SlideShare a Scribd company logo
1 of 25
SPAM
Email spam
Email spam, also known as junk
 email or unsolicited bulk email (UBE), is a subset
 of electronic spam involving nearly identical messages
 sent to numerous recipients by email. the opposite of
 "spam", email which one wants, is called "ham",
 usually when referring to a message's automated
 analysis (such as Bayesian filtering).
Email spam has steadily grown since the early 1990s.
 Botnets, networks of virus-infected computers, are
 used to send about 80% of spam.
Spammers collect email addresses from chatrooms,
 websites, customer lists, newsgroups, and viruses
 which harvest users' address books, and are sold to
 other spammers. They also use a practice known as
 "email appending" or "epending" in which they use
 known information about their target (such as a
 postal address) to search for the target's email
 address.
Overview
 From the beginning of the Internet (the ARPANET), sending of junk
  email has been prohibited,enforced by the Terms of Service/
  Acceptable Use Policy (ToS/AUP) of internet service providers (ISPs)
  and peer pressure. Even with a thousand users junk email for
  advertising is not tenable, and with a million users it is not only
  impractical,but also expensive.It is estimated that spam cost
  businesses on the order of $100 billion in 2007.As the scale of the
  spam problem has grown, ISPs and the public have turned to
  government for relief from spam, which has failed to materialize.


                                  Types
 Spam has several definitions varying by source.
 Unsolicited bulk email (UBE)—unsolicited email, sent in large quantities.
 Unsolicited commercial email (UCE)—this more restrictive definition is
 used by regulators whose mandate is to regulate commerce, such as the
 U.S. Federal Trade Commission.
Spamvertised sites
 Many spam emails contain URLs to a website or websites. According
  to a Commtouch report in the first quarter of 2010, there are
  "...183 billion spam messages" sent every day. The most popular spam
  topic is "pharmacy ads" which make up 81% of email spam messages.
Most common products advertised
 According to information compiled by Commtouch Software Ltd.,
  email spam for the first quarter of 2010 can be broken down as
  follows.

 EMail Spam by
 TopicPharmacy81%
 Replica5.40%
 Enhancers2.30%
 Phishing2.30%
 Degrees1.30%
 Casino1%
 Weight Loss0.40%
 Other6.30%
Spam techniques
Appending
  If a marketer has one database containing names,
  addresses, and telephone numbers of prospective
  customers, they can pay to have their database matched
  against an external database containing email addresses.

Image spam
Image spam is an obfuscating method in which the text of
  the message is stored as a GIF or JPEG image and
  displayed in the email.
Blank spam
  Blank spam is spam lacking a payload advertisement. Often the
  message body is missing altogether, as well as the subject line. Still, it
  fits the definition of spam because of its nature as bulk and
  unsolicited email.

 Backscatter spam
 Backscatter is a side-effect of email spam, viruses and worms, where
  email servers receiving spam and other mail send bounce messages to
  an innocent party.
Statistics and estimates
 The total volume of email spam has been consistently growing, but in 2011 the
  trend seems to have reversed.

 The first known spam email, advertising a DEC product presentation, was sent in
  1978 by Gary Thuerk to 600 addresses, which was all the users of ARPANET at
  the time, though software limitations meant only slightly more than half of the
  intended recipients actually received it.

 As of August 2010, the amount of spam was estimated to be around 200 billion
  spam messages sent per day. More than 97% of all emails sent over the net are
  unwanted, according to a Microsoft security report.

 A 2010 survey of US and European email users showed that 46% of the
  respondents had opened spam messages, although only 11% had clicked on a
  link.[45]
Highest amount of spam received
 According to Steve Ballmer, Microsoft founder Bill Gates receives four
  million emails per year, most of them spam.This was originally incorrectly
  reported as "per day".

 At the same time Jef Poskanzer, owner of the domain name acme.com,
  was receiving over one million spam emails per day


                            Cost of spam
 A 2004 survey estimated that lost productivity costs Internet users in the
  United States $21.58 billion annually, while another reported the cost at
  $17 billion, up from $11 billion in 2003. In 2004, the worldwide productivity
  cost of spam has been estimated to be $50 billion in 2005.An estimate of
  the percentage cost borne by the sender of marketing junk mail (
  snail mail) is 88%, whereas in 2001 one spam was estimated to cost $0.10
  for the receiver and $0.00001 (0.01% of the cost) for the sender.
Origin of spam
 Origin or source of spam refers to the geographical location of the computer from
  which the spam is sent; it is not the country where the spammer resides, nor the
  country that hosts the spamvertised site. Because of the international nature of
  spam, the spammer, the hijacked spam-sending computer, the spamvertised
  server, and the user target of the spam are all often located in different countries.
 In terms of volume of spam: According to Sophos, the major sources of spam in
  the fourth quarter of 2008 (October to December) were:
 The United States (the origin of 19.8% of spam messages, up from 18.9% in Q3)
 China (9.9%, up from 5.4%)
 Russia (6.4%, down from 8.3%)
 Brazil (6.3%, up from 4.5%)
 Turkey (4.4%, down from 8.2%)
 When grouped by continents, spam comes mostly from:
 Asia (37.8%, down from 39.8%)
 North America (23.6%, up from 21.8%)
 Europe (23.4%, down from 23.9%)
 South America (12.9%, down from 13.2%)
Spam - It’s YOUR Mailbox
Top 6 lies of spammers
Spam law 101
What your ISP : Internet Service Provider. can do
 to reduce spam
What you can do to fight or limit spam
  Things not to do
  Things to do
Top Lies of Spammers
      Lie            Truth
First Amendment         First Amendment
 means you can’t          restricts your right to
 complain about spam      complain? See Rowan
                          v. USPS
You can trust           Spam violates most
 spammers. They’re        contracts with ISPs. If
 just honest business     they lied to their ISP,
 people trying to make    can you believe what
 a buck                   they tell you?
Top Lies of Spammers
      Lie            Truth
There is no cost if you   Costs are incurred as
 just hit delete            soon as the mail hits
                            your ISP’s server
By spamming I save        Ever get spam from
 trees                      someone who
                            previously sent you
                            something on paper?
                            Sierra Club uses MAPS
                            to block spam
Top Lies of Spammers
     Lie            Truth
• S1618 defines spam,   • S1618 never passed,
  and this isn’t spam     and didn’t define
                          spam.


• To be removed, send   • Remove addresses, if
  an email to             valid at all, are
  …..@yada.com            frequent sources of
                          validated email
                          addresses
Spam Law 101
Colorado - CRS 6-2.5-101
  ADV
  no forgeries
  remove
Federal -HR3113
  now in US Senate
  passed House with one dissenting vote
  may not pass before Oct 6 adjournment
Spam Law 101
Contract law
  contracts can bar spam, and are enforceable
  upstreams can require downstream anti-spam contracts
  should also ban spam support services
Trespass to Chattel
  See Flowers v. Nowak, Cyberpromo v. AOL
  no first amendment right
  No anti-trust
ISP Anti-Spam Tools
 A strong AUP(Acceptable Upload Policy)or TOS(Terms of service),
  with clean up fees and cancellation for spamming or spam support
  services is first line of defense.

 The Mail Abuse Prevention System (MAPS) is an organisation that
  provides anti-spam support by maintaining a DNSBL. They provide five
  black lists, categorising why an address or an IP block is listed:

 Real-time Blackhole List (RBL), the one for which MAPS is probably best
  known.

 Dialup Users List (DUL), blocks of addresses that include
  many SOHO(small office-home office) users.

 Relay Spam Stopper (RSS), spam relays, e.g. hijacked servers.

 Open Proxy Servers (OPS), natively open SMTP (Simple Mail Transfer
  Protocol (SMTP))servers.
ISP Anti-Spam Toolsuse opt-
Non-confirming Mailing List (NML), marketers who
 out strategy.
The acronym MAPS is spam spelled backwards.

above.net (NYSE: ABVT), provides
  high bandwidth connectivity primarily for large corporate
  enterprises and communications carriers in the United States,
  Canada, and Europe.

a word about ORBS(the Open Relay Behaviour-
  modification System)

The acronym MAPS is spam spelled backwards.
Things NOT to do
Never respond to remove instructions unless you
 really subscribed to their list
Don’t fight abuse with abuse
Don’t assume the address the spam seemed to
 come from is really where it came from
Never buy from spammers
Things you can do
Complain effectively
Use an ISP that uses MAPS
Protect your email address
  use me@privacy.net when giving an address
  munge or use a throw away addr on usenet
  always uncheck the consent to spam boxes on forms
Complain Effectively
Spamcop - automate the complaints
Sam Spade - Windows based tool
Combat - web based research tool
RBL nominations - they can’t spam you if they
 can’t reach you
"Spamming is the scourge of electronic-mail and newsgroups on
the Internet. It can seriously interfere with the operation of public
services, to say nothing of the effect it may have on any
individual's e-mail mail system. ... Spammers are, in effect, taking
resources away from users and service suppliers without
compensation and without authorization."
                         Vint Cerf, Senior Vice President, MCI
Yavuz Adabalı
    2009010206002

Department Of Computer
      Engineering

 Karabük Üniversitesi

More Related Content

What's hot

Phishing awareness
Phishing awarenessPhishing awareness
Phishing awarenessPhishingBox
 
Email Security Best Practices
Email Security Best PracticesEmail Security Best Practices
Email Security Best PracticesKnowBe4
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awarenessTerranovatraining
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 
Email security presentation
Email security presentationEmail security presentation
Email security presentationSubhradeepMaji
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing TechniquesRaza_Abidi
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityBharath Rao
 
Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam FilteringiNazneen
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharyasankhadeep
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing AttacksSysCloud
 

What's hot (20)

Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Email Security Best Practices
Email Security Best PracticesEmail Security Best Practices
Email Security Best Practices
 
Spam
SpamSpam
Spam
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Email security
Email securityEmail security
Email security
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Email security presentation
Email security presentationEmail security presentation
Email security presentation
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Cia security model
Cia security modelCia security model
Cia security model
 
Cyber security
Cyber securityCyber security
Cyber security
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 
Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam Filtering
 
Spam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta BhattacharyaSpam and Anti-spam - Sudipta Bhattacharya
Spam and Anti-spam - Sudipta Bhattacharya
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Denial of service
Denial of serviceDenial of service
Denial of service
 

Viewers also liked

Viewers also liked (6)

Phishing
PhishingPhishing
Phishing
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniques
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ict
 
Spam
SpamSpam
Spam
 
Spam and Anti Spam Techniques
Spam and Anti Spam TechniquesSpam and Anti Spam Techniques
Spam and Anti Spam Techniques
 

Similar to What is SPAM?

Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filteringChippy Thomas
 
Final paper
Final paperFinal paper
Final paperJDonpfd3
 
Spam and Viral Marketing
Spam and Viral MarketingSpam and Viral Marketing
Spam and Viral Marketinghey4ndr3w
 
A review of spam filtering and measures of antispam
A review of spam filtering and measures of antispamA review of spam filtering and measures of antispam
A review of spam filtering and measures of antispamAlexander Decker
 
Cyber Spamming & its Types
Cyber Spamming & its TypesCyber Spamming & its Types
Cyber Spamming & its Typeshirakhalid2394
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010Symantec Italia
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy wayDeepakYadav1095
 
IRJET- Image Spam Detection: Problem and Existing Solution
IRJET-  	  Image Spam Detection: Problem and Existing SolutionIRJET-  	  Image Spam Detection: Problem and Existing Solution
IRJET- Image Spam Detection: Problem and Existing SolutionIRJET Journal
 
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Pinpointe On-Demand
 

Similar to What is SPAM? (20)

E spam
E spamE spam
E spam
 
E spam
E spamE spam
E spam
 
E spam
E spamE spam
E spam
 
E spam
E spamE spam
E spam
 
Spam!
Spam!Spam!
Spam!
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
 
Final paper
Final paperFinal paper
Final paper
 
Fighting spam
Fighting spamFighting spam
Fighting spam
 
Web spam
Web spamWeb spam
Web spam
 
402 406
402 406402 406
402 406
 
Spam Law - USC 2005
Spam Law - USC 2005Spam Law - USC 2005
Spam Law - USC 2005
 
Spam and Viral Marketing
Spam and Viral MarketingSpam and Viral Marketing
Spam and Viral Marketing
 
A review of spam filtering and measures of antispam
A review of spam filtering and measures of antispamA review of spam filtering and measures of antispam
A review of spam filtering and measures of antispam
 
Spam attacks
Spam attacksSpam attacks
Spam attacks
 
spam attacks
spam attacksspam attacks
spam attacks
 
Cyber Spamming & its Types
Cyber Spamming & its TypesCyber Spamming & its Types
Cyber Spamming & its Types
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy way
 
IRJET- Image Spam Detection: Problem and Existing Solution
IRJET-  	  Image Spam Detection: Problem and Existing SolutionIRJET-  	  Image Spam Detection: Problem and Existing Solution
IRJET- Image Spam Detection: Problem and Existing Solution
 
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

What is SPAM?

  • 2. Email spam Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email. the opposite of "spam", email which one wants, is called "ham", usually when referring to a message's automated analysis (such as Bayesian filtering). Email spam has steadily grown since the early 1990s. Botnets, networks of virus-infected computers, are used to send about 80% of spam.
  • 3. Spammers collect email addresses from chatrooms, websites, customer lists, newsgroups, and viruses which harvest users' address books, and are sold to other spammers. They also use a practice known as "email appending" or "epending" in which they use known information about their target (such as a postal address) to search for the target's email address.
  • 4. Overview  From the beginning of the Internet (the ARPANET), sending of junk email has been prohibited,enforced by the Terms of Service/ Acceptable Use Policy (ToS/AUP) of internet service providers (ISPs) and peer pressure. Even with a thousand users junk email for advertising is not tenable, and with a million users it is not only impractical,but also expensive.It is estimated that spam cost businesses on the order of $100 billion in 2007.As the scale of the spam problem has grown, ISPs and the public have turned to government for relief from spam, which has failed to materialize. Types Spam has several definitions varying by source. Unsolicited bulk email (UBE)—unsolicited email, sent in large quantities. Unsolicited commercial email (UCE)—this more restrictive definition is used by regulators whose mandate is to regulate commerce, such as the U.S. Federal Trade Commission.
  • 5. Spamvertised sites  Many spam emails contain URLs to a website or websites. According to a Commtouch report in the first quarter of 2010, there are "...183 billion spam messages" sent every day. The most popular spam topic is "pharmacy ads" which make up 81% of email spam messages.
  • 6. Most common products advertised  According to information compiled by Commtouch Software Ltd., email spam for the first quarter of 2010 can be broken down as follows.  EMail Spam by  TopicPharmacy81%  Replica5.40%  Enhancers2.30%  Phishing2.30%  Degrees1.30%  Casino1%  Weight Loss0.40%  Other6.30%
  • 7. Spam techniques Appending If a marketer has one database containing names, addresses, and telephone numbers of prospective customers, they can pay to have their database matched against an external database containing email addresses. Image spam Image spam is an obfuscating method in which the text of the message is stored as a GIF or JPEG image and displayed in the email.
  • 8. Blank spam Blank spam is spam lacking a payload advertisement. Often the message body is missing altogether, as well as the subject line. Still, it fits the definition of spam because of its nature as bulk and unsolicited email.  Backscatter spam  Backscatter is a side-effect of email spam, viruses and worms, where email servers receiving spam and other mail send bounce messages to an innocent party.
  • 9. Statistics and estimates  The total volume of email spam has been consistently growing, but in 2011 the trend seems to have reversed.  The first known spam email, advertising a DEC product presentation, was sent in 1978 by Gary Thuerk to 600 addresses, which was all the users of ARPANET at the time, though software limitations meant only slightly more than half of the intended recipients actually received it.  As of August 2010, the amount of spam was estimated to be around 200 billion spam messages sent per day. More than 97% of all emails sent over the net are unwanted, according to a Microsoft security report.  A 2010 survey of US and European email users showed that 46% of the respondents had opened spam messages, although only 11% had clicked on a link.[45]
  • 10. Highest amount of spam received  According to Steve Ballmer, Microsoft founder Bill Gates receives four million emails per year, most of them spam.This was originally incorrectly reported as "per day".  At the same time Jef Poskanzer, owner of the domain name acme.com, was receiving over one million spam emails per day Cost of spam  A 2004 survey estimated that lost productivity costs Internet users in the United States $21.58 billion annually, while another reported the cost at $17 billion, up from $11 billion in 2003. In 2004, the worldwide productivity cost of spam has been estimated to be $50 billion in 2005.An estimate of the percentage cost borne by the sender of marketing junk mail ( snail mail) is 88%, whereas in 2001 one spam was estimated to cost $0.10 for the receiver and $0.00001 (0.01% of the cost) for the sender.
  • 11. Origin of spam  Origin or source of spam refers to the geographical location of the computer from which the spam is sent; it is not the country where the spammer resides, nor the country that hosts the spamvertised site. Because of the international nature of spam, the spammer, the hijacked spam-sending computer, the spamvertised server, and the user target of the spam are all often located in different countries.  In terms of volume of spam: According to Sophos, the major sources of spam in the fourth quarter of 2008 (October to December) were:  The United States (the origin of 19.8% of spam messages, up from 18.9% in Q3)  China (9.9%, up from 5.4%)  Russia (6.4%, down from 8.3%)  Brazil (6.3%, up from 4.5%)  Turkey (4.4%, down from 8.2%)  When grouped by continents, spam comes mostly from:  Asia (37.8%, down from 39.8%)  North America (23.6%, up from 21.8%)  Europe (23.4%, down from 23.9%)  South America (12.9%, down from 13.2%)
  • 12.
  • 13. Spam - It’s YOUR Mailbox Top 6 lies of spammers Spam law 101 What your ISP : Internet Service Provider. can do to reduce spam What you can do to fight or limit spam Things not to do Things to do
  • 14. Top Lies of Spammers Lie Truth First Amendment First Amendment means you can’t restricts your right to complain about spam complain? See Rowan v. USPS You can trust Spam violates most spammers. They’re contracts with ISPs. If just honest business they lied to their ISP, people trying to make can you believe what a buck they tell you?
  • 15. Top Lies of Spammers Lie Truth There is no cost if you Costs are incurred as just hit delete soon as the mail hits your ISP’s server By spamming I save Ever get spam from trees someone who previously sent you something on paper? Sierra Club uses MAPS to block spam
  • 16. Top Lies of Spammers Lie Truth • S1618 defines spam, • S1618 never passed, and this isn’t spam and didn’t define spam. • To be removed, send • Remove addresses, if an email to valid at all, are …..@yada.com frequent sources of validated email addresses
  • 17. Spam Law 101 Colorado - CRS 6-2.5-101 ADV no forgeries remove Federal -HR3113 now in US Senate passed House with one dissenting vote may not pass before Oct 6 adjournment
  • 18. Spam Law 101 Contract law contracts can bar spam, and are enforceable upstreams can require downstream anti-spam contracts should also ban spam support services Trespass to Chattel See Flowers v. Nowak, Cyberpromo v. AOL no first amendment right No anti-trust
  • 19. ISP Anti-Spam Tools  A strong AUP(Acceptable Upload Policy)or TOS(Terms of service), with clean up fees and cancellation for spamming or spam support services is first line of defense.  The Mail Abuse Prevention System (MAPS) is an organisation that provides anti-spam support by maintaining a DNSBL. They provide five black lists, categorising why an address or an IP block is listed:  Real-time Blackhole List (RBL), the one for which MAPS is probably best known.  Dialup Users List (DUL), blocks of addresses that include many SOHO(small office-home office) users.  Relay Spam Stopper (RSS), spam relays, e.g. hijacked servers.  Open Proxy Servers (OPS), natively open SMTP (Simple Mail Transfer Protocol (SMTP))servers.
  • 20. ISP Anti-Spam Toolsuse opt- Non-confirming Mailing List (NML), marketers who out strategy. The acronym MAPS is spam spelled backwards. above.net (NYSE: ABVT), provides high bandwidth connectivity primarily for large corporate enterprises and communications carriers in the United States, Canada, and Europe. a word about ORBS(the Open Relay Behaviour- modification System) The acronym MAPS is spam spelled backwards.
  • 21. Things NOT to do Never respond to remove instructions unless you really subscribed to their list Don’t fight abuse with abuse Don’t assume the address the spam seemed to come from is really where it came from Never buy from spammers
  • 22. Things you can do Complain effectively Use an ISP that uses MAPS Protect your email address use me@privacy.net when giving an address munge or use a throw away addr on usenet always uncheck the consent to spam boxes on forms
  • 23. Complain Effectively Spamcop - automate the complaints Sam Spade - Windows based tool Combat - web based research tool RBL nominations - they can’t spam you if they can’t reach you
  • 24. "Spamming is the scourge of electronic-mail and newsgroups on the Internet. It can seriously interfere with the operation of public services, to say nothing of the effect it may have on any individual's e-mail mail system. ... Spammers are, in effect, taking resources away from users and service suppliers without compensation and without authorization." Vint Cerf, Senior Vice President, MCI
  • 25. Yavuz Adabalı 2009010206002 Department Of Computer Engineering Karabük Üniversitesi