How good are our weapons in the spam wars?

  title={How good are our weapons in the spam wars?},
  author={Bogdan Hoanca},
  journal={IEEE Technology and Society Magazine},
  • B. Hoanca
  • Published 20 March 2006
  • Computer Science
  • IEEE Technology and Society Magazine
Will there ever be an end to "spam wars"? We are bombarded with unsolicited bulk email, we deploy newer and supposedly better ways of filtering spam, and yet spammers continue to devise creative ways to circumvent our defenses. Over the years, the volume of spam has increased steadily, in spite of the continued efforts to contain it. In order to understand the spam problem and to explore control methods, it is useful to analyze spam control techniques by looking at spam generation and… 

Spam war: Battling ham against spam

  • V. BinduC. Thomas
  • Computer Science
    2012 7th IEEE Conference on Industrial Electronics and Applications (ICIEA)
  • 2012
In this paper a research-based analysis of spam is presented with focus on to the technical analysis of various weapons used in spam war and their leverages on the system.

The Current State of Battle against Spam

An overview of available spam filtering approaches and their drawbacks is provided and the common spammers’ tricks that spammers use to bypass the currently available spam filters are described.

Filtering spam from bad neighborhoods

The novel idea proposed within this paper is to introduce the concept of ‘bad neighborhoods’, which relies solely on analyzing the origin (IP address) of e‐mail messages, as well as possible links within the e-mail messages to websites (URIs).

A learning approach to spam detection based on social networks

A learning approach to spam sender detection based on features extracted from social networks constructed from email exchange logs is proposed and legitimacy scores are assigned to senders based on their likelihood of being a legitimate sender.

A Monitor Tool for Anti-Spam Mechanisms and Spammers Behavior

  • D. M. TaveiraO. Duarte
  • Computer Science
    NOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops
  • 2008
A tool that helps developers of anti-spam systems to monitor the current spammer behavior, monitor the performance of current anti- Spam systems, and analyze new anti-Spam mechanisms developed is presented.

Control of spam: a comparative approach with special reference to India

This paper analyses technological solutions and legal measures in the light of trans-national developments to provide background for any judicial decision making or legislative policy in India.

Taxonomy and control measures of SPAM and SPIM

This paper critically examines the available literature on spam, and the control measures available to control spam, followed by the literature overview related to mobility of devices and how the application of mobile technologies as communication medium has impacted the handling of spam.

A Study of Email Spam and How to Effectively Combat It

The paper addresses the different concerns expressed by the email community and measures the levels of these concerns in terms of age, gender, work productivity and the need to regulate spam spread through the introduction of a spam law.

A New Anti-Spam Protocol Using CAPTCHA

A new protocol is presented for authentication of users which enable us to confirm that a user is a human using CAPTCHA method and can be implemented easily and enjoys high flexibility and versatility.

Detection of Spam Zombies

This paper focuses on a powerful statistical tool called Sequential Probability Ratio Test, which has bounded false positive and false negative error rates on which the Spam Zombie Detection system is based.



Spam and the social-technical gap

This work proposes bridging the gap between society and technology by applying social concepts to technology design and suggests the continued growth of spam is a social problem that needs a social response.

Technical Solutions for Controlling Spam

This paper will attempt to evaluate some of the existing technical solutions to control the ever-increasing volume of unsolicited bulk email.

Shall We Stop All Unsolicited Email Messages?

This paper proposes a combination of cost and filtering approaches: charging senders of massive unknown messages or unsolicited messages based on aggregated filter information and uses theory and simulation to show that the differentiated surcharge mechanism can improve social welfare compared with a stamp or a “perfect” filter.

Personalised, Collaborative Spam Filtering

This paper presents an architecture for personalised, collaborative spam filtering and describes the design and implementation of proof-of-concept, peer-to-peer, signature-based system based on the architecture.

Spam and the Internet. Is it here to stay or can it be eradicated

The growing problem of spam (unsolicited bulk e-mail), which has become a pervasive problem for Internet activity and has important implications for further and higher education institutions, is outlined.

Beyond Identity: Addressing Problems that Persist in an Electronic Mail System with Reliable Sender Identification

This paper considers what the spam problem and its countermeasures would be like under a theoretically ideal sender identification scheme, with some attention to the resource consumption the countermeasures entail—the economics of spam.

\Proof-of-Work" Proves Not to Work

It is concluded that proof-of-work will not be a solution to the problem of spam because spammers can access insecure end-user machines and will steal processing cycles to solve puzzles.

Spam on the Internet: can it be eradicated or is it here to stay?

A discussion of the rise in unsolicited bulk e-mail, its effect on tertiary education, and some of the methods being used or developed to combat it. Includes an examination of block listing, protocol

A Differentiated Message Delivery Architecture to Control Spam

It is argued that the difficulties in controlling spam can be attributed to the lack of receiver control on how different email messages should be delievered on the Internet.

Email Prioritization: Reducing Delays on Legitimate Mail Caused by Junk Mail

This paper develops and calibrates a model of mail server performance, and uses it to predict the performance of the prioritization scheme, and develops and describes an implementation on a standard mail server.