The silent network: denying the spam and malware chatter using free tools: BSDCan, Ottawa, May 18th 2007 | ||
---|---|---|
Prev | Next |
Principle: Look for known bad content
Virus scanners
Signature list comparisons (hash or bruteforce)
Ever-growing lists (100,000s of signatures)
Spam filters
Signature based
Rule based (spamassassin, dspam)
Statistical methods (Bayes, Chi-Square, Geometric, and Markovian Discrimination)
Processor, memory intensive