Understanding and Reversing the Profit Model of Spam
نویسندگان
چکیده
Spam, or unsolicited e-mail, has become a tremendous problem in recent years, evolving from being a minor nuisance as late as year 2000 to today comprising on average over 80% of all enterprise e-mail traffic and costing billions of dollars in lost productivity worldwide. It has become the parasite that infected the e-mail macrocosm and many now fear will lead to its destruction; the host becoming obsolete under the enormous harm done to it by the parasitic influence of this symbiotic relationship. While the news headlines continue to cite the increase in daily spam volumes, we suggest that the war against spam is reaching its final stages. Historically, before a war officially ends there is a key turning point which leads to victory. In the war on spam, we argue that we have reached that turning point. Solutions have been proposed to “reverse the profit model” of spammers by charging for email[8]. We show that such a drastic overhaul of the e-mail system through the deployment of these solutions is not essential to accomplishing this goal. We begin by exploring the motivation of spammers and reviewing the detrimental effects of spam on the Internet. We then present a model of the profitability of spammers showing how various anti-spam initiatives affect it. We show that in fact, all the ingredients of an impending solution to the spam problem, such as near universal deployment of constantly technologically advancing anti-spam filtering technologies, improved user education, establishment of legal frameworks and aggressive enforcement of those frameworks, are already known and are at various stages of implementation.
منابع مشابه
An Effective Model for SMS Spam Detection Using Content-based Features and Averaged Neural Network
In recent years, there has been considerable interest among people to use short message service (SMS) as one of the essential and straightforward communications services on mobile devices. The increased popularity of this service also increased the number of mobile devices attacks such as SMS spam messages. SMS spam messages constitute a real problem to mobile subscribers; this worries telecomm...
متن کاملA New Model for Email Spam Detection using Hybrid of Magnetic Optimization Algorithm with Harmony Search Algorithm
Unfortunately, among internet services, users are faced with several unwanted messages that are not even related to their interests and scope, and they contain advertising or even malicious content. Spam email contains a huge collection of infected and malicious advertising emails that harms data destroying and stealing personal information for malicious purposes. In most cases, spam emails con...
متن کاملA Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors
Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...
متن کاملA Critical Analysis of Financial Fraud Spam in English in Terms of Persuasive Strategies: Personalization, Presupposition, and Lexical Choices
The term ‘spam’ addresses unsolicited emails sent in bulk; therefore, the term‘financial fraud spam’ refers to unwanted bulk emails in which different tricks and techniques areemployed to swindle money from the recipients. Estimates show that more than 80% of worldwideemail traffic in 2011 was spam. It should be noted that while the number of daily spam emails in2002 was 2.4 billion, this numbe...
متن کاملSpamming for Science: Active Measurement in Web 2.0 Abuse Research
Spam and other electronic abuses have long been a focus of computer security research. However, recent work in the domain has emphasized an economic analysis of these operations in the hope of understanding and disrupting the profit model of attackers. Such studies do not lend themselves to passive measurement techniques. Instead, researchers have become middle-men or active participants in spa...
متن کامل