Abstract
Spam comprises approximately 90 to 95 percent of all e-mail traffic on the Internet nowadays, and it is a problem far from being solved. The losses caused by spam are estimated to reach up to $87 billion yearly. When fighting spam, most of the proposals focus on the receiver-side and are usually resource-intensive in terms of processing requirements. In this paper we present an approach to address these shortcomings: we propose to i) filter outgoing e-mail on the sender side and (ii) use lightweight techniques to check whether a message is spam or not. Moreover, we have evaluated the accuracy of these techniques in detecting spam on the sender side with two different data sets, obtained at a Dutch hosting provider. The results obtained with this approach suggest we can significantly reduce the amount of spam on the Internet by performing simple checks at the sender-side.
Chapter PDF
Similar content being viewed by others
References
Sophos. Only one in 28 emails legitimate (June 2008), http://www.sophos.com/pressoffice/news/articles/2008/07/dirtydozjul08.html
Spamhaus. Effective spam filtering (January 2010), http://www.spamhaus.org/effective_filtering.html
Soma, J., Singer, P., Hurd, J.: SPAM Still Pays: The Failure of the CAN-SPAM Act of 2003 and Proposed Legal Solutions. Harv. J. on Legis. 45, 165–619 (2008)
Lieb, R.: Make spammers pay before you do (July 2002), http://www.clickz.com/1432751
McGregor, C.: Controlling spam with SpamAssassin. Linux J. 153, 9 (2007)
Mori, T., Esquivel, H., Akella, A., Mao, Z.M., Xie, Y., Yu, F.: On the effectiveness of pre-acceptance spam filtering. University of Wisconsin Madison, Tech. Report TR1650 (2009)
de Vries, W.W.: Restraining transmission of unsolicited bulk e-mail. In: Proceedings of the twelth Twente Student Conference on Information Technology (2010)
Stern, H.: A survey of modern spam tools. In: Proc. of the fifth conf. on email and anti-spam (2008)
Sperotto, A., Vliek, G., Sadre, R., Pras, A.: Detecting Spam at the Network Level. In: Oliver, M., Sallent, S. (eds.) EUNICE 2009. LNCS, vol. 5733, pp. 208–216. Springer, Heidelberg (2009)
Spamhaus. The register of known spam operations (January 2010), http://www.spamhaus.org/rokso/
Ballani, H., Francis, P., Zhang, X.: A study of prefix hijacking and interception in the Internet. ACM SIGCOMM Computer Communication Review 37(4), 276 (2007)
Fabian, M.A.R.J.Z., Terzis, M.A.: My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging. In: Proceedings of the 1st USENIX Workshop on Hot Topics in Understanding Botnets, Cambridge, USA (2007)
Chiang, K., Lloyd, L.: A case study of the rustock rootkit and spam bot. In: The First Workshop in Understanding Botnets (2007)
Mendyk-Krajewska, T., Mazur, Z.: Software Flaws as the Problem of Network Security. In: Internet-Technical Development and Applications, p. 233 (2009)
Pathak, A., Hu, Y.C., Mao, Z.M.: Peeking into spammer behavior from a unique vantage point. In: LEET 2008: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, pp. 1–9. USENIX Association, Berkeley (2008)
RIPE Labs. Spam over ipv6 (March 2010), http://labs.ripe.net/content/spam-over-ipv6
United States of America. Can-spam act of 2003 (2003), http://uscode.house.gov/download/pls/15C103.txt
Australasian Legal Information Institute. Australian spam act 2003 (2003), http://www.austlii.edu.au/au/legis/cth/consol_act/sa200366/
Klensin, J.: Simple mail transfer protocol (April 2001), http://www.ietf.org/rfc/rfc2821.txt
Pathak, A., Qian, F., Hu, Y.C., Mao, Z.M., Ranjan, S.: Botnet spam campaigns can be long lasting: evidence, implications, and analysis. In: Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems, pp. 13–24. ACM, New York (2009)
OBrien, C., Vogel, C.: Comparing SpamAssassin with CBDF email filtering. In: Proceedings of the 7th Annual CLUK Research Colloquium (2004)
Pras, A., Wanrooij, W.: Filtering Spam from Bad Neighborhoods (under review). International Journal of Network Management (2009)
Google. Google safe browsing (January 2010), http://code.google.com/apis/safebrowsing/
UCEProtect. Sender callouts - why it is abusive (January 2010), http://www.backscatterer.org/?target=sendercallouts
AOL. E-mail feedback reports for isp’s (January 2010), http://postmaster.aol.com/cgi-bin/fbl.pl
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
de Vries, W.W., Moura, G.C.M., Pras, A. (2010). Fighting Spam on the Sender Side: A Lightweight Approach. In: Aagesen, F.A., Knapskog, S.J. (eds) Networked Services and Applications - Engineering, Control and Management. EUNICE 2010. Lecture Notes in Computer Science, vol 6164. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13971-0_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-13971-0_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13970-3
Online ISBN: 978-3-642-13971-0
eBook Packages: Computer ScienceComputer Science (R0)