Browse Definitions :
Definition

Bayesian filter

A Bayesian filter is a program that uses Bayesian logic , also called Bayesian analysis, to evaluate the header and content of an incoming e-mail message and determine the probability that it constitutes spam . Bayesian logic is an extension of the work of the 18th-century English mathematician Thomas Bayes.

Bayesian filters aren't perfect, but because spam characteristically contains certain types of text, such a program can be amazingly effective when it is fine-tuned over a period of time. A Bayesian filter works by categorizing e-mail into groups such as "trusted" and "suspect," based on a probability number (ranging from 0 or 0% to 1 or 100%). The categories are defined according to user preference.

Spammers are constantly trying to invent new ways to defeat spam filters. Certain words, commonly identified as characteristic of spam, can be altered by the insertion of symbols such as periods, or by the use of nonstandard but readable characters such as Â, Ç, Ë, or Í. But as the user instructs a Bayesian filter to quarantine or delete certain messages, the filter incorporates this data into its future actions. Thus a Bayesian filter improves with time, so it becomes more likely to block spam without also blocking desired messages.

Bayesian filters are best used in conjunction with anti-virus program s. Malicious viruses or worm s can occasionally appear as attachments to e-mail messages, even from trusted sources.

This was last updated in September 2005

Continue Reading About Bayesian filter

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cracker

    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in ...

  • Malware quiz: Test your knowledge of types and terms

    Malware trends are constantly evolving, but older techniques are still often used in cyber attacks today. Test your knowledge of ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

  • erasure coding

    Erasure coding (EC) is a method of data protection in which data is broken into fragments, expanded and encoded with redundant ...

  • continuous data protection

    Continuous data protection (CDP), also known as continuous backup, is a backup and recovery storage system in which all the data ...

Close