Research Article
Methods to identify spammers
@INPROCEEDINGS{10.4108/e-forensics.2008.31, author={Tobias Eggendorfer}, title={Methods to identify spammers}, proceedings={1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia}, publisher={ACM}, proceedings_a={E-FORENSICS}, year={2010}, month={5}, keywords={Spam Forensics Address trading Identification}, doi={10.4108/e-forensics.2008.31} }
- Tobias Eggendorfer
Year: 2010
Methods to identify spammers
E-FORENSICS
ACM
DOI: 10.4108/e-forensics.2008.31
Abstract
Spam has grown to become a major threat for email communication. Although spam filters' degree of sophistication has increased ever since, they still produce huge amounts of false positives and false negatives thereby reducing the reliability of email. With more and more complex filtering methods implemented, the hardware requirements for mail servers increase to avoid the risk of denial of service situations. Some already claim that mail filtering has reached its limits and ask for more preventive solutions to fight spam. One would be to significantly increase the risk of a spammer being sued for damage compensation or, if legislation permits, for criminal offence. But spammers try to hide their real identity. This paper discusses several methods to identify spammers and analyses under which circumstances they might be a valid proof in court.