Schryen, 2007 - Google Patents
The e-mail delivery process and its susceptibility to spamSchryen, 2007
- Document ID
- 8256873076732586581
- Author
- Schryen G
- Publication year
- Publication venue
- Anti-Spam Measures: Analysis and Design
External Links
Snippet
Spammers continue to exploit the technological e-mail infrastructure which was not originally designed to tackle security issues like authentication, integrity, secrecy and a mass of unsolicited e-mails. Section 3.1 presents the basics of the e-mail delivery process with a …
- 238000000034 method 0 title abstract description 33
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7249175B1 (en) | Method and system for blocking e-mail having a nonexistent sender address | |
US6321267B1 (en) | Method and apparatus for filtering junk email | |
US7529802B2 (en) | Method for performing multiple hierarchically tests to verify identity of sender of an email message and assigning the highest confidence value | |
AU782333B2 (en) | Electronic message filter having a whitelist database and a quarantining mechanism | |
US10212188B2 (en) | Trusted communication network | |
US20060004896A1 (en) | Managing unwanted/unsolicited e-mail protection using sender identity | |
US8738708B2 (en) | Bounce management in a trusted communication network | |
US7672998B1 (en) | Apparatus and methods for controlling the transmission of messages | |
US20060168017A1 (en) | Dynamic spam trap accounts | |
US8671447B2 (en) | Net-based email filtering | |
US20080177843A1 (en) | Inferring email action based on user input | |
EP1949240A2 (en) | Trusted communication network | |
US20080276318A1 (en) | Spam detection system based on the method of delayed-verification on the purported responsible address of a message | |
KR102176564B1 (en) | Managing method for impersonation, forgery and alteration mail and system | |
US8423618B1 (en) | Systems and methods for blocking unsolicited electronic mail messages | |
US20070088789A1 (en) | Method and system for indicating an email sender as spammer | |
Banday | Technology Corner: Analysing e-mail headers for forensic investigation | |
WO2008005188A2 (en) | Message control system in a shared hosting environment | |
Schryen | The e-mail delivery process and its susceptibility to spam | |
Jin et al. | A detour strategy for visiting phishing urls based on dynamic dns response policy zone | |
KR20220091844A (en) | Managing method for noreply mail and unknown sender mail and system thereof | |
Zadgaonkar et al. | Developing a model to detect e-mail address spoofing using biometrics technique | |
Frei et al. | Mail Non-Delivery Notice Attacks | |
Lieven | Pre-MX spam filtering with adaptive greylisting based on retry patterns | |
Fuhrman | Forensic value of backscatter from email spam |