SlideShare a Scribd company logo
1 of 25
SPAM
Email spam
Email spam, also known as junk
 email or unsolicited bulk email (UBE), is a subset
 of electronic spam involving nearly identical messages
 sent to numerous recipients by email. the opposite of
 "spam", email which one wants, is called "ham",
 usually when referring to a message's automated
 analysis (such as Bayesian filtering).
Email spam has steadily grown since the early 1990s.
 Botnets, networks of virus-infected computers, are
 used to send about 80% of spam.
Spammers collect email addresses from chatrooms,
 websites, customer lists, newsgroups, and viruses
 which harvest users' address books, and are sold to
 other spammers. They also use a practice known as
 "email appending" or "epending" in which they use
 known information about their target (such as a
 postal address) to search for the target's email
 address.
Overview
 From the beginning of the Internet (the ARPANET), sending of junk
  email has been prohibited,enforced by the Terms of Service/
  Acceptable Use Policy (ToS/AUP) of internet service providers (ISPs)
  and peer pressure. Even with a thousand users junk email for
  advertising is not tenable, and with a million users it is not only
  impractical,but also expensive.It is estimated that spam cost
  businesses on the order of $100 billion in 2007.As the scale of the
  spam problem has grown, ISPs and the public have turned to
  government for relief from spam, which has failed to materialize.


                                  Types
 Spam has several definitions varying by source.
 Unsolicited bulk email (UBE)—unsolicited email, sent in large quantities.
 Unsolicited commercial email (UCE)—this more restrictive definition is
 used by regulators whose mandate is to regulate commerce, such as the
 U.S. Federal Trade Commission.
Spamvertised sites
 Many spam emails contain URLs to a website or websites. According
  to a Commtouch report in the first quarter of 2010, there are
  "...183 billion spam messages" sent every day. The most popular spam
  topic is "pharmacy ads" which make up 81% of email spam messages.
Most common products advertised
 According to information compiled by Commtouch Software Ltd.,
  email spam for the first quarter of 2010 can be broken down as
  follows.

 EMail Spam by
 TopicPharmacy81%
 Replica5.40%
 Enhancers2.30%
 Phishing2.30%
 Degrees1.30%
 Casino1%
 Weight Loss0.40%
 Other6.30%
Spam techniques
Appending
  If a marketer has one database containing names,
  addresses, and telephone numbers of prospective
  customers, they can pay to have their database matched
  against an external database containing email addresses.

Image spam
Image spam is an obfuscating method in which the text of
  the message is stored as a GIF or JPEG image and
  displayed in the email.
Blank spam
  Blank spam is spam lacking a payload advertisement. Often the
  message body is missing altogether, as well as the subject line. Still, it
  fits the definition of spam because of its nature as bulk and
  unsolicited email.

 Backscatter spam
 Backscatter is a side-effect of email spam, viruses and worms, where
  email servers receiving spam and other mail send bounce messages to
  an innocent party.
Statistics and estimates
 The total volume of email spam has been consistently growing, but in 2011 the
  trend seems to have reversed.

 The first known spam email, advertising a DEC product presentation, was sent in
  1978 by Gary Thuerk to 600 addresses, which was all the users of ARPANET at
  the time, though software limitations meant only slightly more than half of the
  intended recipients actually received it.

 As of August 2010, the amount of spam was estimated to be around 200 billion
  spam messages sent per day. More than 97% of all emails sent over the net are
  unwanted, according to a Microsoft security report.

 A 2010 survey of US and European email users showed that 46% of the
  respondents had opened spam messages, although only 11% had clicked on a
  link.[45]
Highest amount of spam received
 According to Steve Ballmer, Microsoft founder Bill Gates receives four
  million emails per year, most of them spam.This was originally incorrectly
  reported as "per day".

 At the same time Jef Poskanzer, owner of the domain name acme.com,
  was receiving over one million spam emails per day


                            Cost of spam
 A 2004 survey estimated that lost productivity costs Internet users in the
  United States $21.58 billion annually, while another reported the cost at
  $17 billion, up from $11 billion in 2003. In 2004, the worldwide productivity
  cost of spam has been estimated to be $50 billion in 2005.An estimate of
  the percentage cost borne by the sender of marketing junk mail (
  snail mail) is 88%, whereas in 2001 one spam was estimated to cost $0.10
  for the receiver and $0.00001 (0.01% of the cost) for the sender.
Origin of spam
 Origin or source of spam refers to the geographical location of the computer from
  which the spam is sent; it is not the country where the spammer resides, nor the
  country that hosts the spamvertised site. Because of the international nature of
  spam, the spammer, the hijacked spam-sending computer, the spamvertised
  server, and the user target of the spam are all often located in different countries.
 In terms of volume of spam: According to Sophos, the major sources of spam in
  the fourth quarter of 2008 (October to December) were:
 The United States (the origin of 19.8% of spam messages, up from 18.9% in Q3)
 China (9.9%, up from 5.4%)
 Russia (6.4%, down from 8.3%)
 Brazil (6.3%, up from 4.5%)
 Turkey (4.4%, down from 8.2%)
 When grouped by continents, spam comes mostly from:
 Asia (37.8%, down from 39.8%)
 North America (23.6%, up from 21.8%)
 Europe (23.4%, down from 23.9%)
 South America (12.9%, down from 13.2%)
Spam - It’s YOUR Mailbox
Top 6 lies of spammers
Spam law 101
What your ISP : Internet Service Provider. can do
 to reduce spam
What you can do to fight or limit spam
  Things not to do
  Things to do
Top Lies of Spammers
      Lie            Truth
First Amendment         First Amendment
 means you can’t          restricts your right to
 complain about spam      complain? See Rowan
                          v. USPS
You can trust           Spam violates most
 spammers. They’re        contracts with ISPs. If
 just honest business     they lied to their ISP,
 people trying to make    can you believe what
 a buck                   they tell you?
Top Lies of Spammers
      Lie            Truth
There is no cost if you   Costs are incurred as
 just hit delete            soon as the mail hits
                            your ISP’s server
By spamming I save        Ever get spam from
 trees                      someone who
                            previously sent you
                            something on paper?
                            Sierra Club uses MAPS
                            to block spam
Top Lies of Spammers
     Lie            Truth
• S1618 defines spam,   • S1618 never passed,
  and this isn’t spam     and didn’t define
                          spam.


• To be removed, send   • Remove addresses, if
  an email to             valid at all, are
  …..@yada.com            frequent sources of
                          validated email
                          addresses
Spam Law 101
Colorado - CRS 6-2.5-101
  ADV
  no forgeries
  remove
Federal -HR3113
  now in US Senate
  passed House with one dissenting vote
  may not pass before Oct 6 adjournment
Spam Law 101
Contract law
  contracts can bar spam, and are enforceable
  upstreams can require downstream anti-spam contracts
  should also ban spam support services
Trespass to Chattel
  See Flowers v. Nowak, Cyberpromo v. AOL
  no first amendment right
  No anti-trust
ISP Anti-Spam Tools
 A strong AUP(Acceptable Upload Policy)or TOS(Terms of service),
  with clean up fees and cancellation for spamming or spam support
  services is first line of defense.

 The Mail Abuse Prevention System (MAPS) is an organisation that
  provides anti-spam support by maintaining a DNSBL. They provide five
  black lists, categorising why an address or an IP block is listed:

 Real-time Blackhole List (RBL), the one for which MAPS is probably best
  known.

 Dialup Users List (DUL), blocks of addresses that include
  many SOHO(small office-home office) users.

 Relay Spam Stopper (RSS), spam relays, e.g. hijacked servers.

 Open Proxy Servers (OPS), natively open SMTP (Simple Mail Transfer
  Protocol (SMTP))servers.
ISP Anti-Spam Toolsuse opt-
Non-confirming Mailing List (NML), marketers who
 out strategy.
The acronym MAPS is spam spelled backwards.

above.net (NYSE: ABVT), provides
  high bandwidth connectivity primarily for large corporate
  enterprises and communications carriers in the United States,
  Canada, and Europe.

a word about ORBS(the Open Relay Behaviour-
  modification System)

The acronym MAPS is spam spelled backwards.
Things NOT to do
Never respond to remove instructions unless you
 really subscribed to their list
Don’t fight abuse with abuse
Don’t assume the address the spam seemed to
 come from is really where it came from
Never buy from spammers
Things you can do
Complain effectively
Use an ISP that uses MAPS
Protect your email address
  use me@privacy.net when giving an address
  munge or use a throw away addr on usenet
  always uncheck the consent to spam boxes on forms
Complain Effectively
Spamcop - automate the complaints
Sam Spade - Windows based tool
Combat - web based research tool
RBL nominations - they can’t spam you if they
 can’t reach you
"Spamming is the scourge of electronic-mail and newsgroups on
the Internet. It can seriously interfere with the operation of public
services, to say nothing of the effect it may have on any
individual's e-mail mail system. ... Spammers are, in effect, taking
resources away from users and service suppliers without
compensation and without authorization."
                         Vint Cerf, Senior Vice President, MCI
Yavuz Adabalı
    2009010206002

Department Of Computer
      Engineering

 Karabük Üniversitesi

More Related Content

What's hot

Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam FilteringiNazneen
 
Spoofing
SpoofingSpoofing
SpoofingSanjeev
 
Email security presentation
Email security presentationEmail security presentation
Email security presentationSubhradeepMaji
 
Email investigation
Email investigationEmail investigation
Email investigationAnimesh Shaw
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and AwarenessSanjiv Arora
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awarenessPhishingBox
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIMERohit Soni
 
Cyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesCyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesJayakumar PP
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security PresentationYosef Gamble
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacyvinyas87
 

What's hot (20)

Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam Filtering
 
Email security
Email securityEmail security
Email security
 
Spoofing
SpoofingSpoofing
Spoofing
 
Spam
SpamSpam
Spam
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
 
Spam and Anti Spam Techniques
Spam and Anti Spam TechniquesSpam and Anti Spam Techniques
Spam and Anti Spam Techniques
 
Email investigation
Email investigationEmail investigation
Email investigation
 
Email security
Email securityEmail security
Email security
 
E Mail Basic
E Mail BasicE Mail Basic
E Mail Basic
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Electronic mail
Electronic mailElectronic mail
Electronic mail
 
Email Security and Awareness
Email Security and AwarenessEmail Security and Awareness
Email Security and Awareness
 
Basics of E-Mail
Basics of E-MailBasics of E-Mail
Basics of E-Mail
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Steganography
Steganography Steganography
Steganography
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
 
Email Security : PGP & SMIME
Email Security : PGP & SMIMEEmail Security : PGP & SMIME
Email Security : PGP & SMIME
 
Cyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesCyber Space Threats and Opportunities
Cyber Space Threats and Opportunities
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security Presentation
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 

Similar to What is SPAM?

Similar to What is SPAM? (20)

E spam
E spamE spam
E spam
 
E spam
E spamE spam
E spam
 
E spam
E spamE spam
E spam
 
E spam
E spamE spam
E spam
 
Spam!
Spam!Spam!
Spam!
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
 
Final paper
Final paperFinal paper
Final paper
 
Fighting spam
Fighting spamFighting spam
Fighting spam
 
Web spam
Web spamWeb spam
Web spam
 
402 406
402 406402 406
402 406
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
Spam Law - USC 2005
Spam Law - USC 2005Spam Law - USC 2005
Spam Law - USC 2005
 
Spam and Viral Marketing
Spam and Viral MarketingSpam and Viral Marketing
Spam and Viral Marketing
 
A review of spam filtering and measures of antispam
A review of spam filtering and measures of antispamA review of spam filtering and measures of antispam
A review of spam filtering and measures of antispam
 
Spam attacks
Spam attacksSpam attacks
Spam attacks
 
spam attacks
spam attacksspam attacks
spam attacks
 
Cyber Spamming & its Types
Cyber Spamming & its TypesCyber Spamming & its Types
Cyber Spamming & its Types
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy way
 
IRJET- Image Spam Detection: Problem and Existing Solution
IRJET-  	  Image Spam Detection: Problem and Existing SolutionIRJET-  	  Image Spam Detection: Problem and Existing Solution
IRJET- Image Spam Detection: Problem and Existing Solution
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

What is SPAM?

  • 2. Email spam Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email. the opposite of "spam", email which one wants, is called "ham", usually when referring to a message's automated analysis (such as Bayesian filtering). Email spam has steadily grown since the early 1990s. Botnets, networks of virus-infected computers, are used to send about 80% of spam.
  • 3. Spammers collect email addresses from chatrooms, websites, customer lists, newsgroups, and viruses which harvest users' address books, and are sold to other spammers. They also use a practice known as "email appending" or "epending" in which they use known information about their target (such as a postal address) to search for the target's email address.
  • 4. Overview  From the beginning of the Internet (the ARPANET), sending of junk email has been prohibited,enforced by the Terms of Service/ Acceptable Use Policy (ToS/AUP) of internet service providers (ISPs) and peer pressure. Even with a thousand users junk email for advertising is not tenable, and with a million users it is not only impractical,but also expensive.It is estimated that spam cost businesses on the order of $100 billion in 2007.As the scale of the spam problem has grown, ISPs and the public have turned to government for relief from spam, which has failed to materialize. Types Spam has several definitions varying by source. Unsolicited bulk email (UBE)—unsolicited email, sent in large quantities. Unsolicited commercial email (UCE)—this more restrictive definition is used by regulators whose mandate is to regulate commerce, such as the U.S. Federal Trade Commission.
  • 5. Spamvertised sites  Many spam emails contain URLs to a website or websites. According to a Commtouch report in the first quarter of 2010, there are "...183 billion spam messages" sent every day. The most popular spam topic is "pharmacy ads" which make up 81% of email spam messages.
  • 6. Most common products advertised  According to information compiled by Commtouch Software Ltd., email spam for the first quarter of 2010 can be broken down as follows.  EMail Spam by  TopicPharmacy81%  Replica5.40%  Enhancers2.30%  Phishing2.30%  Degrees1.30%  Casino1%  Weight Loss0.40%  Other6.30%
  • 7. Spam techniques Appending If a marketer has one database containing names, addresses, and telephone numbers of prospective customers, they can pay to have their database matched against an external database containing email addresses. Image spam Image spam is an obfuscating method in which the text of the message is stored as a GIF or JPEG image and displayed in the email.
  • 8. Blank spam Blank spam is spam lacking a payload advertisement. Often the message body is missing altogether, as well as the subject line. Still, it fits the definition of spam because of its nature as bulk and unsolicited email.  Backscatter spam  Backscatter is a side-effect of email spam, viruses and worms, where email servers receiving spam and other mail send bounce messages to an innocent party.
  • 9. Statistics and estimates  The total volume of email spam has been consistently growing, but in 2011 the trend seems to have reversed.  The first known spam email, advertising a DEC product presentation, was sent in 1978 by Gary Thuerk to 600 addresses, which was all the users of ARPANET at the time, though software limitations meant only slightly more than half of the intended recipients actually received it.  As of August 2010, the amount of spam was estimated to be around 200 billion spam messages sent per day. More than 97% of all emails sent over the net are unwanted, according to a Microsoft security report.  A 2010 survey of US and European email users showed that 46% of the respondents had opened spam messages, although only 11% had clicked on a link.[45]
  • 10. Highest amount of spam received  According to Steve Ballmer, Microsoft founder Bill Gates receives four million emails per year, most of them spam.This was originally incorrectly reported as "per day".  At the same time Jef Poskanzer, owner of the domain name acme.com, was receiving over one million spam emails per day Cost of spam  A 2004 survey estimated that lost productivity costs Internet users in the United States $21.58 billion annually, while another reported the cost at $17 billion, up from $11 billion in 2003. In 2004, the worldwide productivity cost of spam has been estimated to be $50 billion in 2005.An estimate of the percentage cost borne by the sender of marketing junk mail ( snail mail) is 88%, whereas in 2001 one spam was estimated to cost $0.10 for the receiver and $0.00001 (0.01% of the cost) for the sender.
  • 11. Origin of spam  Origin or source of spam refers to the geographical location of the computer from which the spam is sent; it is not the country where the spammer resides, nor the country that hosts the spamvertised site. Because of the international nature of spam, the spammer, the hijacked spam-sending computer, the spamvertised server, and the user target of the spam are all often located in different countries.  In terms of volume of spam: According to Sophos, the major sources of spam in the fourth quarter of 2008 (October to December) were:  The United States (the origin of 19.8% of spam messages, up from 18.9% in Q3)  China (9.9%, up from 5.4%)  Russia (6.4%, down from 8.3%)  Brazil (6.3%, up from 4.5%)  Turkey (4.4%, down from 8.2%)  When grouped by continents, spam comes mostly from:  Asia (37.8%, down from 39.8%)  North America (23.6%, up from 21.8%)  Europe (23.4%, down from 23.9%)  South America (12.9%, down from 13.2%)
  • 12.
  • 13. Spam - It’s YOUR Mailbox Top 6 lies of spammers Spam law 101 What your ISP : Internet Service Provider. can do to reduce spam What you can do to fight or limit spam Things not to do Things to do
  • 14. Top Lies of Spammers Lie Truth First Amendment First Amendment means you can’t restricts your right to complain about spam complain? See Rowan v. USPS You can trust Spam violates most spammers. They’re contracts with ISPs. If just honest business they lied to their ISP, people trying to make can you believe what a buck they tell you?
  • 15. Top Lies of Spammers Lie Truth There is no cost if you Costs are incurred as just hit delete soon as the mail hits your ISP’s server By spamming I save Ever get spam from trees someone who previously sent you something on paper? Sierra Club uses MAPS to block spam
  • 16. Top Lies of Spammers Lie Truth • S1618 defines spam, • S1618 never passed, and this isn’t spam and didn’t define spam. • To be removed, send • Remove addresses, if an email to valid at all, are …..@yada.com frequent sources of validated email addresses
  • 17. Spam Law 101 Colorado - CRS 6-2.5-101 ADV no forgeries remove Federal -HR3113 now in US Senate passed House with one dissenting vote may not pass before Oct 6 adjournment
  • 18. Spam Law 101 Contract law contracts can bar spam, and are enforceable upstreams can require downstream anti-spam contracts should also ban spam support services Trespass to Chattel See Flowers v. Nowak, Cyberpromo v. AOL no first amendment right No anti-trust
  • 19. ISP Anti-Spam Tools  A strong AUP(Acceptable Upload Policy)or TOS(Terms of service), with clean up fees and cancellation for spamming or spam support services is first line of defense.  The Mail Abuse Prevention System (MAPS) is an organisation that provides anti-spam support by maintaining a DNSBL. They provide five black lists, categorising why an address or an IP block is listed:  Real-time Blackhole List (RBL), the one for which MAPS is probably best known.  Dialup Users List (DUL), blocks of addresses that include many SOHO(small office-home office) users.  Relay Spam Stopper (RSS), spam relays, e.g. hijacked servers.  Open Proxy Servers (OPS), natively open SMTP (Simple Mail Transfer Protocol (SMTP))servers.
  • 20. ISP Anti-Spam Toolsuse opt- Non-confirming Mailing List (NML), marketers who out strategy. The acronym MAPS is spam spelled backwards. above.net (NYSE: ABVT), provides high bandwidth connectivity primarily for large corporate enterprises and communications carriers in the United States, Canada, and Europe. a word about ORBS(the Open Relay Behaviour- modification System) The acronym MAPS is spam spelled backwards.
  • 21. Things NOT to do Never respond to remove instructions unless you really subscribed to their list Don’t fight abuse with abuse Don’t assume the address the spam seemed to come from is really where it came from Never buy from spammers
  • 22. Things you can do Complain effectively Use an ISP that uses MAPS Protect your email address use me@privacy.net when giving an address munge or use a throw away addr on usenet always uncheck the consent to spam boxes on forms
  • 23. Complain Effectively Spamcop - automate the complaints Sam Spade - Windows based tool Combat - web based research tool RBL nominations - they can’t spam you if they can’t reach you
  • 24. "Spamming is the scourge of electronic-mail and newsgroups on the Internet. It can seriously interfere with the operation of public services, to say nothing of the effect it may have on any individual's e-mail mail system. ... Spammers are, in effect, taking resources away from users and service suppliers without compensation and without authorization." Vint Cerf, Senior Vice President, MCI
  • 25. Yavuz Adabalı 2009010206002 Department Of Computer Engineering Karabük Üniversitesi