An In-depth Analysis of Spam and Spammers

Electronic mail services have become an important source of communication for millions of people all over the world. Due to this tremendous growth, there has been a significant increase in spam traffic. Spam messes up user’s inbox, consumes network resources and spread worms and viruses. In this paper we study the characteristics of spam and the technology used by spammers. In order to counter anti spam technology, spammers change their mode of operation, therefore continues evaluation of the characteristics of spam and spammers technology has become mandatory. These evaluations help us to enhance the existing anti spam technology and thereby help us to combat spam effectively. In order to characterize spam, we collected four hundred thousand spam mails from a corporate mail server for a period of 14 months from January 2006 to February 2007. For analysis we classified spam based on attachment and contents. We observed that spammers use software tools to send spam with attachment. The main features of this software are hiding sender’s identity, randomly selecting text messages, identifying open relay machines, mass mailing capability and defining spamming duration. Spammers do not use spam software to send spam without attachment. From our study we observed that, four years old heavy users email accounts attract more spam than four years old light users mail accounts. Relatively new email accounts which are 14 months old do not receive spam. But in some special cases like DDoS attacks, we found that new email accounts receive spam and 14 months old heavy users email accounts have attracted more spam than 14 months old light users. We believe that this analysis could be useful to develop more efficient anti spam techniques.

[1]  Nick Feamster,et al.  Can DNS-Based Blacklists Keep Up with Bots? , 2006, CEAS.

[2]  Virgílio A. F. Almeida,et al.  Characterizing a spam traffic , 2004, IMC '04.

[3]  Jae-Kwang Lee,et al.  Characterizing Spam Traffic and Spammers , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[4]  Emil Sit,et al.  An empirical study of spam traffic and the use of DNS black lists , 2004, IMC '04.

[5]  Calton Pu,et al.  Observed Trends in Spam Construction Techniques: A Case Study of Spam Evolution , 2006, CEAS.

[6]  Jae-Kwang Lee,et al.  An Empirical Study of Spam and Spam Vulnerable email Accounts , 2007, Future Generation Communication and Networking (FGCN 2007).

[7]  Nick Feamster,et al.  Understanding the network-level behavior of spammers , 2006, SIGCOMM.

[8]  Jae-Kwang Lee,et al.  Multi Layer Approach to Defend DDoS Attacks Caused by Spam , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).

[9]  Fulu Li,et al.  An Empirical Study of Clustering Behavior of Spammers and Group-based Anti-Spam Strategies , 2006, CEAS.