Browse Definitions :
Definition

Bayesian filter

A Bayesian filter is a program that uses Bayesian logic , also called Bayesian analysis, to evaluate the header and content of an incoming e-mail message and determine the probability that it constitutes spam . Bayesian logic is an extension of the work of the 18th-century English mathematician Thomas Bayes.

Bayesian filters aren't perfect, but because spam characteristically contains certain types of text, such a program can be amazingly effective when it is fine-tuned over a period of time. A Bayesian filter works by categorizing e-mail into groups such as "trusted" and "suspect," based on a probability number (ranging from 0 or 0% to 1 or 100%). The categories are defined according to user preference.

Spammers are constantly trying to invent new ways to defeat spam filters. Certain words, commonly identified as characteristic of spam, can be altered by the insertion of symbols such as periods, or by the use of nonstandard but readable characters such as Â, Ç, Ë, or Í. But as the user instructs a Bayesian filter to quarantine or delete certain messages, the filter incorporates this data into its future actions. Thus a Bayesian filter improves with time, so it becomes more likely to block spam without also blocking desired messages.

Bayesian filters are best used in conjunction with anti-virus program s. Malicious viruses or worm s can occasionally appear as attachments to e-mail messages, even from trusted sources.

This was last updated in September 2005

Continue Reading About Bayesian filter

SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • resource allocation

    Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic ...

  • chief digital officer (CDO)

    A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create ...

  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close