Spamming

Anti Spamming Techniques

Spamming Internet Security Whitepapers

In this article will we first look at some of the existing methods to identify an email as a spam? We look at the pros and cons of the existing methods and what are the current challenges in this domain. This article also needs a special mention to Paul Graham, for his wok in this field and putting up perhaps the most comprehensive tutorials in this domain on his homepage.

Anti-Spam Initiative

Spamming Internet Security Whitepapers

What is SPAM? No agreed universal spam definition. Confusion on what is spam and not! –end users subscribing to e-newsletters, etc. Definition adopted by the Anti-Spam Committee –inspired by the Australian and European Union definitions, "Unsolicited communications sent in bulk over an electronic media such as e-mail, mobile (SMS, MMS) and instant messaging services, usually with the objective of marketing products or services."

SendIgence User's Manual

Spamming Internet Security Whitepapers

SendIgence is a wrapper for programs for sending e-mails that are called from commandline and their operation is controlled through input command-line arguments. An example of such a program is sendEmail. It is simple to use and it can be run either interactively or by using an instruction file in XML format. Instruction files can be created in interactive SendIgence session or edited manually (an XML editor is recommended). The program is intended to extend capabilities of e-mailing programs by sending large amount of e-mails, dividing recipients to smaller groups, timing the process of sending e-mails, extracting addresses from files, etc.

Spam Monitor Survey Volume II

Spamming Internet Security Whitepapers

The survey is representative of a cross-section of industry sectors and geographies. The largest groups of respondents were based in the USA (421), UK (398), Australia (148), France (92) and Germany (66). Responses were received from 45 countries in all. Respondents worked in small, medium and large organisations. 38.7 per cent worked in organisations of fewer than 50 people, 18 per cent in organisations of between 50 and 250 people and 30.3 per cent worked in organisations with over 1,000 people. The survey was made up of a total of 50 questions which were put into 3 specific areas: Technology, Education and Legislation.

Spam: A Security Issue

Spamming Internet Security Whitepapers

Spam has become a plague for email users around the world. The sheer volume of spam is annoying as users have to clean their inboxes from these unwanted messages on a daily basis. In addition, the aggressive and often sexually explicit nature of spam is offensive and frustrating to most end users. Spam is clearly a nuisance, but in this white paper, we will demonstrate how spam has evolved into a true security issue for organizations.

The Difficulties of Tracing Spam Email

Spamming Internet Security Whitepapers

The email system design can easily be exploited by spammers who send inaccurate information. All email on the Internet is sent via a protocol called Simple Mail Transfer Protocol(" smtp"). Ostensibly, smtp is designed to capture information about the route that an email message travels from its sender to its recipient. In actuality, the smtp protocol provides no security: email is not private, it can be altered en route, and there is no way to validate the identity of the email source. In other words, when a user receives an email message, there is no way to tell who sent the email and who has seen it. The lack of security in smtp, and specifically the lack of reliable information identifying the email source, is regularly exploited by spammers and allows for considerable fraud on the Internet (such as identity theft or "phishing"). This section describes a few features of smtp relevant to spam.

Web Spam Taxonomy

Spamming Internet Security Whitepapers

Web spamming refers to actions intended to mislead search engines into ranking some pages higher than they deserve. Recently, the amount of web spam has increased dramatically, leading to a degradation of search results. This paper presents a comprehensive taxonomy of current spamming techniques, which we believe can help in developing appropriate countermeasures.