Skip to main content

A Taxonomy of Spam and a Protection Method for Enterprise Networks

  • Conference paper
  • First Online:
Information Networking: Wireless Communications Technologies and Network Applications (ICOIN 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2344))

Included in the following conference series:

Abstract

This paper presents a basic design and principles to protect enterprise networks from spam mail after considering a taxonomy of spam mail based on their delivery schemes as well as their message envelope formats. The analysis of MTA mail logs of a mail gateway at a sample enterprise network provides a correlation between senders’ mail addresses and their IP addresses. Thus, a mail filter for gateways of these networks is proposed to prevent them from receiving spam mail from the Internet. Finally, the effectiveness of this filter is demonstrated based on the results of mail log analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Costales, B., Allman, E.: sendmail. Second Edition. O’Reilly and Associates, Cambridge Köln Paris Sebastopol Tokyo (1997)

    Google Scholar 

  2. J. Myers, J., Rose, M.: Post Office Protocol-Version 3. RFC1939 (1996)

    Google Scholar 

  3. Crispin, M.: Internet Message Access Protocol-Version 4rev1. RFC2060 (1996)

    Google Scholar 

  4. Schwartz, A., Garfinkel, S.: Stopping Spam. O’Reilly and Associates, Cambridge Köln Paris Sebastopol Tokyo (1998)

    Google Scholar 

  5. Lindberg, G.: Anti-Spam Recommendations for SMTP MTAs. RFC 2505 (1999)

    Google Scholar 

  6. Postel, J.: Simple Mail Transfer Protocol. RFC0821 (1982)

    Google Scholar 

  7. Myers, J.: SMTP Service Extension for Authentication. RFC2554 (1999)

    Google Scholar 

  8. http://members.elysium.pl/brush/smtp-auth/server.html

  9. http://members.elysium.pl/brush/smtp-auth/client.html

  10. MAPS: Basic Mailing List Management Guidelines For Preventing Abuse. http://www.mail-abuse.org/manage.html (2001)

  11. MAPS Transport Security Initiative Team: MAPS Transport Security Initiative. http://www.mail-abuse.org/tsi/ (2001)

  12. http://work-rss.mail-abuse.org/rss/index.html

  13. Hoffman, P.: Allowing Relaying in SMTP: A Series of Surveys. Internet Mail Consortium Report IMCR-015, http://www.imc.org/ube-relay.html (2001)

  14. http://www.mail-abuse.org/dul/

  15. http://www.mail-abuse.org/rbl/

  16. Gellens, R., Klensin, J.: Message Submission. RFC 2476 (1998)

    Google Scholar 

  17. http://www.emaillab.org/win-mailer/table-otherspec.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Asami, T., Kikuchi, T., Rikitake, K., Nagata, H., Hamai, T., Hatori, Y. (2002). A Taxonomy of Spam and a Protection Method for Enterprise Networks. In: Chong, I. (eds) Information Networking: Wireless Communications Technologies and Network Applications. ICOIN 2002. Lecture Notes in Computer Science, vol 2344. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45801-8_43

Download citation

  • DOI: https://doi.org/10.1007/3-540-45801-8_43

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44255-4

  • Online ISBN: 978-3-540-45801-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics