Made this presentation for my friend for college seminar. This presentation deals with spamming & fake mails. This is just a Presentation & not full document.
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Mail Book
1. JSS ACADEMY OF TECHNICAL EDUCATION, BANGALORE
(Affiliated to Visveshwaraya Technological University, Belgaum)
INFORMATION SCIENCE Department
Ashish Sharma
1JS08IS006
3. Aim
Spam Mail
To provide a collaborative spam
Legitimate
Mail
filter over a social network by
Spam Mail
exchanging vote databases
among its users.
Legitimate Mail
4. Content
1. Introduction
2. Related work
3. Design and architecture
4. Conclusion
5. References
6. Questions and Answers
6. Mailbook
• Users exchange databases with fingerprints
of emails identified as spam.
• Vote Databases.
• Fingerprints are the hash values of the
email’s content.
• Central Repository.
• Email Service.
7. Related Work
• White lists.
• Black lists.
• Grey lists.
• Domain key identified mail.
• Content based filtering.
• Bayesian filtering.
• Collaborative filtering.
8. Design and Architecture
• Based on social collaboration
among trusted users(friends).
• Exchange of vote databases.
14. MD-5 Message Digest Algorithm
The MD5 Message-Digest Algorithm
is a widely used cryptographic hash
function that produces a 128-bit (16-
byte) hash value.
18. MySQL
• Handling Database.
• Reliable and easy to use.
• Open source and free.
• More than 20 platforms.
19. PHP
• Scripting language.
• Server side technology.
• Fast and stable.
• Secure and reliable.
20. Conclusion
• Addressing the problem of spamming.
• A social network to disperse
fingerprints.
• User Friendly.
• Easy email characterization.
• Efficient design.
• Flexible.
• Global Solution.
21. References
[1] Wikipedia.2011.Whitelist.[Online] . Available: http://en.wikipedia.org/wiki/Whitelist#Email_whitelists
[2] Jaeyeon Jung and Emil Sit, “An Empirical Study of Spam Traffic and the Use of DNS Black Lists,” in Proc. 4th ACM SIGCOMM
Conference on Internet measurement, Oct. 25-27, 2004, pp.370-375.
[3] Wikipedia. 2011. DNSB. [Online] . Available: http://en.wikipedia.org/wiki/DNSBL
[4] Wikipedia. 2011. Content filtering. [Online]. Available: http://en.wikipedia.org/wiki/Content_filtering
[5] E. P. Sanz, J. M. G. Hidalgo and J. C. C. Pérez, “Email Spam Filtering,” in Advances in computers, vol 74, 2008, ch. 3, pp. 45-
114.
[6] M. R. Islam and W. Zhou, “An innovative analyzer for email classification based on grey list analysis,” in Proc. of the IFIP
International Conference on Network and Parallel Computing, Sep.18-21, 2007, pp. 176–182.
[7] Wikipedia. 2011 . Botnet, [Online]. Available: http://en.wikipedia.org/wiki/Botnet
[8] B. Leiba and J. Fento, “DomainKeys Identified mails (DKIM): Using Digital signatures for Domain Verifcation”, in CEAS 2007,
4th Conference on E-mail and Anti-Spam, Aug. 2-3, 2007.
[9] H. Esquivel, Aditya Akella and T. Mori, “On the Effectiveness of IP Reputation for Spam Filtering,” in Proc. 2nd Int. Conference
Commun. Syst. and Networks (COMSNETS), Jan. 5-9, 2010, pp. 1-10.
[10] Wikipedia. 2011 . CAPTCHA. [Online] . Available: http://en.wikipedia.org/wiki/CAPTCHA
[11] Carnegie Mellon University. 2000-2010. The Official CAPTCHA Site. [Online]. Available:
http://www.atm.comhttp://www.captcha.net
[12] A. Obied, 2007. Bayesian Spam Filtering. [Online]. Available: http://ahmed.obied.net/research/papers/spam_paper.pdf
[13] M. Sahami, S. Dumais, D. Heckerman and E. Horvitz, “A Bayesian approach to filtering junk e-mail,” in Proc. AAAI Workshop
on Learning for Text Categorization, 1998, pp. 55-62.
22. [14] E. Damiani, S. De Capitani di Vimercati, S. Paraboschi and P. Samarati, “P2P-Based Collaborative Spam Detection and
Filtering,” in Proc. 4th Int. Conference on Peer-to-Peer Computing, Aug. 25-27, 2004, pp. 176-183.
[15] Wikipedia. 2011 . MD5. [Online] . Available: http://en.wikipedia.org/wiki/MD5
[16] Wikipedia. 2011 . LAMP. [Online] . Available: http://en.wikipedia.org/wiki/LAMP_(software_bundle)
[17] Wikipedia. 2011. Linux. [Online] . Available: http://en.wikipedia.org/wiki/Linux
[18] Wikipedia. 2011. Apache HTTP Server. [Online]. Available: http://en.wikipedia.org/wiki/Apache_HTTP_Server
[19] Oracle Corporation and/or its affiliates. 2011. MySQL. [Online]. Available: http://www.mysql.com/why-mysql
[20] Wikipedia. 2011 . MySQL. [Online] . Available: http://en.wikipedia.org/wiki/MySQL
[21] The PHP Group. 2001-2011. PHP: Hypertext Preprocessor. [Online]. Available: http://gr.php.net
[22] C. Stewart, 2006. The Advantages of PHP. [Online]. Available: http://www.designersplayground.com/articles/118/1/The-
Advantages-of- PHP/Page1.html
[23] cplucpluc.com. Information on the C++ language. [Online]. Available: http://www.cplusplus.com/info
[24] Oracle. Java. [Online]. Available: http://java.com/en
[25] Python Software Foundation. 1990-2011. Python Programming Language. [Online]. Available: http://www.python.org
[26] Wikipedia. 2011 . Javascript. [Online]. Available: http://en.wikipedia.org/wiki/Javascript