Font Size: a A A

Mail Security Audit And Filtering Technology And Its Implementation

Posted on:2004-07-19Degree:MasterType:Thesis
Country:ChinaCandidate:X Y XiangFull Text:PDF
GTID:2208360092998916Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the swift development of Internet, e-mail has been becoming the fastest and most economical modern way for communication. It offers people great convenience. However, e-mail begins to be the carrier of Spam, virus, the malicious program or some secret mails, which fiercely threaten the safety of the computer system. So how to solve its security problem properly has become a significant and practical topic.The e-mail filter is one of the key technologies used to weaken or eliminate these troubles. Then Safety Audit is a vital part in safety system, which interacts and cooperates with other measures.First, this essay discusses the current situation and the harm of Spam and put forwards some anti-Spam measures, some key techniques as well. Simultaneously, it gives analyses and studies to the e-mail system and structure, and has established the e-mail filter model.Next, the essay takes a penetrating study on the various present filter techniques. It designs a kind of Spam filter, based on the data mining. Besides, based on the SMTP filter, regulations and appendix scanning, it designs an e-mail filter examination system, which has multiple functions, deleting the malicious script included. In addition, the essay suggests an e-mail system with three ranks: customer terminal, e-mail agency and e-mail server.Finally, the essay presents analysis and research on the function demand of the safety audit, other audit techniques as well as the security log analysis principle. It provides the effective way and process to analyze the e-mail server log and gives a statistical study to the e-mail flux. In addition, it makes a detailed introduction on an e-mail safety audit system, targeting the content.
Keywords/Search Tags:E-mial, Spam, E-mail filter, Filter model, Security audit, Security log
PDF Full Text Request
Related items