Font Size: a A A

Design And Implementation Of The Integrated Anti-spam System Data Center Side

Posted on:2007-03-06Degree:MasterType:Thesis
Country:ChinaCandidate:H ZhengFull Text:PDF
GTID:2208360185456276Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With wide application of email, it offers people great convenience in work, study, and life. Unfortunately, spams begin to be the carrier of business advertisements, the malicious programs or some sensitive mails at the same time, which fiercely threaten the safety of the computer systems, and the lives of people. Therefore, anti-spam problem has become an international, significant and practical topic now.The email filter is one of the key technologies of anti-spam. But current anti-spam systems, in general, are designed and deployed independently, it is very difficult for Department of Network Safety Management to supervise these anti-spam systems. So it is essential to establish a integrated anti-spam system.This paper presents a integrated anti-spam system. It can achieve unified managing much spam filters deployed everywhere by distributing filter rules to them, analyzing and disposing of alarm signals from them. The system not only sends filter rules to every MSP(Mail Service Provider)'s spam filter system, but also accepts spam samples from the spam filter systems of MSP. Because of the share of filter rules and filter policies, it can reduce total cost of anti-spam system. The system supports multistage interconnection and provides Department of Network Safety Management a set of whole solve scheme for email safety inspect and early alarm in massive networks, which has great social significance and economic value.In this article, first we study various kinds of technologies related to anti-spam, then we fulfill the design and realization of the data center subsystem, which is a key subsystem in the integrated anti-spam system. The main contents of this paper are listed as follow.1. This paper makes a detailed introduction on the definition, class, history, and the harm of spam. It also takes a research on the current popular spam filter technologies such as based on IP address, based on the head or envelope of the email, based on the contents of the email, based on server, and based on client. In addition, it gives a study to transfer principle of email, SMTP protocol, POP3 protocol, IMAP protocol, XML, and so on.
Keywords/Search Tags:spam, rule, supervise
PDF Full Text Request
Related items