Critical analysis of spam prevention techniques


Autoria(s): Bajaj, Simi; Egbufor, Fidelis; Pieprzyk, Josef
Data(s)

2011

Resumo

E-mail spam has remained a scourge and menacing nuisance for users, internet and network service operators and providers, in spite of the anti-spam techniques available; and spammers are relentlessly circumventing these anti-spam techniques embedded or installed in form of software products on both client and server sides of both fixed and mobile devices to their advantage. This continuous evasion degrades the capabilities of these anti-spam techniques as none of them provides a comprehensive reliable solution to the problem posed by spam and spammers. Major problem for instance arises when these anti-spam techniques misjudge or misclassify legitimate emails as spam (false positive); or fail to deliver or block spam on the SMTP server (false negative); and the spam passes-on to the receiver, and yet this server from where it originates does not notice or even have an auto alert service to indicate that the spam it was designed to prevent has slipped and moved on to the receiver’s SMTP server; and the receiver’s SMTP server still fail to stop the spam from reaching user’s device and with no auto alert mechanism to inform itself of this inability; thus causing a staggering cost in loss of time, effort and finance. This paper takes a comparative literature overview of some of these anti-spam techniques, especially the filtering technological endorsements designed to prevent spam, their merits and demerits to entrench their capability enhancements, as well as evaluative analytical recommendations that will be subject to further research.

Identificador

http://eprints.qut.edu.au/70092/

Relação

http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=06827721

Bajaj, Simi, Egbufor, Fidelis, & Pieprzyk, Josef (2011) Critical analysis of spam prevention techniques. In IWSCN 2011 : International Workshop on Security and Communication Networks : Proceedings, Gjovik, Norway, pp. 1-15.

Direitos

Please consult the author

Fonte

School of Electrical Engineering & Computer Science; Science & Engineering Faculty

Tipo

Conference Paper