1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia

Research Article

Methods to identify spammers

  • @INPROCEEDINGS{10.4108/e-forensics.2008.31,
        author={Tobias  Eggendorfer},
        title={Methods to identify spammers},
        proceedings={1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia},
        publisher={ACM},
        proceedings_a={E-FORENSICS},
        year={2010},
        month={5},
        keywords={Spam Forensics Address trading Identification},
        doi={10.4108/e-forensics.2008.31}
    }
    
  • Tobias Eggendorfer
    Year: 2010
    Methods to identify spammers
    E-FORENSICS
    ACM
    DOI: 10.4108/e-forensics.2008.31
Tobias Eggendorfer1,*
  • 1: Universität der Bundeswehr München, Werner-Heisenberg-Weg 39, 85579 München. Phone: +49 89 6004 2280
*Contact email: tobias.eggendorfer@unibw.de

Abstract

Spam has grown to become a major threat for email communication. Although spam filters' degree of sophistication has increased ever since, they still produce huge amounts of false positives and false negatives thereby reducing the reliability of email. With more and more complex filtering methods implemented, the hardware requirements for mail servers increase to avoid the risk of denial of service situations. Some already claim that mail filtering has reached its limits and ask for more preventive solutions to fight spam. One would be to significantly increase the risk of a spammer being sued for damage compensation or, if legislation permits, for criminal offence. But spammers try to hide their real identity. This paper discusses several methods to identify spammers and analyses under which circumstances they might be a valid proof in court.