Skip to main content

Effectiveness of Email Address Obfuscation on Internet

  • Conference paper
  • First Online:
Innovations in Computer Science and Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 413))

  • 944 Accesses

Abstract

Spammers collect email addresses from internet using automated programs known as bots and send bulk SPAMS to them. Making the email address difficult to recognize for the bots (obfuscate) but easily understandable for human users is one of the effective way to prevent spams. In this paper, we focus on evaluating the effectiveness of different techniques to obfuscate an email address and analyze the frequency at which spam mails arrive for each obfuscation technique. For this we employed multiple web crawlers to harvest both obfuscated and non-obfuscated email addresses. We find that majority of the email addresses are non-obfuscated and only handful are obfuscated. This renders majority of email users fall prey to SPAMS. Based on our findings, we propose a natural language processing (NLP)-based obfuscation technique which we believe to be stronger than the currently used obfuscation techniques. To analyze the frequency of arrival of spam mails in an obfuscated mail, we posted obfuscated email addresses on popular websites (social networking and ecommerce sites) to analyze the number of spams received for each obfuscation technique. We observe that even simple obfuscation techniques prevent spams and obfuscated mails receive less spam mails than the non-obfuscated ones.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Andrew Smith “Nigerian scam e-mails and the charms of capital” Cultural Studies #160; 23, 1, 27–47.

    Google Scholar 

  2. Washington post blog: Fell for That Nigerian Scam? See Him. http://www.washingtonpost.com/wp-dyn/content/article/2006/04/19/AR2006041901162.html.

  3. Blog: Email Tips to Avoid Spam Filters and 9 Top Email Marketing Tools http://blog.woorank.com/2013/01/email-tips-to-avoid-spam-filters-and-9-top-email-marketing-tools/.

  4. Kaspersky Blog: Spam statistics Report Q3-2013. http://usa.kaspersky.com/internet-security-center/threats/spam-statistics-report-q3-2013#.U3Igpd-bAjw.

  5. Iasonas Polakis, Georgios Kontaxis, Spiros Antonatos “Using Social networks to Harvest Email Addresses“, in WPES ’10: Proceedings of the 9th annual ACM workshop on Privacy in the electronic society.

    Google Scholar 

  6. Allister Cournane, Ray Hunt “An analysis of the tools used for the generation and prevention of spam”, Computers & Security, vol. 23, pp. 154–166, 2004.

    Google Scholar 

  7. Vidyasagar Potdar, Nazanin Firoozeh, Farida Ridzuan, Yan Like, Debajyoti Mukhopadhyay, Dhiren Tejani “The Changing Nature of Spam 2.0”.

    Google Scholar 

  8. Deborah Fallows “Spam: How it is hurting email and degrading life on the Internet”, Pew Internet & American Life Project report. Retrieved August 10, 2007 from http://www.pewinternet.org/PPF/r/102/report_display.asp.

  9. Adam Massof “Spam - Oy, What a Nuisance”.

    Google Scholar 

  10. Project honey pot: Help stop spammers before they ever get your address! http://www.projecthoneypot.org/.

  11. Craig A. Shue, Minaxi Gupta, Chin Hua Kong, John T. Lubia, Asim S. Yuksel “Spamology: A Study of Spam Origins”, in the 6th Conference on Email and Anti-Spam (CEAS) (2009).

    Google Scholar 

  12. Li Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, Geoff Hulten, J. D. Tygar “Characterizing bots from email spam records”, In Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET’08), 2008.

    Google Scholar 

  13. Matthew B. Prince, Lee Holloway, Eric Langheinrich, Benjamin M. Dahl, Arthur M. Keller, “Understanding How Spammers Steal Your E-Mail Address: An Analysis of the First Six Months of Data from Project Honey Pot”, in Conference on Email and Anti-Spam (CEAS), 2005

    Google Scholar 

  14. John R. Levine “Experiences with Greylisting” Proc. 2nd Conf. Email and Anti-Spam (CEAS 05), 2005; www.ceas.cc.

  15. Ion Androutsopoulos, John Koutsias, Konstantinos V. Chandrinos, George Paliouras, Constantine D. Spyropoulos “An Evaluation of Naive Bayesian Anti-Spam Filtering”. In Proceedings of the Workshop on Machine Learning in New Information Age, Barcelona, Spain, 2000.

    Google Scholar 

  16. Cynthia Dwork, Moni Naor “Pricing via Processing or Combatting Junk Mail”. In E.F. Brickell, editor, Advances in Cryptology—Crypto’92, pages 139–147, 1992.

    Google Scholar 

  17. Hallam-Baker, P. (2003). “A plan for no spam”. Technical report, Verisign.

    Google Scholar 

  18. Web Information Service “Alexa Internet”, http://www.alexa.com.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prabaharan Poornachandran .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Poornachandran, P., Raj, D., Pal, S., Ashok, A. (2016). Effectiveness of Email Address Obfuscation on Internet. In: Saini, H., Sayal, R., Rawat, S. (eds) Innovations in Computer Science and Engineering. Advances in Intelligent Systems and Computing, vol 413. Springer, Singapore. https://doi.org/10.1007/978-981-10-0419-3_22

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0419-3_22

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0417-9

  • Online ISBN: 978-981-10-0419-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics