Share This Article:

A Solution for Fighting Spammer's Resources and Minimizing the Impact of Spam

Abstract Full-Text HTML XML Download Download as PDF (Size:114KB) PP. 416-422
DOI: 10.4236/ijcns.2012.57051    4,170 Downloads   6,529 Views   Citations

ABSTRACT

Spam or unsolicited emails constitute a major threat to the Internet, the corporations, and the end-users. Statistics show that about 70% - 80% of the emails are spam. There are several techniques that have been implemented to react to the spam on its arrival. These techniques consist in filtering the emails and placing them in the Junk or Spam folders of the users. Regardless of the accuracy of these techniques, they are all passive. In other words, they are like someone is hitting you and you are trying by all the means to protect yourself from these hits without fighting your opponent. As we know the proverbs "The best defense is a good offense" or "Attack is the best form of defense". Thus, we believe that attacking the spammers is the best way to minimize their impact. Spammers send millions of emails to the users for several reasons and usually they include some links or images that direct the user to some web pages or simply to track the users. The proposed idea of attacking the spammers is by building some software to collect these links from the Spam and Junk folders of the users. Then, the software periodically and actively visit these links and the subsequent redirect links as if a user clicks on these links or as if the user open the email containing the tracking link. If this software is used by millions of users (included in the major email providers), then this will act as a storm of Distributed Denial of Service attack on the spammers servers and there bandwidth will be completely consumed by this act. In this case, no human can visit their sites because they will be unavailable. In this paper, we describe this approach and show its effectiveness. In addition, we present an application we have developed that can be used for this reason.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

S. A. Elsagheer Mohamed, "A Solution for Fighting Spammer's Resources and Minimizing the Impact of Spam," International Journal of Communications, Network and System Sciences, Vol. 5 No. 7, 2012, pp. 416-422. doi: 10.4236/ijcns.2012.57051.

References

[1] Z. Li and H. Y. Shen. “SOAP: A Social Network Aided Personalized and Effective Spam Filter to Clean Your E-Mail Box,” Proceedings IEEE INFOCOM, Shanghai, 10-15 April 2011, pp. 1835-1843.
[2] J. A. Zdziarski, “Ending Spam—Bayesian Content Filtering and the Art of Statistical Language Classification,” 5th edition, No Starch Press, San Francisco, 2005.
[3] L. Androutsopoulos, G. Paliouras, V. Karkaletsis, G. Sakkis, C. D. Spyropoulos and P. Stamatopoulos, “Learning to Filter Spam E-Mail: A Comparison of a Naive Bayesian and a Memory-Based Approach,” Proceedings of the Workshop on Machine Learning and Textual Information Access, 2000, pp. 1-13.
[4] M. Sahami, S. Dumais, D. Heckerman and E. Horvitz, “A Bayesian Approach to Filtering Junk Email,” Learning for Text Categorization—Papers from the AAAI Workshop, 1998, pp. 55-62.
[5] D. Karthika-Renuka, et al., “Spam Classification Based on Supervised Learning Using Machine Learning Techniques,” International Conference on Process Automation, Control and Computing, Coimbatore, 20-22 July 2011, pp. 1-7. doi:10.1109/PACC.2011.5979035
[6] H. Drucker, D. Wu and V. N. Vapnik, “Support Vector Machines for Spam Categorization,” IEEE Transactions on Neural Networks, Vol. 10, No. 5, 1999, pp. 1048-1054. doi:10.1109/72.788645
[7] C.-Y. Tseng and M.-S. Chen, “Incremental SVM Model for Spam Detection on Dynamic Email Social Networks,” International Conference on Computational Science and Engineering, Vol. 4, 2009, pp. 128-135.
[8] S. Suwa, et al., “DNS Resource Record Analysis of URLs in E-Mail Messages for Improving Spam Filtering,” IEEE/IPSJ 11th International Symposium on Applications and the Internet (SAINT), Munich, 18-21 July 2011, pp. 439-444.
[9] A. Khanal, et al., “Improving the Efficiency of Spam Filtering through Cache Architecture,” 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, Istanbul, 24-26 October 2007, pp. 303-309. doi:10.1109/MASCOTS.2007.27
[10] S. A. Elsagheer-Mohamed, “Combining Objective and Subjective Smart Technqiye for a Better Spam Filtering Solution,” Under Submission.
[11] X. Carreras and L. Márquez, “Boosting Trees for Antispam Email Filtering,” Proceedings of the International Conference on Recent Advances in Natural Language Processing, 2001, pp. 58-64.
[12] I. M. Rafiqul, et al., “Dynamic Feature Selection for Spam Filtering Using Support Vector Machine,” 6th IEEE/ACIS International Conference on Computer and Information Science, Melbourne, 11-13 July 2007, pp. 757-762.
[13] W. W. Cohen, “Learning Rules That Classify E-Mail,” Proceedings of AAAI Spring Symposium on Machine Learning in Information Access, Stanford, 25-27 March 1996, pp. 18-25.
[14] X.-L. Pang, et al., “The Compensation Strategy of Unseen Feature Words in Na?ve Bayes Text Classification,” Journal of Harbin Institute of Technology, No. 6, 2007, p. 26.
[15] A. Taweesiriwate, et al., “Web Spam Detection Using Link-Based Ant Colony Optimization,” IEEE 26th International Conference on Advanced Information Networking and Applications (AINA), Fukuoka, 26-29 March 2012, pp. 868-873.
[16] S. Mohamed, et al., “A New Technique for Automatic Text Categorization for Arabic Documents,” Proceeding of 5th International Conference on Internet and Information Technology in Modern Organizations, Cario, 13-15 December 2005.
[17] H. Q. Zuo, et al., “Image Spam Filtering Using Fourier-Mellin Invariant Features,” IEEE International Conference on Acoustics, Speech and Signal Processing, Taibei, 19-24 April 2009, pp. 849-852.
[18] J.-H. Hsia, et al., “Language-Model-Based Detection Cascade for Efficient Classification of Image-Based Spam E-Mail,” IEEE International Conference on Multimedia and Expo, New York, 28 June-3 July 2009, pp. 1182-1185.
[19] B. Battista, et al., “Image Spam Filtering Using Visual Information,” 14th International Conference on Image Analysis and Processing, Modena, 10-14 September 2007, pp. 105-110.
[20] H. B. Aradhye, G. K. Myers and J. A. Herson, “Image Analysis for Categorization of Image-Based Spam E-Mail,” Proceeding of the 8th International Conference on Document Analysis and Recognition, Korea, 29 August-1 September 2005, pp. 914-918.
[21] Zhen. H. Duan, et al., “Detecting Spam Zombies by Monitoring Outgoing Messages,” IEEE INFOCOM, Rio de Janeiro, 19-25 April 2009, pp. 1764-1772.
[22] Zhen. H. Duan, et al., “Detecting Spam Zombies by Monitoring Outgoing Messages,” IEEE Transactions on Dependable and Secure Computing, Vol. 9, No. 2, 2012, pp. 198-210.
[23] K. Saraubon, et al., “Fast Effective Botnet Spam Detection,” Fourth International Conference on Computer Sciences and Convergence Information Technology, Seoul, 24-26 November 2009, pp. 1066-1070. doi:10.1109/ICCIT.2009.128

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.