earticle

논문검색

An In-depth Analysis of Spam and Spammers

초록

영어

Electronic mail services have become an important source of communication for millions of people all over the world. Due to this tremendous growth, there has been a significant increase in spam traffic. Spam messes up user’s inbox, consumes network resources and spread worms and viruses. In this paper we study the characteristics of spam and the technology used by spammers. In order to counter anti spam technology, spammers change their mode of operation, therefore continues evaluation of the characteristics of spam and spammers technology has become mandatory. These evaluations help us to enhance the existing anti spam technology and thereby help us to combat spam effectively. In order to characterize spam, we collected four hundred thousand spam mails from a corporate mail server for a period of 14 months from January 2006 to February 2007. For analysis we classified spam based on attachment and contents. We observed that spammers use software tools to send spam with attachment. The main features of this software are hiding sender’s identity, randomly selecting text messages, identifying open relay machines, mass mailing capability and defining spamming duration. Spammers do not use spam software to send spam without attachment. From our study we observed that, four years old heavy users email accounts attract more spam than four years old light users mail accounts. Relatively new email accounts which are 14 months old do not receive spam. But in some special cases like DDoS attacks, we found that new email accounts receive spam and 14 months old heavy users email accounts have attracted more spam than 14 months old light users. We believe that this analysis could be useful to develop more efficient anti spam techniques.

목차

Abstract
 1. Introduction
 2. Related work
 3. Data Collection
 4. Spam Classification and Characteristics
  4.1. Spam without attachment
  4.2. Spam with attachment
 5. Spammers Technology
  5.1. Spam without attachment
  5.2. Spam with attachment
 6. Spam vulnerable email accounts
 7. Conclusion
 References

저자정보

  • Dhinaharan Nagamalai Wireilla Net Solutions Inc,Chennai,India
  • Beatrice Cynthia Dhinakaran Department of Computer Engineering, Hannam University, South Korea
  • Jae Kwang Lee Department of Computer Engineering, Hannam University, South Korea

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.