Methods to Identify Spammers

Methods to Identify Spammers

Tobias Eggendorfer
Copyright: © 2009 |Pages: 14
DOI: 10.4018/jdcf.2009040105
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Unsolicited commercial email has become a major threat for email communication. Although the degree of sophistication of spam filters has increased over time, such filters still produce high rates of false positives and false negatives, thereby reducing the reliability of email and introducing communication risks on their own. Due to more and more complex filtering methods implemented, the hardware requirements for mail servers are increasing to avoid the risk of denial of service situations. Therefore, some authors point out that mail filtering has reached its limits and ask for more preventive solutions to fight spam. One way to prevent email abuse would be to significantly increase the risk of a spammer being sued for damage compensation or, if legislation permits, for criminal offence. This approach believes in an assessment of risk and expected revenue by a the offender. But by hiding their real identity, spammers are very successful in evading prosecution. This paper discusses several methods to identify spammers and analyses under which circumstances those methods might be valid evidence in court.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 3 Issues (2022)
Volume 13: 6 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing