An Automated Whitelist is a
whitelistwhich was created and/or is maintained by a system that analyzes bi-directional email.
Use by Anti-Spam Systems
An Automated Whitelist is a
whitelistwhich is created or maintained by a system that monitors incoming and/or outgoing whitelistwithout a need for human intervention.
Optionally, some automated whitelisting systems can review records of past email communications which were previously stored within an
email server's (or email client's) archives for inclusion in the whitelist.
This functionality is an "enhancement to creating a whitelist manually", such as exporting customer, vendor, friends, or other contact lists from various sources, to then tediously assemble them into a whitelist. Additionally, the use of such a system removes the difficult task of maintaining a whitelist as new email relationships are formed.
How it Works
P. Oscar Boykin and Vwani Roychowdhury of the Department of Electrical Engineering, University of California point out, "We exploit the properties of social networks to construct an automated anti-spam tool which processes an individual user's personal email network to simultaneously identify the user's core trusted networks of friends, as well as subnetworks generated by spams"; and [http://xxx.lanl.gov/abs/cond-mat/0402143v1 their extensive research] discovers a "surprisingly effective technique" with superior levels of "accuracy and automation"; they go on to explain, "it requires no user intervention or supervised training; second, it results in no false negatives i.e., spam being misclassified as non-spam, or vice versa" [Boykin, P., Roychowdhury, V.: "Personal Email Networks: An Effective Anti-Spam Tool", IEEE Computer, Vol. 38, No. 4, pages 61-68, April 2005, http://xxx.lanl.gov/abs/cond-mat/0402143v1] .
anti-spamsystems which use this method have been known to oversimplify a whitelist by adding only the domain nameportion of the email addresses, thereby allowing undesirable mail from spammersto slip through.
Other systems have been known to inappropriately add spammers due to clients using autoresponders, such as an "I'm Out of the Office Today" message, or spammers using a read receipt.
Most systems are known to require all outgoing email to be funneled through their system for analysis and automated inclusion; whereas, others offer a small
pluginfor the existing email server, thereby not altering the existing outbound delivery path.
Most all sources describing the functionality and use of an automated whitelist are specifically tied to a particular anti-spam product's implementation; therefor, "in the interest of maintaining neutrality", these common sources will not be referenced herein.
Wikimedia Foundation. 2010.
Look at other dictionaries:
DNSWL — (DNS based whitelist) is both a generic term and a specific list. The specific list DNSWL.org, lists over 50,000 legitimate SMTP senders. Contents 1 Generic need for whitelisting 2 DNSWL.org 3 … Wikipedia
Challenge–response spam filtering — This article is about e mail. For other uses, see Challenge response authentication. A challenge–response (or C/R) system is a type of spam filter that automatically sends a reply with a challenge to the (alleged) sender of an incoming e mail. In … Wikipedia
Electronic mailing list — For information about the Wikipedia mailing lists, see Wikipedia:Mailing lists An electronic mailing list is a special usage of email that allows for widespread distribution of information to many Internet users. It is similar to a traditional… … Wikipedia
Anti-spam techniques (e-mail) — To prevent e mail spam, both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users and administrators. No one… … Wikipedia
Challenge-response spam filtering — A Challenge response (or C/R) system is a type of spam filter that automatically sends a reply with a challenge to the (alleged) sender of an incoming e mail. In this reply, the sender is asked to perform some action to assure delivery of the… … Wikipedia
Anti-spam techniques — To prevent e mail spam (aka unsolicited bulk email), both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users… … Wikipedia
Rootkit — A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators by subverting standard operating system functionality or other applications. The term rootkit is a concatenation… … Wikipedia
Port knocking — In networking, port knocking is a method of externally opening ports on a firewall by generating a connection attempt on a set of prespecified closed ports. Once a correct sequence of connection attempts is received, the firewall rules are… … Wikipedia
Mail Abuse Prevention System — The Mail Abuse Prevention System (MAPS) is an organisation that provides anti spam support by maintaining a DNSBL. They provide five black lists, categorising why an address or an IP block is listed: Real time Blackhole List (RBL), the one for… … Wikipedia
Intel Active Management Technology — (AMT) is hardware based technology for remotely managing and securing PCs out of band.] cite web |title=New Intel Based Laptops Advance All Facets of Notebook PCs|url=http://www.intel.com/pressroom/archive/releases/20080715comp… … Wikipedia