E-Book, Englisch, 209 Seiten
Schryen Anti-Spam Measures
1. Auflage 2007
ISBN: 978-3-540-71750-8
Verlag: Springer Berlin Heidelberg
Format: PDF
Kopierschutz: 1 - PDF Watermark
Analysis and Design
E-Book, Englisch, 209 Seiten
ISBN: 978-3-540-71750-8
Verlag: Springer Berlin Heidelberg
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book examines anti-spam measures in terms of their potentials, limitations, advantages, and drawbacks. These factors determine to which extent the measures can contribute to the reduction of spam in the long run. It examines legislative, organizational, behavioral, and technological anti-spam measures, including an insight into their effectiveness. In addition, it presents the conceptual development and analysis of an infrastructural e-mail framework, which features such a complementary application, and considers deployment issues.
Autoren/Hrsg.
Weitere Infos & Material
1;Preface;6
2;Contents;8
3;List of Figures;11
4;List of Tables;13
5;Abbreviations;14
6;1 Introduction;17
6.1;1.1 The problem;17
6.2;1.2 The history;18
6.3;1.3 Goals, methodology, and architecture;19
7;2 Spam and its economic significance;22
7.1;2.1 Definition;22
7.2;2.2 Spam statistics;24
7.3;2.3 Spam categories;27
7.4;2.4 Economic harm;37
7.5;2.5 Economic benefit;41
8;3 The e-mail delivery process and its susceptibility to spam;43
8.1;3.1 The e-mail delivery process;43
8.2;3.2 SMTP’s susceptibility to spam;50
9;4 Anti-spam measures;57
9.1;4.1 Legislative measures;57
9.2;4.2 Organizational measures;68
9.3;4.3 Behavioral measures;70
9.4;4.4 Technological measures;73
10;5 A model-driven analysis of the effectiveness of technological anti- spam measures;108
10.1;5.1 A model of the Internet e-mail infrastructure;109
10.2;5.2 Deriving and categorizing the spam delivery routes;118
10.3;5.3 The effectiveness of route-specific anti-spam measures;125
11;6 An infrastructure framework for addressing spam;131
11.1;6.1 Overview of the framework;132
11.2;6.2 Organizational solution;135
11.3;6.3 Technological solution;140
11.4;6.4 Theoretical effectiveness;151
11.5;6.5 Deployment and impact on e-mail communication;152
11.6;6.6 Drawbacks and limitations;155
12;7 The empirical analysis of the abuse of e-mail addresses placed on the Internet;157
12.1;7.1 The relevance of inspecting e-mail address harvesting;157
12.2;7.2 Prior studies and findings;159
12.3;7.3 A methodology and honeypot conceptualization;161
12.4;7.4 The prototypic implementation of an empirical study;177
13;8 Summary and outlook;187
14;A Process for parsing, classifying, and storing e- mails;197
15;B Locations seeded with addresses that attracted most spam;200
16;References;203
17;Index;214




