Abstract
Spammers collect email addresses from internet using automated programs known as bots and send bulk SPAMS to them. Making the email address difficult to recognize for the bots (obfuscate) but easily understandable for human users is one of the effective way to prevent spams. In this paper, we focus on evaluating the effectiveness of different techniques to obfuscate an email address and analyze the frequency at which spam mails arrive for each obfuscation technique. For this we employed multiple web crawlers to harvest both obfuscated and non-obfuscated email addresses. We find that majority of the email addresses are non-obfuscated and only handful are obfuscated. This renders majority of email users fall prey to SPAMS. Based on our findings, we propose a natural language processing (NLP)-based obfuscation technique which we believe to be stronger than the currently used obfuscation techniques. To analyze the frequency of arrival of spam mails in an obfuscated mail, we posted obfuscated email addresses on popular websites (social networking and ecommerce sites) to analyze the number of spams received for each obfuscation technique. We observe that even simple obfuscation techniques prevent spams and obfuscated mails receive less spam mails than the non-obfuscated ones.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Andrew Smith “Nigerian scam e-mails and the charms of capital” Cultural Studies #160; 23, 1, 27–47.
Washington post blog: Fell for That Nigerian Scam? See Him. http://www.washingtonpost.com/wp-dyn/content/article/2006/04/19/AR2006041901162.html.
Blog: Email Tips to Avoid Spam Filters and 9 Top Email Marketing Tools http://blog.woorank.com/2013/01/email-tips-to-avoid-spam-filters-and-9-top-email-marketing-tools/.
Kaspersky Blog: Spam statistics Report Q3-2013. http://usa.kaspersky.com/internet-security-center/threats/spam-statistics-report-q3-2013#.U3Igpd-bAjw.
Iasonas Polakis, Georgios Kontaxis, Spiros Antonatos “Using Social networks to Harvest Email Addresses“, in WPES ’10: Proceedings of the 9th annual ACM workshop on Privacy in the electronic society.
Allister Cournane, Ray Hunt “An analysis of the tools used for the generation and prevention of spam”, Computers & Security, vol. 23, pp. 154–166, 2004.
Vidyasagar Potdar, Nazanin Firoozeh, Farida Ridzuan, Yan Like, Debajyoti Mukhopadhyay, Dhiren Tejani “The Changing Nature of Spam 2.0”.
Deborah Fallows “Spam: How it is hurting email and degrading life on the Internet”, Pew Internet & American Life Project report. Retrieved August 10, 2007 from http://www.pewinternet.org/PPF/r/102/report_display.asp.
Adam Massof “Spam - Oy, What a Nuisance”.
Project honey pot: Help stop spammers before they ever get your address! http://www.projecthoneypot.org/.
Craig A. Shue, Minaxi Gupta, Chin Hua Kong, John T. Lubia, Asim S. Yuksel “Spamology: A Study of Spam Origins”, in the 6th Conference on Email and Anti-Spam (CEAS) (2009).
Li Zhuang, John Dunagan, Daniel R. Simon, Helen J. Wang, Ivan Osipkov, Geoff Hulten, J. D. Tygar “Characterizing bots from email spam records”, In Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET’08), 2008.
Matthew B. Prince, Lee Holloway, Eric Langheinrich, Benjamin M. Dahl, Arthur M. Keller, “Understanding How Spammers Steal Your E-Mail Address: An Analysis of the First Six Months of Data from Project Honey Pot”, in Conference on Email and Anti-Spam (CEAS), 2005
John R. Levine “Experiences with Greylisting” Proc. 2nd Conf. Email and Anti-Spam (CEAS 05), 2005; www.ceas.cc.
Ion Androutsopoulos, John Koutsias, Konstantinos V. Chandrinos, George Paliouras, Constantine D. Spyropoulos “An Evaluation of Naive Bayesian Anti-Spam Filtering”. In Proceedings of the Workshop on Machine Learning in New Information Age, Barcelona, Spain, 2000.
Cynthia Dwork, Moni Naor “Pricing via Processing or Combatting Junk Mail”. In E.F. Brickell, editor, Advances in Cryptology—Crypto’92, pages 139–147, 1992.
Hallam-Baker, P. (2003). “A plan for no spam”. Technical report, Verisign.
Web Information Service “Alexa Internet”, http://www.alexa.com.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Poornachandran, P., Raj, D., Pal, S., Ashok, A. (2016). Effectiveness of Email Address Obfuscation on Internet. In: Saini, H., Sayal, R., Rawat, S. (eds) Innovations in Computer Science and Engineering. Advances in Intelligent Systems and Computing, vol 413. Springer, Singapore. https://doi.org/10.1007/978-981-10-0419-3_22
Download citation
DOI: https://doi.org/10.1007/978-981-10-0419-3_22
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0417-9
Online ISBN: 978-981-10-0419-3
eBook Packages: EngineeringEngineering (R0)