MODEL PENANGANAN E-MAIL SPAM DENGAN PENDEKATAN TEKNIK SMTPI

Nandang Iriadi

Abstract


The ability to use e-mail as essential to the ability to use the phone. E-mail system is very important that
many people would complain if the e-mail system can not waste bekerja.E-mail (SPAM) is a problem almost
all Internet users and the various efforts to control has been done. Without knowing the factors that cause
the occurrence of SPAM, then this problem will still continue. This paper set forth an analysis of SPAM with
SMTP Method I, to find fault in the system and the significant factors that cause other Spam.Analisis
ontology of the system architecture of e-mail describing the parts and systems so that such connectedness
can identify system weaknesses. Then all the significant factors associated with each other by relations of
causality and proven method SMTPI messages sent by SMTP will be sent in the queue. SMTP will avoid
replying to the message from the queue if connected to a remote machine .. is the use of filtering solutions
that are considered quite effective from the technical point of view. filtering is essentially aimed at helping
e-mail recipients to filter (select) which automatically e-mail right from spam e-mail, saving time and
tenaga.Hasil analysis showed that not only technical factors such as the architecture of e-mail system and
authentication process that factors in SPAM, but also other factors such as less sweeping application of
security policy (security policy), and economic factors such as cost of sending an e-mail is low.
Keyword: E-mail, Spam, E-mail filter,SMTPI Methodics


Full Text:

PDF

References


Bagnall Brian.2000.E-mail Virus Protection

Syngress Publishing, Inc.800 Hingham

StreetRockland, MA 02370

Brenton, Chris dan Cameron

Hunt.2005.,Network Security.Jakarta: Elexmedia

Komputindo.

Costales Bryan , Marcia Flynt.2005. sendmail

Milters A Guide for Fighting Spam Addison

Wesley Professional Pearson Education, Inc.

rights and Contracts Department. Lake Street

Upper Saddle River, NJ 07458

Raharjo, Budi.2005.Keamanan Sistem Informasi

Berbasis Internet. Jakarta :PT Indocisc dan

Bandung:PT Insan Infonesia

Sukmaji Anjik dan Rianto.2008.Jaringan

Komputer.Yogyakarta:Andi

Zdziarski Jonathan A..2005. Ending spam :

Bayesian content filtering and the art of

statistical language classification. No Starch

Press, Inc. 555 De Haro Street, Suite 250, San

Francisco

Referensi Web

Iron Port. 2004.An e-mail security architecture

IronPort Systems, Inc.1100 Grundy Lane, Suite

San Bruno, California 94066

(http://www.ironport.com/pdf/ironport_email_

authentication_wp.pdf) (diakses 20

Agustus 2009)

Krawetz Neal.2004.Anti-Spam Solutions and

Security.

(http://www.securityfocus.com/infocus/1763)

(Diakses 20 Agustus 2009)

B.Postel Jonathan .1982.Simple mail transfer

protocol Information Sciences Institute

University of Southern California 4676

Admiralty Way Marina del Rey,

California90291(http://www.freesoft.org/CIE/

RFC/821/2.htm) (Diakses 20 Agustus 2009)




DOI: https://doi.org/10.31294/p.v11i3.4735

Dipublikasikan oleh LPPM Universitas Bina Sarana Informatika

Jl. Dewi Sartika No. 289, Cawang, Jakarta Timur Telp : 021-8010836, ext. 202
Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License