Taxonomy of anti-spam techniques: Difference between revisions
From ASRG
Jump to navigationJump to search
mNo edit summary |
(→Administrative techniques: Added retaliation) |
||
(3 intermediate revisions by one other user not shown) | |||
Line 6: | Line 6: | ||
* [[Adaptive filters]] | * [[Adaptive filters]] | ||
** [[Bayesian filters]] | |||
** [[Collaborative filters]] | |||
* [[URL filtering]] | * [[URL filtering]] | ||
Line 48: | Line 50: | ||
** [[Sender-ID]] | ** [[Sender-ID]] | ||
** [[SRS]] (Sender Rewriting Scheme) | ** [[SRS]] (Sender Rewriting Scheme) | ||
* [[Marking valid mail client hosts]] | |||
* [[Signatures]] | * [[Signatures]] | ||
Line 67: | Line 71: | ||
* [[Postage]] | * [[Postage]] | ||
* [[Attention bonds]] | * [[Attention bonds]] | ||
* [[Captchas]] | * [[Captchas]] | ||
Line 84: | Line 82: | ||
* [[Abuse Reporting]] | * [[Abuse Reporting]] | ||
* [[Retaliation]] |
Latest revision as of 10:57, 30 September 2010
Many people have invented many anti-spam techniques over the past decade. And a lot of the techniques keep being reinvented. Our goal here is to list all the anti-spam techniques we know, both the good ones and the bad ones.
Message content techniques
SMTP techniques
Address management
Network techniques
Whitelist techniques
- Path validation
- Path validation manual techniques
- SPF (Sender permitted from)
- Sender-ID
- SRS (Sender Rewriting Scheme)