Sale!
Placeholder

Web-based Anti-UCE Client

10,000 3,000

Product Description

Summary
Unsolicited Commercial Email (UCE) is becoming far more than an inconvenience that can be
overcome with a few presses of the Delete key. It is a severe hindrance to business productivity and
is limiting the effectiveness of the otherwise invaluable tool of electronic mail.
The aim of this project is to conduct an analysis into the phenomenon of Unsolicited Commercial
Email, considering the methodologies employed by its senders and the measures taken to prevent or
intercept it at its destination. This analysis is to culminate in the specification and development of a
Web based email client application that offers protection from UCE for users of remote systems.
The project achieved the implementation and deployment of the email client, which can be accessed
via any computer with an Internet connection and a browser. It is a registration based service that acts
as an interface for user’s existing POP3 email accounts, the motivation for which being the lack of
UCE filtering facilities inherent to most ISP based accounts (at least without extra, not insignificant,
cost). This system not only offers UCE filtration but allows account holders to configure their level
of protection by building custom content filter rules that are recalled and applied each time that user
logs on. The defence is further enhanced by the use of easily customisable whitelists and blacklists.

Table of Contents
Summary i
Acknowledgements ii
Chapter 1 – Introduction 1
1.1 – Project Outline 1
1.1.1 – Objectives 1
1.1.2 – Minimum Requirements 2
1.2 – Project Management 2
1.2.1 – Changes to original project 2
1.2.2 – Schedule 3
Chapter 2 – Background Research: UCE and it’s Consequences 4
2.1 – Overview of UCE 4
2.1.1 – Definition 4
2.1.2 – Motivation 5
2.1.3 – Who Sends it? 5
2.2 – Consequences 6
2.2.1 – Cost of UCE 6
2.2.2 – Secondary Effects 7
2.3 – Existing Anti-UCE Projects 9
2.3.1 – Brightmail 9
2.3.2 – Spamhaus 10
2.3.3 – SpamArchive 10
Chapter 3 – Methods of Attack 12
3.1 – Header Manipulation 12
3.1.1 – Email Vulnerability 12
3.1.2 – Forged Headers 12
3.2 – Injection 13
3.2.1 – Rogue ISPs 13
3.2.2 – One-shot Accounts 13
3.2.3 – Relayers 14
Chapter 4 – Methods of Defense 15
4.1 – Preventative Measures 15
4.1.1 – General Codes of Practice 15
4.1.2 – Secondary Addresses 16
4.2 – Filtration 17
4.2.1 – Origin-based 17
4.2.2 – Feature-based 19
4.2.3 – Keyword-based 20
4.2.4 – Statistical Keyword-based (Naïve Bayesian) 20
4.3 – Proposals for the Future 23
4.3.1 – Data Labelling 23
4.3.2 – Micropayments 24
Chapter 5 – Requirements Analysis 25
5.1 – Introduction 25
iv
5.1.1 – Aim of System 25
5.1.2 – Motivation: Identification of Need 25
5.2 – Existing Systems 26
5.2.1 – Mail2Web 26
5.2.2 – MyMailOasis 26
5.3 – Specification 27
5.3.1 – Problem Owner & Intended Users 27
5.3.2 – Requirements 27
5.3.3 – Use Case Diagrams 29
Chapter 6 – System Design 31
6.1 – Technologies 31
6.1.1 – Active Server Pages 31
6.1.2 – Visual Basic Web-Classes (IIS Application) 31
6.1.3 – Chilkat Mail ActiveX Component 32
6.1.4 – SQL Server 32
6.2 – HCI: Web Usability 32
6.2.1 – Introduction to Web Usability Guidelines 32
6.2.2 – Application to System Interface 33
6.3 – UCE Protection 33
6.3.1 – Domain-based 33
6.3.2 – Content Filter 34
6.3.3 – Filter Rules 35
Chapter 7 – Implementation 36
7.1 – Methodology 36
7.1.1 – Rational Unified Process 36
7.1.2 – Unified Modelling Language 36
7.2 – System Structure 37
7.2.1 – Deployment Diagram 37
7.2.2 – Activity Diagram 38
7.3 – Development Iterations 39
Chapter 8 – Evaluation 40
8.1 – Criteria for Evaluation 40
8.2 – Test Plan 40
8.2.1 – System Performance: UCE Protection 40
8.2.2 – User Interface 41
8.3 – Results of Testing 42
8.3.1 – System Performance: UCE Protection 42
8.3.2 – User Interface 43
8.4 – Fulfilment of Requirements 43
8.4.1 – Minimum Requirements 44
8.4.2 – System Requirements 45
8.5 – Possible Extensions to Project 45
8.6 – Conclusion 46
Bibliography 47
Appendix A: Project Reflection 50
Appendix B: Project Management 51
Appendix C: Testing

GET THE COMPLETE MATERIAL

INQUIRES:

OUR SERVICES: