Combining SMTP and HTTP tar Pits to Proactively Reduce Spam

نویسندگان

  • Jörg Keller
  • Tobias Eggendorfer
چکیده

Unsolicited commercial emails (UCE, spam) are currently being fought using reactive methods, filtering being the most common. Reacting means to be always one step behind. So the focus on fighting spam should be on prevention. Current proposals focus on fixing SMTP's lack of authentication, but introduce two major problems: First of all current attempts break existing functionality and, second, it seems to be hardly possible to enforce a world wide change of SMTP. Therefore other preventive measures should be implemented. The most promising approach is to prevent spammers from collecting email addresses. Several proposals show ways to obfuscate addresses on web pages, another proposal was to create HTTP-tar pits in order to catch harvesters. Our tests with real world harvesters showed room to improve those tar pits by combining them with SMTP tar pits. We report on the success of our experiments with this combination.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Dynamically blocking access to web pages for spammers' harvesters

Almost all current anti spam measures are reactive, filtering being the most common. But to react means always to be one step behind. Reaction requires to predict the next action of the attacker. So the focus on fighting spam should rather be on prevention. Current proposals focus on fixing SMTP's lack of authentication, but introduce two new major problems: First, all current attempts break ex...

متن کامل

Detection of Spam Hosts and Spam Bots Using Network Flow Traffic Modeling

In this paper, we present an approach for detecting e-mail spam originating hosts, spam bots and their respective controllers based on network flow data and DNS metadata. Our approach consists of first establishing SMTP traffic models of legitimate vs. spammer SMTP clients and then classifying unknown SMTP clients with respect to their current SMTP traffic distance from these models. An entropy...

متن کامل

Evaluating The Use of Spam-triggered TCP/IP Rate Control To Protect SMTP Servers

This paper examines an approach to spam mitigation that rate limits incoming TCP/IP connections to an SMTP server based on the real-time detection of spam within the SMTP message exchange. Our approach is motivated by a desire to cause increased resource consumption at the spammer end of each SMTP connection, and to avoid the negative impact of falsepositives by eventually allowing all emails t...

متن کامل

Reducing spam to 20% of its original value with a SMTP tar pit simulator

Unsolicited commercial email (UCE, spam), scam and phishing emails make up for more than 90% of all emails sent world-wide. Most antispam methods known rely on filtering emails. Meanwhile, browsers also check URLs against blacklists to avoid fraud. However, all those methods are reactive, ergo they are only able to deal with known attack patterns. Some methods are computing intensive, thus requ...

متن کامل

Anti - Spam Requirements on an SMTP MTA

The intent is that these requirements will help clean up the spam situation, if applied on enough SMTP MTAs on the Internet, and that they should be used as guidelines for the various MTA vendors. We are fully aware that this is not the final solution, but if these requirements were included, and used, on all Internet SMTP MTAs, things would improve considerably and give time to design a more l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006