Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Detecting and filtering method of spam mail based on counterfeit sender

A spam and filtering method technology, applied in the Internet field, can solve the problem of no way to authenticate and track the identity and address of spam, and cannot authenticate the sender of the mail, so as to achieve the effect of convenient installation, deployment and uninstallation, and high operating efficiency

Inactive Publication Date: 2014-04-09
MIANYANG TEACHERS COLLEGE
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In fact, the above-mentioned solutions cannot fundamentally prevent the flood of spam. The fundamental reason why spammers are so rampant is that there is currently no mechanism for authenticating and tracking their identities and addresses. Although Domain Key and SPF also have certain A degree of authentication and tracking mechanism, but it can only authenticate to the email domain, not the email sender

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detecting and filtering method of spam mail based on counterfeit sender
  • Detecting and filtering method of spam mail based on counterfeit sender
  • Detecting and filtering method of spam mail based on counterfeit sender

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0036] Because different mail systems do not strictly follow the relevant protocols and standards of e-mail, such as RFC822, etc., and the configuration errors of the mail system itself, some technical problems may be encountered when implementing FSpam detection and filtering. For example, when some non-standard mail systems send mail, what is written in the Received field is not the domain name but the IP address; in addition, some mail systems support virtual mail domains (that is, one mail system manages multiple mail domains at the same time). The mail domain ND written in the Received field is not necessarily the mail domain MD in the From field. This may bring some operational difficulties to the detection of FSpam, and the possibility of killing normal emails by mistake. For the above problems, technical means such as DNS forward query, reverse resolution, and NSLOOKUP query of MX records can be better solved.

[0037] The spam detection and filtering method based on ...

experiment example

[0056] Performance test of FSpam detection / filtering engine AFSpam

[0057] In order to verify the functionality of the FSpam detection / filter, a design such as Figure 5 The shown FSpam filtering comparison experiment:

[0058] 1. Randomly send some FSpam emails and normal emails to the recipient l iuwucernet.edu.cn through the FSpam sending platform

[0059] 2. The FSpam detection / filter Anti-FSpam is not deployed on the mail server cernet.edu.cn, and the mail server of cernet.edu.cn will automatically forward the mail sent to l iuwucernet.edu.cn to l iuwuvhost.galaxy.edu. cn

[0060] 3. The FSpam detection filter Anti-FSASpam is deployed on the mail server vhost.galaxy.edu.cn.

[0061] 4. If the Anti-FSpam detection and filtering system works normally, the mailbox of liuwucernet.edu.cn will receive all emails from FSpam senders, while the mailbox of liuwuvhost.galaxy.edu.cn can only receive FSpam Normal mail sent by the sender. Then, by comparing the emails in liuwucer...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of Internet, and in particular discloses a detecting and filtering method of a spam mail based on a counterfeit sender. The method comprises the following steps: starting a mail monitoring system; receiving a mail; extracting a mail header; initializing a sender email domain set S_DN; analyzing a sender email domain MD from a From field; analyzing a sender email domain DN from a Received field; and judging the spam mail, namely if the MD belongs to the S_DN, judging the mail as the spam mail; and if the MD does not belong to the S_DN, judging the mail as a normal mail. As the method is used, the spam mail based on the counterfeit sender is effectively detected and filtered, so that the normal mail is prevented from being filtered wrongly. Thus, a technical support for network management, network security monitoring and on-line network evidence obtainment is provided.

Description

technical field [0001] The invention relates to the technical field of the Internet, and specifically discloses a spam detection and filtering method based on a fake sender. Background technique [0002] E-mail has always been one of the most important applications of the Internet. The early design of e-mail system was based on a basic assumption that the sender is credible, so the security of the e-mail system was rarely considered. With the rapid development of the Internet, the e-mail system is becoming more and more popular, followed by more and more serious security problems, the most important of which is the flood of spam, most mailboxes receive a large number of emails every day Spam brings huge loss and inconvenience to the society, collective and individual. How to effectively prevent spam has become the most serious problem facing the current mail system. At present, people have tried every means to fight against spam, such as black and white list technology, fi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/58
Inventor 刘武唐再良文永革赵永驰
Owner MIANYANG TEACHERS COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products