{"id":6940,"date":"2019-10-05T22:20:19","date_gmt":"2019-10-05T22:20:19","guid":{"rendered":"http:\/\/on-line-interactivity.com\/blog\/2019\/10\/05\/how-spammers-fool-bayesian-filters\/"},"modified":"2019-10-05T22:20:19","modified_gmt":"2019-10-05T22:20:19","slug":"how-spammers-fool-bayesian-filters","status":"publish","type":"post","link":"https:\/\/on-line-interactivity.com\/blog\/how-spammers-fool-bayesian-filters\/","title":{"rendered":"How Spammers Fool Bayesian Filters"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><p><body>&#13;<\/p>\n<div align=\"center\">&#13;<\/p>\n<p><a href=\"https:\/\/on-line-interactivity.com\">&#13;<br \/>\n  <img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/on-line-interactivity.com\/blog\/wp-content\/uploads\/2019\/12\/abbtop.jpg\" width=\"800\" height=\"120\"\/><\/a><br \/><a href=\"http:\/\/www.website.ws\/kvmlm2\/my.dhtml?sponsor=geekzonehostingcom&amp;bannercode=gif002&amp;language=english\"><img decoding=\"async\" src=\"http:\/\/images.website.ws\/images\/english\/banners\/kvmlm2\/468x60_02.gif\" border=\"0\"\/><\/a><\/p>\n<p>&#13;<\/p>\n<table width=\"800\" border=\"0\" cellspacing=\"0\" cellpadding=\"5\">\n<tr>\n<td colspan=\"2\">&#13;<br \/>\n\t  &#13;<\/p>\n<div align=\"center\">&#13;<br \/>\n\t     <script type=\"text\/javascript\"><![CDATA[<!--\ngoogle_ad_client = \"pub-5712520513640847\";\ngoogle_ad_width = 728;\ngoogle_ad_height = 90;\ngoogle_ad_format = \"728x90_as\";\ngoogle_ad_type = \"text_image\";\ngoogle_ad_channel =\"\";\ngoogle_color_border = \"336699\";\ngoogle_color_bg = \"FFFFFF\";\ngoogle_color_link = \"0000FF\";\ngoogle_color_url = \"008000\";\ngoogle_color_text = \"000000\";\n\/\/-->]]><\/script><script type=\"text\/javascript\" src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\"><![CDATA[\n         ]]><\/script>   &#13;<br \/>\n\t  \u00a0<\/div>\n<\/td>\n<p>&#13;<br \/>\n    <\/tr>\n<tr>\n<td width=\"260\" valign=\"top\">\n<p>\u00a0&#13;<br \/>\n\t  &#13;<br \/>\n\t  &#13;\n\t  <\/p>\n<div align=\"left\"><span class=\"style23\">&#13;<\/p>\n<p align=\"left\" class=\"style23\">Article Navigation <\/p>\n<p>&#13;<br \/>\n        <a href=\"index.html\"><font size=\"3\">Back To &#13;<br \/>\n          Main Page <\/font> <\/a> &#13;<\/p>\n<p\/><\/span><\/div>\n<p>&#13;<\/p>\n<p align=\"left\"\/>\n<hr\/>\n<p align=\"left\"><script type=\"text\/javascript\"><![CDATA[<!--\ngoogle_ad_client = \"pub-5712520513640847\";\ngoogle_ad_width = 250;\ngoogle_ad_height = 250;\ngoogle_ad_format = \"250x250_as\";\ngoogle_ad_type = \"text\";\ngoogle_ad_channel =\"\";\ngoogle_color_border = \"FFFFFF\";\ngoogle_color_bg = \"FFFFFF\";\ngoogle_color_link = \"0000FF\";\ngoogle_color_url = \"008000\";\ngoogle_color_text = \"000000\";\n\/\/-->]]><\/script><script type=\"text\/javascript\" src=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\"><![CDATA[\n            ]]><\/script><\/p>\n<p>&#13;<br \/>\n            \u00a0<\/p>\n<p align=\"left\"><b><a href=\"index.html\"><font size=\"4\">&#13;<br \/>\n      <span style=\"background-color: #FF6600\">Click Here<\/span><\/font><\/a><\/b><font size=\"4\"><span style=\"background-color: #FF6600\"> &#13;<br \/>\n      for more articles<\/span><\/font><\/p>\n<\/td>\n<p>&#13;<\/p>\n<td width=\"514\" valign=\"top\">\n<div align=\"left\">&#13;<\/p>\n<table width=\"99%\" height=\"114\">\n<tr>\n<td height=\"45\"><span class=\"style7\"><!-- Search Google -->&#13;<br \/>\n<center>&#13;<\/p>\n<form method=\"get\" action=\"http:\/\/www.google.com\/custom\" target=\"_top\">&#13;<\/p>\n<table bgcolor=\"#ffffff\">\n<tr>\n<td nowrap=\"nowrap\" valign=\"top\" align=\"left\" height=\"32\">&#13;<br \/>\n<a href=\"http:\/\/www.google.com\/\">&#13;<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.google.com\/logos\/Logo_25wht.gif\" border=\"0\" alt=\"Google\" align=\"middle\" width=\"75\" height=\"32\"\/><\/a>&#13;<br \/>\n<input type=\"text\" name=\"q\" size=\"31\" maxlength=\"255\" value=\"\"\/><input type=\"submit\" name=\"sa\" value=\"Search\"\/><input type=\"hidden\" name=\"client\" value=\"pub-5712520513640847\"\/><input type=\"hidden\" name=\"forid\" value=\"1\"\/><input type=\"hidden\" name=\"ie\" value=\"ISO-8859-1\"\/><input type=\"hidden\" name=\"oe\" value=\"ISO-8859-1\"\/><input type=\"hidden\" name=\"cof\" value=\"GALT:#008000;GL:1;DIV:#336699;VLC:663399;AH:center;BGC:FFFFFF;LBGC:336699;ALC:0000FF;LC:0000FF;T:000000;GFNT:0000FF;GIMP:0000FF;FORID:1;\"\/><input type=\"hidden\" name=\"hl\" value=\"en\"\/><\/td>\n<\/tr>\n<\/table>\n<\/form>\n<p>&#13;<br \/>\n<\/center>&#13;<br \/>\n<!-- Search Google -->&#13;<br \/>\n<\/span><\/td>\n<p>&#13;<br \/>\n            <\/tr>\n<tr>\n<td align=\"left\" height=\"22\">\n<div align=\"justify\"><span class=\"style7\">&#13;<br \/>\n                <font color=\"#FB7014\" size=\"4\" face=\"Tahoma\">How Spammers Fool Bayesian Filters &#8211; And How to Stop Them<\/font><\/span><\/div>\n<\/td>\n<p>&#13;<br \/>\n            <\/tr>\n<tr>\n<td align=\"left\" height=\"19\">\n<div align=\"justify\"><span class=\"style2\">by: &#13;<br \/>\n                <font size=\"3\" face=\"Times New Roman\" color=\"#FB7014\">Paul Judge, CTO, CipherTrust, Inc.<\/font><\/span><\/div>\n<\/td>\n<p>&#13;<br \/>\n            <\/tr>\n<tr>\n<div id=\"article\">\n<td align=\"left\" height=\"12\"><span class=\"style2\">Effectively stopping spam over the long-term requires much more than blocking individual IP addresses and creating rules based on keywords that spammers typically use. The increasing sophistication of spam tools coupled with the increasing number of spammers in the wild has created a hyper-evolution in the variety and volume of spam. The old ways of blocking the bad guys just don\u0092t work anymore. &#13;&#13;<\/p>\n<p>Examining spam and spam-blocking technology can illuminate how this evolution is taking place and what can be done to combat spam and reclaim e-mail as the efficient, effective communication tool it was intended to be. &#13;&#13;<\/p>\n<p>One method used to combat spam is Bayesian Filtering. Named after Thomas Bayes, an English mathematician, Bayesian Logic is used in decision making and inferential statistics. Bayesian Filers maintain a database of known spam and ham, or legitimate email. Once the database is large enough, the system ranks the words according to the probability they will appear in a spam message. &#13;&#13;<\/p>\n<p>Words more likely to appear in spam are given a high score (between 51 and 100), and words likely to appear in legitimate email are given a low score (between 1 and 50). For example, the words \u0093free\u0094 and \u0093sex\u0094 generally have values between 95 and 98, whereas the words \u0093emphasis\u0094 or \u0093disadvantage\u0094 may have a score between 1 and 4. Commonly used words such as \u0093the\u0094 and \u0093that\u0094, and words new to the Bayesian filters are given a neutral score between 40 and 50 and would not be used in the system\u0092s algorithm. &#13;&#13;<\/p>\n<p>When the system receives an email, it breaks the message down into tokens, or words with values assigned to them. The system utilizes the tokens with scores on the high and low end of the range and develops a score for the email as a whole. If the email has more spam tokens than ham tokens, the email will have a high spam score. The email administrator determines a threshold score the system uses to allow email to pass through to users. &#13;&#13;<\/p>\n<p>Bayesian filters are effective at filtering spam and minimizing false positives. Because they adapt and learn based on user feedback, Bayesian Filers produce better results as they are used within an organization over time. They are not, however, foolproof. Spammers have learned which words Bayesian Filters consider spammy and have developed ways to insert non-spammy words into emails to lower the message\u0092s overall spam score. By adding in paragraphs of text from novels or news stories, spammers can dilute the effects of high-ranking words. Text insertion has also caused normally legitimate words that are found in novels or news stories to have an inflated spam score. This may potentially render Bayesian filters less effective over time. &#13;&#13;<\/p>\n<p>Another approach spammers use to fool Bayesian filters is to create less spammy emails. For example, a spammer may send an email containing only the phrase, \u0093Here\u0092s the link\u0085\u0094. This approach can neutralize the spam score and entice users to click on a link to a Web site containing the spammer\u0092s message. To block this type of spam, the filter would have to be designed to follow the link and scan the content of the Web site users are asked to visit. This type of filtering is not currently employed by Bayesian filters because it would be prohibitively expensive in terms of server resources and could potentially be used as a method of launching denial of service attacks against commercial servers. &#13;&#13;<\/p>\n<p>As with all single-method spam filtering methodologies, Bayesian filters are effective against certain techniques spammers use to fool spam filters, but are not a magic bullet to solving the spam problem. Bayesian filters are most effective when combined with other methods of spam detection. &#13;&#13;<\/p>\n<p>The Solution&#13;&#13;<br \/>\n<br \/>When used individually, each anti-spam technique has been systematically overcome by spammers. Grandiose plans to rid the world of spam, such as charging a penny for each e-mail received or forcing servers to solve mathematical problems before delivering e-mail, have been proposed with few results. These schemes are not realistic and would require a large percentage of the population to adopt the same anti-spam method in order to be effective. You can learn more about the fight against spam by visiting our website at www.ciphertrust.com and downloading our whitepapers.&#13;&#13;<\/p>\n<hr size=\"-1\"\/>&#13;<br \/>\n About the author:<\/p>\n<p>&#13;<br \/>\n  Dr. Paul Judge is a noted scholar and entrepreneur. He is Chief Technology Officer at CipherTrust, the industry&#8217;s largest provider of enterprise email security. The company\u0092s flagship product, IronMail provides a best of breed <a href=\"http:\/\/www.ciphertrust.com\/products\/spam_and_fraud_protection\/index.php\">enterprise anti spam solution<\/a> designed to stop spam, phishing attacks and other email-based threats. Learn more by visiting <a href=\"http:\/\/www.ciphertrust.com\/products\/spam_and_fraud_protection\/index.php\">www.ciphertrust.com\/products\/spam_and_fraud_protection<\/a> today.&#13;<\/p>\n<p><font size=\"-2\">Circulated by <a href=\"http:\/\/www.geekzonehosting.com\">GeekZoneHosting.Com &#8211; Register a domain name and get hosting for your own Adsense Website just like this one<\/a><\/font>&#13;<\/p>\n<hr size=\"-1\"\/><\/span><\/td>\n<p>&#13;\n            <\/p><\/div>\n<\/tr>\n<\/table>\n<\/div>\n<p align=\"left\">\u00a0        <\/p>\n<p>&#13;\n      <\/td>\n<p>&#13;<br \/>\n    <\/tr>\n<\/table>\n<hr width=\"800\" noshade=\"noshade\"\/><a href=\"https:\/\/on-line-interactivity.com\/ADSENSEWEBSITES\">RETURN TO ADSENSE BUSINESS-IN-A-BOX MASTER ARTICLE INDEX<\/a><\/p>\n<hr width=\"800\" noshade=\"noshade\"\/>\n<div class=\"fb-share-button\" data-href=\"https:\/\/on-line-interactivity.com\/\" data-layout=\"button\" data-size=\"large\"><a target=\"_blank\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fon-line-interactivity.com%2F&amp;src=sdkpreparse\" class=\"fb-xfbml-parse-ignore\" rel=\"noopener noreferrer\">Share<\/a><\/div>\n<p>&#13;<\/p>\n<div id=\"fb-root\"\/>&#13;<br \/>\n<script async=\"\" defer=\"defer\" crossorigin=\"anonymous\" src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&amp;version=v4.0&amp;appId=103650273035821&amp;autoLogAppEvents=1\"\/><!-- End of FACEBOOK SHARE BUTTON CODE --><span class=\"style6\"><br \/><span class=\"style2\">\u00a92019 - All Rights Reserved by <a href=\"http:\/\/HelpMeFindFreedom.Online\">HelpMeFindFreedom.Online<\/a><br \/><a href=\"http:\/\/www.website.ws\/kvmlm2\/my.dhtml?sponsor=geekzonehostingcom&amp;bannercode=gif002&amp;language=english\"><img decoding=\"async\" src=\"http:\/\/images.website.ws\/images\/english\/banners\/kvmlm2\/468x60_02.gif\" border=\"0\"\/><\/a><\/span><\/span><\/div>\n<p>&#13;<br \/>\n<\/body><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; \u00a0 &#13; \u00a0&#13; &#13; &#13; &#13; Article Navigation &#13; Back To &#13; Main Page &#13; &#13; &#13; \u00a0 &#13; Click Here &#13; for more articles &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; &#13; How Spammers Fool Bayesian Filters &#8211; And How to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-6940","post","type-post","status-publish","format-standard","hentry","category-adsense-business-in-a-box"],"_links":{"self":[{"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/posts\/6940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/comments?post=6940"}],"version-history":[{"count":0,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/posts\/6940\/revisions"}],"wp:attachment":[{"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/media?parent=6940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/categories?post=6940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/on-line-interactivity.com\/blog\/wp-json\/wp\/v2\/tags?post=6940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}