We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Spam Detection and Categorisation & Network Protection using a Firewall - Lab Report Example

Comments (0)
These marketing emails are normally known as junk mails which automatically move to junk email folder. The spam reorganization report which was produced by…
Download full paper
Spam Detection and Categorisation & Network Protection using a Firewall
Read TextPreview

Extract of sample
Spam Detection and Categorisation & Network Protection using a Firewall

Download file to see previous pages... Solutions are implemented by keeping in mind the cost and time constraints for the processing of emails to be filtered. Receiving thousand of emails on the email server situate load and degrading the performance of the email server.
The Anti spam system uses combine key method for recognizing the relevant datasets required as per defined rules. The anti spam engine detects the parameters from the email message header, database stores and learns the email parameters just like a switch maintaining a MAC table in its database. The selection of Parameters will depend on the security policy of the organization.
The unique identification (UID) or fingerprint will be stored in the database of the anti spam system against each recipient email address. Before delivering the email to the recipient, the spam engine searches for the UID of the email which is received on the organization’s domain, so that the processing time can be minimized. The emails of which UID has already been stored in the database will be delivered to the recipient
The spam engine proceeds further and check the sender’s IP address and email address in the outbound recipient’s category, if the criteria have been fulfilled, then the email message will be delivered to the recipient. And if not, the email will be stored in the unknown emails category which can be released after checking whether any new host needs to be added in the safe list. Email size, images parameters can also be defined for providing more restrictions as per IT policy.
The Firewall should be deployed in such a way that the traffic, whether it is inbound or outbound should not pass to the organization critical servers without filtration via firewall. The rules defined in the firewall device or server should not conflict with other rules. It is not necessary to be aware of the traffic coming from the internet, but it is necessary to filter inbound traffic ...Download file to see next pagesRead More
Comments (0)
Click to create a comment or rate a document
Temperature Monitor Simulation Using LabVIEW
As can be seen in the block diagram created using LabVIEW (Fig. 1), a Dial control was used as the source of the temperature signal. The signal was passed through Multiply and Add functions to convert it from a Celsius value to a Farenheit equivalent. A Waveform Chart was used to display temperature variation with time.
20 Pages(5000 words)Lab Report
Determination of Protein using Biuret Reagent
In case the bond is detected, copper (II) ions turn violet in an alkaline solution. In performing this test, several variants can be considered. Despite the name, the chemical does not contain burette ((H2N-CO-)2NH). This reaction is named using that name because it
3 Pages(750 words)Lab Report
HCL gas detection by using manual air sampling pump
Since then, a numerous number of tubes have been developed for a broad range of chemicals. The introduction of OSHA regulations in the work place in 1970s, the chemical compounds, have expanded from the mostly inorganic, toxic compounds to include large
5 Pages(1250 words)Lab Report
Network Measurement Laboratory
Finally, the objective of the experiment is to determine certain network parameters. This experiment will aid the students to understand the behavior of given circuits and explain their outputs,
3 Pages(750 words)Lab Report
Change Detection
At times, changes can occur before the eyes of an observer, but he/she fails to notice those (Styles, 2006). The hypothesis to this experiment was that the observers did not notice all the changes that took place before their eyes. Determining
5 Pages(1250 words)Lab Report
Detection of Organic Molecules in Unknowns
This experiment aimed at finding the concentrations of unknown substances using varying concentrations of standard solutions. Five different starch concentrations ranging from 0 to 100 µm/ml were prepared to make a total volume of 2 ml. The concentrations of the
1 Pages(250 words)Lab Report
HIV-1 Detection by Western Blot
The reaction is done when the viral protein are transferred to the nitrocellulose paper. The detection of the HIV virus through the process is detected through the antihuman
6 Pages(1500 words)Lab Report
Flow Measurement Using Venturi Meter
This means that it encompasses the actual experimental set-up, the used apparatus, the achieved results, the theoretical framework of this concept, the analysis and discussion of the attained
9 Pages(2250 words)Lab Report
Lab report (Using NMR)
The chemical shift targeting each nucleus can be correlated to the chemical environment with the scalar coupling showing an indirect interaction between the individual nuclear that are mediated by the electrons found in the chemical bond and appropriate
4 Pages(1000 words)Lab Report
Displacement Using LVDT
LVTD (Linear Variable Differential Transformer) is a position sensitive device that is mainly used in the provision of AC output which is proportional to the displacement that occurs in its core passing through its wings. It works in the principle of mutual induction. It consist three systematically spaced coil bound out and illustrated bobbin.
3 Pages(750 words)Lab Report
Let us find you another Lab Report on topic Spam Detection and Categorisation & Network Protection using a Firewall for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us