In recent years, there has been a steep rise in the amount of unsolicited-emails (spams) [11]. Such mails overwhelm users’ mailboxes, consume server resources and cause delays to mail delivery. Many techniques [2, 10, 12, 5, 13] have been used for mitigating spams. Despite the plethora of schemes proposed, all of them have the cardinal problem ofalse positives which compromises the reliability of emails. Furthermore, many of such schemes are plagued with security, privacy, deployability and transparency issues. In this project, we propose a new spam-mitigation approach that is orthogonal and complementary to the previous schemes: it reduces the spams reaching the mailboxes of real users by misleading spammers into spamming non-existing mailboxes. To send spams, spammers need a set of victim addresses ( V ). From the perspective of spammers’ resource utilization, it is imperative that th e setV consists largely of valid addresses. It has been observed that to create the set V , spammers primarily use two techniques: (1) crawling the Internet (homepages, newsgroups) [9], and (2) guessing email addresses with the hope of hitting on valid ones [11]. In this paper, we (1) hypothesize that majority of spams reaching a user’s mailbox is because the user’s address is harvested; (2) perform experiments to confirm hypothesis; and (3) propose a simple, false positives free scheme that mitigates the impact of spam on individual mailboxes by poisoning the address harvesting of spammers.
[1]
Michael Walfish,et al.
Distributed Quota Enforcement for Spam Control
,
2006,
NSDI.
[2]
Peter Nelson,et al.
Spamalot: A Toolkit for Consuming Spammers' Resources
,
2006,
CEAS.
[3]
Arthur M. Keller,et al.
Understanding How Spammers Steal Your E-Mail Address: An Analysis of the First Six Months of Data from Project Honey Pot
,
2005,
CEAS.
[4]
David Mazières,et al.
RE: Reliable Email
,
2006,
NSDI.
[5]
Moni Naor,et al.
On Memory-Bound Functions for Fighting Spam
,
2003,
CRYPTO.
[6]
Jen-Yuan Yeh,et al.
Email Thread Reassembly Using Similarity Matching
,
2006,
CEAS.
[7]
Nick Feamster,et al.
Understanding the network-level behavior of spammers
,
2006,
SIGCOMM.
[8]
Nick Feamster,et al.
Can DNS-Based Blacklists Keep Up with Bots?
,
2006,
CEAS.
[9]
Moni Naor,et al.
Pricing via Processing or Combatting Junk Mail
,
1992,
CRYPTO.
[10]
John C. Klensin,et al.
Simple Mail Transfer Protocol
,
2001,
RFC.
[11]
Gordon V. Cormack,et al.
Batch and Online Spam Filter Comparison
,
2006,
CEAS.