Spam Detection and Categorisation & Network Protection using a Firewall - Lab Report Example

Comments (0) Cite this document
Summary
These marketing emails are normally known as junk mails which automatically move to junk email folder. The spam reorganization report which was produced by…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.4% of users find it useful
Spam Detection and Categorisation & Network Protection using a Firewall
Read TextPreview

Extract of sample "Spam Detection and Categorisation & Network Protection using a Firewall"

Download file to see previous pages Solutions are implemented by keeping in mind the cost and time constraints for the processing of emails to be filtered. Receiving thousand of emails on the email server situate load and degrading the performance of the email server.
The Anti spam system uses combine key method for recognizing the relevant datasets required as per defined rules. The anti spam engine detects the parameters from the email message header, database stores and learns the email parameters just like a switch maintaining a MAC table in its database. The selection of Parameters will depend on the security policy of the organization.
The unique identification (UID) or fingerprint will be stored in the database of the anti spam system against each recipient email address. Before delivering the email to the recipient, the spam engine searches for the UID of the email which is received on the organization’s domain, so that the processing time can be minimized. The emails of which UID has already been stored in the database will be delivered to the recipient
The spam engine proceeds further and check the sender’s IP address and email address in the outbound recipient’s category, if the criteria have been fulfilled, then the email message will be delivered to the recipient. And if not, the email will be stored in the unknown emails category which can be released after checking whether any new host needs to be added in the safe list. Email size, images parameters can also be defined for providing more restrictions as per IT policy.
The Firewall should be deployed in such a way that the traffic, whether it is inbound or outbound should not pass to the organization critical servers without filtration via firewall. The rules defined in the firewall device or server should not conflict with other rules. It is not necessary to be aware of the traffic coming from the internet, but it is necessary to filter inbound traffic ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Spam Detection and Categorisation & Network Protection using a Lab Report”, n.d.)
Spam Detection and Categorisation & Network Protection using a Lab Report. Retrieved from https://studentshare.org/miscellaneous/1560920-spam-detection-and-categorisation-network-protection-using-a-firewall
(Spam Detection and Categorisation & Network Protection Using a Lab Report)
Spam Detection and Categorisation & Network Protection Using a Lab Report. https://studentshare.org/miscellaneous/1560920-spam-detection-and-categorisation-network-protection-using-a-firewall.
“Spam Detection and Categorisation & Network Protection Using a Lab Report”, n.d. https://studentshare.org/miscellaneous/1560920-spam-detection-and-categorisation-network-protection-using-a-firewall.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Spam Detection and Categorisation & Network Protection using a Firewall

Network Intrusion Detection and Forensics

...to fit various niches according to the target user. Bro, for instance, focuses on providing free network protection to research bodies. NIDS systems will develop for other specific sectors requiring the use of dedicated intrusion detection services, especially in the corporate field. 5. DIFFERENT METHODS OF INTRUSION DETECTION 5.1 Statistical Anomaly-Based Intrusion System Statistical Anomaly based network intrusion systems depend upon past data flow within a network to tell whether the networks are experiencing normal behavior or not (Wikipedia, 2012). The intrusion detection system...
26 Pages(6500 words)Dissertation

Web Spam Detection: Techniques and Approaches

...that this method has a potential for false positive, simply because the method uses only links to detect the spam pages, without any due consideration to the content of the pages (Ghiam & Nemaney, 2012). Link Farm Properties Due to the shortcomings displayed by the MLSA detection method, an improved method was then developed, which is referred to as the Link Farm Properties detection method. This method considers the World Wide Web as a graph and each page is perceived as a node, while each link forms the edge of the graph (Bolton & Hand, 2002). The World Wide Web is supposed to be found in the form of a scale-free network, where all the...
18 Pages(4500 words)Term Paper

Spam (Computing)

...emails argue that the receiver can simply hit the delete button or use an opt-out option listed in the electronic advertisement if they do not want to view the email. (Godin, 1999, pg. 43). Opponents charge anything that arrives in the inbox that the recipient didn’t request is spam and that just because a purchase is made doesn’t give that company the right to inundate them with junk mail. The debate is joined whether this tactic serves to generate trade or to drive potential customers away. Spam is considered not only intrusive but is generally viewed as a scheme of some kind. Those that don’t differentiate between the two are driven away from these emails thus questioning their...
6 Pages(1500 words)Essay

Firewall Technology (Network Security)

...measures for deterrence, prevention, detection and correction of security threats that can damage or divulge information either locally or when transmitted. Hence, certain security mechanisms that are designed to detect, prevent and restore security after an attack. Consequently, many network appliances are invented to secure a network. The most popular network security appliance that is used in almost every small or corporate network to provide security is a firewall. Firewall is defined as “a combination of hardware, software, and procedures that controls access to an intranet....
6 Pages(1500 words)Research Paper

Anomaly Detection Using Probability Distribution Method with Focus on Network Intrusion Detection Systems

...). Traffic patterns have been affiliated with the conditional possibility distribution of the nature of the anomalies in a computer network (Sobh, 2007, p. 119). Given the nature of data processing from the past, anomaly detection systems use similar distribution states that currently exist. This way, system updates will reinforce the protection of data and communication systems. Infringement in computer networks requires recognition of any deviation in the transformation of data from one form to another while streaming through the network. When a monitored traffic experiences anomalies, it becomes marked or labeled should there arise a...
3 Pages(750 words)Research Proposal

Network Intrusion Detection Systems

...Network Intrusion Detection systems Introduction Network Intrusion Detection systems are widely used andthey are one of the major component in a network. These systems help to prevent the intrusion and attacks by using a unique mechanism. Intrusion detection system detects and protects the network system from threats and attacks. It is the most important component of the network system. It is mandatory for the network systems to install an intrusion detection system to easily manage the attacks and...
6 Pages(1500 words)Essay

First Amendment Protection for Spam

...First Amendment Protection for Spam Introduction The article from New York Times has described spam as a "betrayal of all that mail once stood for".1 The most important organizations of internet including policy makers and consumer advocates have agreed to protect the feasibility of e-mails, specifically e-mails that are mostly used on internet. According to them, the Congress must pass on legislation to chop off the amount of spam. 2 Spam messages are used to flood e-mailboxes, all over the internet. They sell everything that can be from sex to education. It is communicated with the internet users either...
25 Pages(6250 words)Essay

Conventional PCR using agarose gel electrophoresis detection

...Conventional PCR using agarose gel electrophoresis detection According to Lewis “Agarose gel electrophoresis is the easiest and commonest way of separating and analyzing DNA”. Conventional techniques used to detect mycoplasma involve culturing samples on selective media, which needs at least a week to obtain the results (HD BIOSCIENCES Co., LTD 2). The reason to add gel in this method is to either quantify the DNA or separate the particular band of DNA. With the addition of edhidium bromide, DNA becomes visible. This binds strongly to DNA by intercalating between the bases and is fluorescent meaning that it absorbs invisible UV light and transmits the energy as visible orange light (Lewis). While addition of gel, the care... the bromophenol...
2 Pages(500 words)Essay

Security Network Intrusion detection system (IDS)

...of the affected computer hosted the firewall module station which “is a key part to securing the firewall” (Spyders Inc., 2007). I would check the IDS logs to make sure that the security needs were being met or not. I would check whether or not there was a software firewall installed on the computer in combination with a hardware firewall connected to the modem because using the combination not only blocks unwanted attacks from outside but also stops malware from getting out if the system becomes infected (DIY Online Security, 2007). Conclusion To sum up, it is very important to get the affected computer isolated from the network and...
2 Pages(500 words)Essay

Firewall Applications

...Firewall Applications Submitted to, Submitted By, of the Submitted on, [November 6th, INTRODUCTION A firewall is a software/hardware tool that is used to protect a computing device from malware/other malicious software or Trojan horses’ intrusion. These external threatening agents often attack a computing device when it is connected to another external computing device that may be affected with a malware. This connection may be via a network etc. Figure 1: Graphical Representation of a Firewalls Location. Firewall prevents unauthorized access to a computing device by checking every message transfer to and from the computing device. It restricts any message transfer that does not comply with the defined security standards embedded... in it....
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Lab Report on topic Spam Detection and Categorisation & Network Protection using a Firewall for FREE!

Contact Us