IPv6 Deployment and Spam Challenges

Spam has posed a serious problem for users of email since its infancy. Today, automated strategies are required to deal with the massive amount of spam traffic. IPv4 networks offer a variety of solutions to reduce spam, but IPv6 networks' large address space and use of temporary addresses - both of which are particularly vulnerable to spam attacks - makes dealing with spam and the use of automated approaches much more difficult. IPv6 thus poses a unique security issue for ISPs because it's more difficult for them to differentiate between good IP addresses and those that are known to originate spam messages.

[1]  Shyhtsun Felix Wu,et al.  On Attacking Statistical Spam Filters , 2004, CEAS.

[2]  E. Amodei,et al.  MINUTES OF THE SENATE COMMITTEE ON JUDICIARY , 2005 .

[3]  Wei Liu,et al.  A Behavior-Based Detection Approach to Mass-Mailing Host , 2007, 2007 International Conference on Machine Learning and Cybernetics.

[4]  Santosh S. Vempala,et al.  Filtering spam with behavioral blacklisting , 2007, CCS '07.

[5]  Chris J. Mitchell,et al.  Security vulnerabilities in DNS and DNSSEC , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[6]  Tao Deng,et al.  Research in Anti-Spam Method Based on Bayesian Filtering , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[7]  Akebo Yamakami,et al.  Content-based spam filtering , 2010, The 2010 International Joint Conference on Neural Networks (IJCNN).

[8]  Nguyen Tuan Anh,et al.  Spam Filter Based on Dynamic Sender Policy Framework , 2010, 2010 Second International Conference on Knowledge and Systems Engineering.

[9]  Pedro Sousa,et al.  A Collaborative Approach for Spam Detection , 2010, 2010 2nd International Conference on Evolving Internet.

[10]  Motonori Nakamura,et al.  DNS Resource Record Analysis of URLs in E-Mail Messages for Improving Spam Filtering , 2011, 2011 IEEE/IPSJ International Symposium on Applications and the Internet.

[11]  Masaru Takesue,et al.  E-mail Sender Identification through Trusted Local Deposit-Agents , 2011, 2011 14th International Conference on Network-Based Information Systems.

[12]  Kashefa Kowser A DKIM based Architecture for Combating Good Word Attack in Statistical Spam Filters , 2011 .