How good are our weapons in the spam wars?

Will there ever be an end to "spam wars"? We are bombarded with unsolicited bulk email, we deploy newer and supposedly better ways of filtering spam, and yet spammers continue to devise creative ways to circumvent our defenses. Over the years, the volume of spam has increased steadily, in spite of the continued efforts to contain it. In order to understand the spam problem and to explore control methods, it is useful to analyze spam control techniques by looking at spam generation and transmission as a system. We find that not all spam control methods are equal, because each operates at different points in the system, where their leverage is widely different. In the end, no email control technique is likely to solve the spam problem definitively.

[1]  Moni Naor,et al.  Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.

[2]  Markus Jakobsson,et al.  Proofs of Work and Bread Pudding Protocols , 1999, Communications and Multimedia Security.

[3]  Shane Hird Technical Solutions for Controlling Spam , 2002 .

[4]  Christian Damsgaard Jensen,et al.  Privacy Recovery with Disposable Email Addresses , 2003, IEEE Secur. Priv..

[5]  Ben Laurie,et al.  \Proof-of-Work" Proves Not to Work , 2004 .

[6]  Mark Levene,et al.  Spam and the Internet. Is it here to stay or can it be eradicated , 2004 .

[7]  Brett Watson,et al.  Beyond Identity: Addressing Problems that Persist in an Electronic Mail System with Reliable Sender Identification , 2004, CEAS.

[8]  Miranda Mowbray,et al.  Email Prioritization: Reducing Delays on Legitimate Mail Caused by Junk Mail , 2004, USENIX Annual Technical Conference, General Track.

[9]  Mads Haahr,et al.  Personalised, Collaborative Spam Filtering , 2004, CEAS.

[10]  Mark Levene,et al.  Spam on the Internet: can it be eradicated or is it here to stay? , 2004 .

[11]  Brian Whitworth,et al.  Spam and the social-technical gap , 2004, Computer.

[12]  Calton Pu,et al.  Resisting SPAM Delivery by TCP Damping , 2004, CEAS.

[13]  Kang Li,et al.  Shall We Stop All Unsolicited Email Messages? , 2004, CEAS.

[14]  Kartik Gopalan,et al.  A Differentiated Message Delivery Architecture to Control Spam , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).

[15]  John R. Levine Experiences with Greylisting , 2005, CEAS.