SlideShare une entreprise Scribd logo
1  sur  24
JSS ACADEMY OF TECHNICAL EDUCATION, BANGALORE
                 (Affiliated to Visveshwaraya Technological University, Belgaum)




          INFORMATION SCIENCE Department



Ashish Sharma
1JS08IS006
Technical Seminar on
      MAILBOOK
 A Social Network Against Spamming
Aim

                   Spam Mail
                               To provide a collaborative spam
  Legitimate
     Mail

                               filter over a social network by
               Spam Mail


                               exchanging vote databases
                               among its users.
 Legitimate Mail
Content
          1.   Introduction
          2.   Related work
          3.   Design and architecture
          4.   Conclusion
          5.   References
          6.   Questions and Answers
Introduction

               Email

               Spam

               Spam Filters
Mailbook
           • Users exchange databases with fingerprints
             of emails identified as spam.
           • Vote Databases.
           • Fingerprints are the hash values of the
             email’s content.
           • Central Repository.
           • Email Service.
Related Work
               •   White lists.
               •   Black lists.
               •   Grey lists.
               •   Domain key identified mail.
               •   Content based filtering.
               •   Bayesian filtering.
               •   Collaborative filtering.
Design and Architecture


                   • Based on social collaboration
                     among trusted users(friends).

                   • Exchange of vote databases.
Generic Architecture of Mailbook
Vote Database Exchange Among Friends
Logic
        Implementation of the logic for database
        exchange is based on:

        • Trusted friends.
        • Profile characteristic.
        • Group membership.
Mailbook Functions
Import And Export Functions




        Import
                 Export
MD-5 Message Digest Algorithm

               The MD5 Message-Digest Algorithm
               is a widely used cryptographic hash
               function that produces a 128-bit (16-
               byte) hash value.
Current Work

          Linux      Apache
                  LAMP
         MySQL           PHP
Linux

        •   Operating system
        •   Free and open source
        •   Customizable
        •   Necessary security features
        •   Programming language
            support
Apache HTTP Server

                     • Web Server Software.
                     • Free.
                     • Most Popular.
MySQL

        •   Handling Database.
        •   Reliable and easy to use.
        •   Open source and free.
        •   More than 20 platforms.
PHP

      •   Scripting language.
      •   Server side technology.
      •   Fast and stable.
      •   Secure and reliable.
Conclusion
             • Addressing the problem of spamming.
             • A social network to disperse
               fingerprints.
             • User Friendly.
             • Easy email characterization.
             • Efficient design.
             • Flexible.
             • Global Solution.
References
[1] Wikipedia.2011.Whitelist.[Online] . Available: http://en.wikipedia.org/wiki/Whitelist#Email_whitelists
[2] Jaeyeon Jung and Emil Sit, “An Empirical Study of Spam Traffic and the Use of DNS Black Lists,” in Proc. 4th ACM SIGCOMM
Conference on Internet measurement, Oct. 25-27, 2004, pp.370-375.
[3] Wikipedia. 2011. DNSB. [Online] . Available: http://en.wikipedia.org/wiki/DNSBL
[4] Wikipedia. 2011. Content filtering. [Online]. Available: http://en.wikipedia.org/wiki/Content_filtering
[5] E. P. Sanz, J. M. G. Hidalgo and J. C. C. Pérez, “Email Spam Filtering,” in Advances in computers, vol 74, 2008, ch. 3, pp. 45-
114.
[6] M. R. Islam and W. Zhou, “An innovative analyzer for email classification based on grey list analysis,” in Proc. of the IFIP
International Conference on Network and Parallel Computing, Sep.18-21, 2007, pp. 176–182.
[7] Wikipedia. 2011 . Botnet, [Online]. Available: http://en.wikipedia.org/wiki/Botnet
[8] B. Leiba and J. Fento, “DomainKeys Identified mails (DKIM): Using Digital signatures for Domain Verifcation”, in CEAS 2007,
4th Conference on E-mail and Anti-Spam, Aug. 2-3, 2007.
[9] H. Esquivel, Aditya Akella and T. Mori, “On the Effectiveness of IP Reputation for Spam Filtering,” in Proc. 2nd Int. Conference
Commun. Syst. and Networks (COMSNETS), Jan. 5-9, 2010, pp. 1-10.
[10] Wikipedia. 2011 . CAPTCHA. [Online] . Available: http://en.wikipedia.org/wiki/CAPTCHA
[11] Carnegie Mellon University. 2000-2010. The Official CAPTCHA Site. [Online]. Available:
http://www.atm.comhttp://www.captcha.net
[12] A. Obied, 2007. Bayesian Spam Filtering. [Online]. Available: http://ahmed.obied.net/research/papers/spam_paper.pdf
[13] M. Sahami, S. Dumais, D. Heckerman and E. Horvitz, “A Bayesian approach to filtering junk e-mail,” in Proc. AAAI Workshop
on Learning for Text Categorization, 1998, pp. 55-62.
[14] E. Damiani, S. De Capitani di Vimercati, S. Paraboschi and P. Samarati, “P2P-Based Collaborative Spam Detection and
Filtering,” in Proc. 4th Int. Conference on Peer-to-Peer Computing, Aug. 25-27, 2004, pp. 176-183.
[15] Wikipedia. 2011 . MD5. [Online] . Available: http://en.wikipedia.org/wiki/MD5
[16] Wikipedia. 2011 . LAMP. [Online] . Available: http://en.wikipedia.org/wiki/LAMP_(software_bundle)
[17] Wikipedia. 2011. Linux. [Online] . Available: http://en.wikipedia.org/wiki/Linux
[18] Wikipedia. 2011. Apache HTTP Server. [Online]. Available: http://en.wikipedia.org/wiki/Apache_HTTP_Server
[19] Oracle Corporation and/or its affiliates. 2011. MySQL. [Online]. Available: http://www.mysql.com/why-mysql
[20] Wikipedia. 2011 . MySQL. [Online] . Available: http://en.wikipedia.org/wiki/MySQL
[21] The PHP Group. 2001-2011. PHP: Hypertext Preprocessor. [Online]. Available: http://gr.php.net
[22] C. Stewart, 2006. The Advantages of PHP. [Online]. Available: http://www.designersplayground.com/articles/118/1/The-
Advantages-of- PHP/Page1.html
[23] cplucpluc.com. Information on the C++ language. [Online]. Available: http://www.cplusplus.com/info
[24] Oracle. Java. [Online]. Available: http://java.com/en
[25] Python Software Foundation. 1990-2011. Python Programming Language. [Online]. Available: http://www.python.org
[26] Wikipedia. 2011 . Javascript. [Online]. Available: http://en.wikipedia.org/wiki/Javascript
Thank You
Do you still have any question ?

Contenu connexe

Similaire à Mail Book

2006 bio it web services
2006 bio it web services2006 bio it web services
2006 bio it web servicesChris Dwan
 
Lei_Resume-it.doc
Lei_Resume-it.docLei_Resume-it.doc
Lei_Resume-it.docbutest
 
International collaborative efforts to share threat data in a vetted member c...
International collaborative efforts to share threat data in a vetted member c...International collaborative efforts to share threat data in a vetted member c...
International collaborative efforts to share threat data in a vetted member c...CODE BLUE
 
Building genomic data cyberinfrastructure with the online database software T...
Building genomic data cyberinfrastructure with the online database software T...Building genomic data cyberinfrastructure with the online database software T...
Building genomic data cyberinfrastructure with the online database software T...mestato
 
Ict uses in libraries
Ict uses in librariesIct uses in libraries
Ict uses in librariesLiaquat Rahoo
 
New information service
New information serviceNew information service
New information serviceSaeid Nezareh
 
Impact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and EducationImpact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and EducationMANENDRASINGH30
 
New ICT Trends and Issues of Librarianship
New ICT Trends and Issues of LibrarianshipNew ICT Trends and Issues of Librarianship
New ICT Trends and Issues of LibrarianshipLiaquat Rahoo
 
Software Analytics: Data Analytics for Software Engineering
Software Analytics: Data Analytics for Software EngineeringSoftware Analytics: Data Analytics for Software Engineering
Software Analytics: Data Analytics for Software EngineeringTao Xie
 
Application of Library Management Software: NewGenLib
Application of Library Management Software: NewGenLibApplication of Library Management Software: NewGenLib
Application of Library Management Software: NewGenLibDavid Nzoputa Ofili
 
Model of semantic textual document clustering
Model of semantic textual document clusteringModel of semantic textual document clustering
Model of semantic textual document clusteringSK Ahammad Fahad
 
Presention on Facebook in f Distributed systems
Presention on Facebook in f Distributed systemsPresention on Facebook in f Distributed systems
Presention on Facebook in f Distributed systemsAhmad Yar
 
MS Word version
MS Word versionMS Word version
MS Word versionbutest
 
MS Word version
MS Word versionMS Word version
MS Word versionbutest
 
IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...
IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...
IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...IAEME Publication
 
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...Emmanuel E C
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
Introduction to apache spark and machine learning
Introduction to apache spark and machine learningIntroduction to apache spark and machine learning
Introduction to apache spark and machine learningAwoyemi Ezekiel
 
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010Yahoo Developer Network
 

Similaire à Mail Book (20)

2006 bio it web services
2006 bio it web services2006 bio it web services
2006 bio it web services
 
Lei_Resume-it.doc
Lei_Resume-it.docLei_Resume-it.doc
Lei_Resume-it.doc
 
International collaborative efforts to share threat data in a vetted member c...
International collaborative efforts to share threat data in a vetted member c...International collaborative efforts to share threat data in a vetted member c...
International collaborative efforts to share threat data in a vetted member c...
 
Building genomic data cyberinfrastructure with the online database software T...
Building genomic data cyberinfrastructure with the online database software T...Building genomic data cyberinfrastructure with the online database software T...
Building genomic data cyberinfrastructure with the online database software T...
 
Ict uses in libraries
Ict uses in librariesIct uses in libraries
Ict uses in libraries
 
New information service
New information serviceNew information service
New information service
 
Impact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and EducationImpact of Covid-19 on Learning and Education
Impact of Covid-19 on Learning and Education
 
New ICT Trends and Issues of Librarianship
New ICT Trends and Issues of LibrarianshipNew ICT Trends and Issues of Librarianship
New ICT Trends and Issues of Librarianship
 
Digital libraries
Digital librariesDigital libraries
Digital libraries
 
Software Analytics: Data Analytics for Software Engineering
Software Analytics: Data Analytics for Software EngineeringSoftware Analytics: Data Analytics for Software Engineering
Software Analytics: Data Analytics for Software Engineering
 
Application of Library Management Software: NewGenLib
Application of Library Management Software: NewGenLibApplication of Library Management Software: NewGenLib
Application of Library Management Software: NewGenLib
 
Model of semantic textual document clustering
Model of semantic textual document clusteringModel of semantic textual document clustering
Model of semantic textual document clustering
 
Presention on Facebook in f Distributed systems
Presention on Facebook in f Distributed systemsPresention on Facebook in f Distributed systems
Presention on Facebook in f Distributed systems
 
MS Word version
MS Word versionMS Word version
MS Word version
 
MS Word version
MS Word versionMS Word version
MS Word version
 
IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...
IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...
IMPLEMENTATION OF DIGITAL LIBRARY SYSTEM BY USING DSPACE & ANDROID APPS AT AM...
 
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
Use of "NewGenLib" Open Source Software for Library Automation, Digital Libra...
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Introduction to apache spark and machine learning
Introduction to apache spark and machine learningIntroduction to apache spark and machine learning
Introduction to apache spark and machine learning
 
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
HadoopSummit_2010_big dataspamchallange_hadoopsummit2010
 

Dernier

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Dernier (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Mail Book

  • 1. JSS ACADEMY OF TECHNICAL EDUCATION, BANGALORE (Affiliated to Visveshwaraya Technological University, Belgaum) INFORMATION SCIENCE Department Ashish Sharma 1JS08IS006
  • 2. Technical Seminar on MAILBOOK A Social Network Against Spamming
  • 3. Aim Spam Mail To provide a collaborative spam Legitimate Mail filter over a social network by Spam Mail exchanging vote databases among its users. Legitimate Mail
  • 4. Content 1. Introduction 2. Related work 3. Design and architecture 4. Conclusion 5. References 6. Questions and Answers
  • 5. Introduction Email Spam Spam Filters
  • 6. Mailbook • Users exchange databases with fingerprints of emails identified as spam. • Vote Databases. • Fingerprints are the hash values of the email’s content. • Central Repository. • Email Service.
  • 7. Related Work • White lists. • Black lists. • Grey lists. • Domain key identified mail. • Content based filtering. • Bayesian filtering. • Collaborative filtering.
  • 8. Design and Architecture • Based on social collaboration among trusted users(friends). • Exchange of vote databases.
  • 10. Vote Database Exchange Among Friends
  • 11. Logic Implementation of the logic for database exchange is based on: • Trusted friends. • Profile characteristic. • Group membership.
  • 13. Import And Export Functions Import Export
  • 14. MD-5 Message Digest Algorithm The MD5 Message-Digest Algorithm is a widely used cryptographic hash function that produces a 128-bit (16- byte) hash value.
  • 15. Current Work Linux Apache LAMP MySQL PHP
  • 16. Linux • Operating system • Free and open source • Customizable • Necessary security features • Programming language support
  • 17. Apache HTTP Server • Web Server Software. • Free. • Most Popular.
  • 18. MySQL • Handling Database. • Reliable and easy to use. • Open source and free. • More than 20 platforms.
  • 19. PHP • Scripting language. • Server side technology. • Fast and stable. • Secure and reliable.
  • 20. Conclusion • Addressing the problem of spamming. • A social network to disperse fingerprints. • User Friendly. • Easy email characterization. • Efficient design. • Flexible. • Global Solution.
  • 21. References [1] Wikipedia.2011.Whitelist.[Online] . Available: http://en.wikipedia.org/wiki/Whitelist#Email_whitelists [2] Jaeyeon Jung and Emil Sit, “An Empirical Study of Spam Traffic and the Use of DNS Black Lists,” in Proc. 4th ACM SIGCOMM Conference on Internet measurement, Oct. 25-27, 2004, pp.370-375. [3] Wikipedia. 2011. DNSB. [Online] . Available: http://en.wikipedia.org/wiki/DNSBL [4] Wikipedia. 2011. Content filtering. [Online]. Available: http://en.wikipedia.org/wiki/Content_filtering [5] E. P. Sanz, J. M. G. Hidalgo and J. C. C. Pérez, “Email Spam Filtering,” in Advances in computers, vol 74, 2008, ch. 3, pp. 45- 114. [6] M. R. Islam and W. Zhou, “An innovative analyzer for email classification based on grey list analysis,” in Proc. of the IFIP International Conference on Network and Parallel Computing, Sep.18-21, 2007, pp. 176–182. [7] Wikipedia. 2011 . Botnet, [Online]. Available: http://en.wikipedia.org/wiki/Botnet [8] B. Leiba and J. Fento, “DomainKeys Identified mails (DKIM): Using Digital signatures for Domain Verifcation”, in CEAS 2007, 4th Conference on E-mail and Anti-Spam, Aug. 2-3, 2007. [9] H. Esquivel, Aditya Akella and T. Mori, “On the Effectiveness of IP Reputation for Spam Filtering,” in Proc. 2nd Int. Conference Commun. Syst. and Networks (COMSNETS), Jan. 5-9, 2010, pp. 1-10. [10] Wikipedia. 2011 . CAPTCHA. [Online] . Available: http://en.wikipedia.org/wiki/CAPTCHA [11] Carnegie Mellon University. 2000-2010. The Official CAPTCHA Site. [Online]. Available: http://www.atm.comhttp://www.captcha.net [12] A. Obied, 2007. Bayesian Spam Filtering. [Online]. Available: http://ahmed.obied.net/research/papers/spam_paper.pdf [13] M. Sahami, S. Dumais, D. Heckerman and E. Horvitz, “A Bayesian approach to filtering junk e-mail,” in Proc. AAAI Workshop on Learning for Text Categorization, 1998, pp. 55-62.
  • 22. [14] E. Damiani, S. De Capitani di Vimercati, S. Paraboschi and P. Samarati, “P2P-Based Collaborative Spam Detection and Filtering,” in Proc. 4th Int. Conference on Peer-to-Peer Computing, Aug. 25-27, 2004, pp. 176-183. [15] Wikipedia. 2011 . MD5. [Online] . Available: http://en.wikipedia.org/wiki/MD5 [16] Wikipedia. 2011 . LAMP. [Online] . Available: http://en.wikipedia.org/wiki/LAMP_(software_bundle) [17] Wikipedia. 2011. Linux. [Online] . Available: http://en.wikipedia.org/wiki/Linux [18] Wikipedia. 2011. Apache HTTP Server. [Online]. Available: http://en.wikipedia.org/wiki/Apache_HTTP_Server [19] Oracle Corporation and/or its affiliates. 2011. MySQL. [Online]. Available: http://www.mysql.com/why-mysql [20] Wikipedia. 2011 . MySQL. [Online] . Available: http://en.wikipedia.org/wiki/MySQL [21] The PHP Group. 2001-2011. PHP: Hypertext Preprocessor. [Online]. Available: http://gr.php.net [22] C. Stewart, 2006. The Advantages of PHP. [Online]. Available: http://www.designersplayground.com/articles/118/1/The- Advantages-of- PHP/Page1.html [23] cplucpluc.com. Information on the C++ language. [Online]. Available: http://www.cplusplus.com/info [24] Oracle. Java. [Online]. Available: http://java.com/en [25] Python Software Foundation. 1990-2011. Python Programming Language. [Online]. Available: http://www.python.org [26] Wikipedia. 2011 . Javascript. [Online]. Available: http://en.wikipedia.org/wiki/Javascript
  • 24. Do you still have any question ?