A Review of Techniques to Counter Spam and Spit
暂无分享,去创建一个
This paper studies the most important techniques with which to challenge the problem of unsolicited e-mails (spam) and unsolicited messages in Internet telephony (spit). First an introduction to the problem of spam demonstrates the importance (economic and technological) of finding a solution. Then we analyze the most important techniques that exist to counter the problem. After that we concentrate on a new problem: spam using new internet telephony technologies (spit). This problem, even if existing only theoretically until now, very soon will be one of the main factors affecting the broad use of VoIP. We analyze the most important methods and techniques of countering spit. Finally, we mentione differences between spam and spit and state some useful conclusions.
[1] Nick Feamster,et al. Understanding the network-level behavior of spammers , 2006, SIGCOMM 2006.
[2] Vipul Ved Prakash,et al. Fighting Spam with Reputation Systems , 2005, ACM Queue.
[3] L. Jean Camp,et al. Proof of Work can Work , 2006, WEIS.
[4] Cullen Jennings,et al. The Session Initiation Protocol (SIP) and Spam , 2008, RFC.