradicate.pptx
Muhammad Salahuddien
 
PDF
Analysis of an image spam in email based on content analysis
ijnlc
 
PDF
Jt3616901697
IJERA Editor
 
PDF
Detection and Minimization Influence of Rumor in Social Network
IRJET Journal
 
PDF
IRJET- Image Spam Detection: Problem and Existing Solution
IRJET Journal
 
PPT
Spam and Anti-spam - Sudipta Bhattacharya
sankhadeep
 
A multi layer architecture for spam-detection system
csandit
 
A multi layer architecture for spam-detection system
csandit
 
A review of spam filtering and measures of antispam
Alexander Decker
 
A Model for Fuzzy Logic Based Machine Learning Approach for Spam Filtering
IOSR Journals
 
Spam- A Menace to Society
jsantabarbara
 
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
ijsrd.com
 
IRJET- A Survey on Automatic Phishing Email Detection using Natural Langu...
IRJET Journal
 
virusesssssssssssssssssssssssssssss.pptx
minsatt32
 
Thematic and self learning method for
ijcsa
 
ISOC-PolicyBrief-Slides-Spam-20161103.pptx
tie40558
 
E mail spamers ppt
aswinncs
 
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
IRJET Journal
 
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO ...
IJNSA Journal
 
Anti-SPAM-FRAMEWORK-how-to-erradicate.pptx
Muhammad Salahuddien
 
Analysis of an image spam in email based on content analysis
ijnlc
 
Jt3616901697
IJERA Editor
 
Detection and Minimization Influence of Rumor in Social Network
IRJET Journal
 
IRJET- Image Spam Detection: Problem and Existing Solution
IRJET Journal
 
Spam and Anti-spam - Sudipta Bhattacharya
sankhadeep
 
Ad

Recently uploaded (20)

PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PDF
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PDF
Zero carbon Building Design Guidelines V4
BassemOsman1
 
PDF
July 2025: Top 10 Read Articles Advanced Information Technology
ijait
 
PDF
dse_final_merit_2025_26 gtgfffffcjjjuuyy
rushabhjain127
 
PDF
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
PDF
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
PPTX
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
PPTX
Information Retrieval and Extraction - Module 7
premSankar19
 
PDF
Principles of Food Science and Nutritions
Dr. Yogesh Kumar Kosariya
 
PPT
Ppt for engineering students application on field effect
lakshmi.ec
 
PPTX
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
PPTX
Introduction of deep learning in cse.pptx
fizarcse
 
PPTX
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PPT
SCOPE_~1- technology of green house and poyhouse
bala464780
 
PDF
Zero Carbon Building Performance standard
BassemOsman1
 
PDF
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Top 10 read articles In Managing Information Technology.pdf
IJMIT JOURNAL
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
Zero carbon Building Design Guidelines V4
BassemOsman1
 
July 2025: Top 10 Read Articles Advanced Information Technology
ijait
 
dse_final_merit_2025_26 gtgfffffcjjjuuyy
rushabhjain127
 
top-5-use-cases-for-splunk-security-analytics.pdf
yaghutialireza
 
67243-Cooling and Heating & Calculation.pdf
DHAKA POLYTECHNIC
 
Victory Precisions_Supplier Profile.pptx
victoryprecisions199
 
Information Retrieval and Extraction - Module 7
premSankar19
 
Principles of Food Science and Nutritions
Dr. Yogesh Kumar Kosariya
 
Ppt for engineering students application on field effect
lakshmi.ec
 
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
Introduction of deep learning in cse.pptx
fizarcse
 
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
SCOPE_~1- technology of green house and poyhouse
bala464780
 
Zero Carbon Building Performance standard
BassemOsman1
 
Traditional Exams vs Continuous Assessment in Boarding Schools.pdf
The Asian School
 
Ad

CNS ANTI SPAM TECHNIQUES.pptx

  • 1. BAPUJI INSTITUTE OF ENGINEERING AND TECHNOLOGY CNS MINI PROJECT ON ANTI SPAM TECHNIQUES PROJECT GUIDE PROJECT BY SHWETHA G MAM AKHIL.A.K SHRIKAR.H.M SURYA.B.M SANJAYA.M
  • 2. Abstract  The following presentation is a basic guide line to antispam technique Electronic mail (E-mail) is an essential communication tool that has been greatly abused byspammers to disseminate unwanted information (messages) and spread malicious contents to Internet users. CurrentInternet technologies further accelerated the distribution of spam.  Spam-reduction techniques have developed rapidly over the last few years, as spam volumes have increased. We believe that no one anti- spam solution is the “right” answer, and that the best approach is a multifaceted one, combining various forms of filtering with infrastructure changes, financial changes, legal recourse, and more, to provide a stronger barrier to spam than can be achieved with one solution alone.
  • 3. Introduction  Spam-reduction techniques have developed rapidly over the last few years, as spam volumes have increased. We believe that the spam problem requires a multi-faceted solution that combines a broad array of filtering techniques with various infrastructural changes, changes in financial incentives for spammers, legal approaches, and more [1].  This paper describes one part of a more comprehensive anti-spam reSpamGuru, a collaborative anti-spam filter that combines several learning, tokenization, and user interface elements to provide enterprise- wide spam protection with high spam detection rates and low false- positive ratesdelivery system
  • 4. Propose system  Various anti-spam techniques are used to prevent email spam (unsolicited bulk email).No technique is a complete solution to the spam problem, and each has trade-offs between incorrectly rejecting legitimate email (false positives) as opposed to not rejecting all spam email (false negatives) – and the associated costs in time, effort, and cost of wrongfully obstructing good mail.[1]Anti-spam techniques can be broken into four broad categories: those that require actions by individuals, those that can be automated by email administrators, those that can be automated by email senders and those employed by researchers and law enforcement officials.
  • 5. Methods are used in Anti-spam Software to get rid of spam CONTENTS  AUTHENTICATION  CHALLENGE/RESPONSE SYSTEM  CHECKSUM-BASED FILTERING  COUNTRY-BASED FILTERING  DNS-BASED BLOKLISTS  URL FILTERING  STRICT ENFORCEMENT OF RFC STANDARD  HONEYPOTS  HAM PASSWARD
  • 6. Conclusion  Email spam has been the focus of studies for a long time. Though there are many different techniques to block spam email messages to reach users inbox, filtering is the most commonly used mechanism and has gained success to some extent. Given the large number of usage of email worldwide, email spam is still plentiful and scale of the problem is enormous.  Researchers and organisations make the filers smart and self-learning but spammers are a step ahead. They keep on finding techniques to deceive the filters and their learning mechanisms. Hence, the problem still remains giving scope for researchers to work in the area. This work is an effort in the same scope to reduce false negatives/spam in the inbox of the users which has deceived the organisational filters.