Characterizing Spam Traffic and Spammers

There is a tremendous increase in spam traffic these days. Spam messages muddle up users inbox, consume network resources, and build up DDoS attacks, spread worms and viruses. Our goal is to present a definite figure about the characteristics of spam and spammers. Since spammers change their mode of operation to counter anti spam technology, continues evaluation of the characteristics of spam and spammers technology has become mandatory. These evaluations help us to enhance the existing technology to combat spam effectively. We collected 400 thousand spam mails from a spam trap set up in a corporate mail server for a period of 14 months form January 2006 to February 2007. Spammers use common techniques to spam end users regardless of corporate server and public mail server. So we believe that our spam collection is a sample of world wide spam traffic. Studying the characteristics of this sample helps us to better understand the features of spam and spammers technology. We believe that this analysis could be useful to develop more efficient anti spam techniques.

[1]  Virgílio A. F. Almeida,et al.  Characterizing a spam traffic , 2004, IMC '04.

[2]  Young Min Cho,et al.  Rapidly increasing diabetes-related mortality with socio-environmental changes in South Korea during the last two decades. , 2006, Diabetes research and clinical practice.

[3]  D. Koutsouris,et al.  Design of an interoperability framework in a regional healthcare system , 2004, The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[4]  Eiji Kamioka,et al.  Environment-adaptive personal communications realizing ubiquitous computing networks , 2004 .

[5]  Emil Sit,et al.  An empirical study of spam traffic and the use of DNS black lists , 2004, IMC '04.

[6]  Su-Chong Joo,et al.  Healthcare Home Service System Based on Distributed Object Group Framework , 2006, ICCSA.

[7]  Koichi Sagawa,et al.  Time domain heart rate variability index for assessment of dynamic stress , 1998, Computers in Cardiology 1998. Vol. 25 (Cat. No.98CH36292).

[8]  Hiroyuki Morikawa,et al.  Realizing the Ubiquitous Network , 2004 .

[9]  Nick Feamster,et al.  Can DNS-Based Blacklists Keep Up with Bots? , 2006, CEAS.

[10]  William C. Mann,et al.  Enabling location-aware pervasive computing applications for the elderly , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[11]  Calton Pu,et al.  Observed Trends in Spam Construction Techniques: A Case Study of Spam Evolution , 2006, CEAS.

[12]  T. Takano,et al.  Assessment of the value of videophones in home healthcare , 1995 .

[13]  Fulu Li,et al.  An Empirical Study of Clustering Behavior of Spammers and Group-based Anti-Spam Strategies , 2006, CEAS.

[14]  In Cheol Jeong,et al.  A New Method to estimate Arterial Blood Pressure using Photoplethysmographic Signal , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.