Spamming Techniques and Control. By Neha Gupta Research Assistant, MINDLAB University of Maryland-College Park. Contents. What is Spamming? Cost, history and types of spam Spam Statistics Insight into Spammers minds Spamming tricks and techniques Spam Control Methods and Feasibility.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Spamming Techniques and Control
By Neha Gupta
Research Assistant, MINDLAB
University of Maryland-College Park
>telnet mail.abc.com 25
220 ss71.shared.server-system.net ESMTP Sendmail 8.12.11/8.12.11; Fri, 8 March 2007 10:17:19 -0800
250 ss71.shared.server-system.net Hello [188.8.131.52], pleased to meet you
receipt to :[email protected]
Blah blah blah ..
Content or Point Based Spam Filtering
Postage/Stamp Based Spam Filtering
Useful in the scenario when servers are compromised and used for sending spam to hundreds of thousands of users.
Can be a better option when used at ISP level.
Tools like Razor and Pyzor can be used for this purpose.
As soon as the spammer learns that the computer is being detected he can use a different computer.
“When sending an email to someone, the sender attaches a stamp to his message ,a token that is costly to the sender but demonstrates his good faith”