How To Stop Spam From Being A Problem



Similar documents
Broadband Acceptable Use Policy

An Overview of Spam Blocking Techniques

Marketing Glossary of Terms

Stop Spam Now! By John Buckman. John Buckman is President of Lyris Technologies, Inc. and programming architect behind Lyris list server.

Protecting your business from spam

Antispam Security Best Practices

Spam filtering. Peter Likarish Based on slides by EJ Jung 11/03/10

Spam blocking methods and experiences

How To Prevent Spam From Being Filtered Out Of Your Program

Software Engineering 4C03 SPAM

BULK MAIL CAMPAIGN RULES

Top 40 Marketing Terms You Should Know

A D M I N I S T R A T O R V 1. 0

Do you need to... Do you need to...

Marketing Do s and Don ts A Sprint Mail Whitepaper

(For purposes of this Agreement, "You", " users", and "account holders" are used interchangeably, and where applicable).

s and anti-spam Page 1

Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam

eprism Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

Configuring MDaemon for Centralized Spam Blocking and Filtering

SPAM UNDERSTANDING & AVOIDING

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

MDaemon configuration recommendations for dealing with spam related issues

How To Ensure Your Is Delivered

FILTERING FAQ

PineApp Anti IP Blacklisting

Being labeled as a spammer will drive your customers way, ruin your business, and can even get you a big fine or a jail sentence!

EnterGroup offers multiple spam fighting technologies so that you can pick and choose one or more that are right for you.

Deliverability Counts

Best Practices: How To Improve Your Survey Invitations and Deliverability Rate

WHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering through Your Web Application

Privacy, Data Collection and Information Management Practice Team November 13, 2003

The DMA s Analysis of Can Spam Act of 2003

Who will win the battle - Spammers or Service Providers?

Collateral Damage. Consequences of Spam and Virus Filtering for the System. Peter Eisentraut 22C3. credativ GmbH.

The Network Box Anti-Spam Solution

white paper Glossary of Spam Terms The jargon of the spam industry

Is Spam Bad For Your Mailbox?

Bayesian Learning Cleansing. In its original meaning, spam was associated with a canned meat from

eprism Security Suite

Questions or a need for further clarification should be directed to your College or department administrator.

An Anti-Spam Action Plan for Canada. Industry Canada

AntiSpam QuickStart Guide

FireEye Threat Prevention Cloud Evaluation

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

SCORECARD MARKETING. Find Out How Much You Are Really Getting Out of Your Marketing

Spam Filtering Methods for Filtering

Cloud Services. Anti-Spam. Admin Guide

Spam DNA Filtering System

Anti-SPAM Policy v

ANTI-SPAM POLICY JANUARY 2014

BULLGUARD SPAMFILTER

NEVER guess an address. Your mail will nearly always go to the wrong person.

Enhanced Spam Defence

escan Anti-Spam White Paper

Top 25 Marketing Terms You Should Know. Marketing from Constant Contact

Fighting spam in Australia. A consumer guide

INBOX. How to make sure more s reach your subscribers

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam .

Evaluation of Anti-spam Method Combining Bayesian Filtering and Strong Challenge and Response

Spam, Spam and More Spam. Spammers: Cost to send

How to Stop Spam s and Bounces

Webmail Friends & Exceptions Guide

Typical spam characteristics

More Details About Your Spam Digest & Dashboard

CONFIGURING FUS ANTI-SPAM

SIMPLE STEPS TO AVOID SPAM FILTERS DELIVERABILITY SUCCESS GUIDE

Anchor s Marketing Glossary and Common Terms


A White Paper. VerticalResponse, Delivery and You A Handy Guide. VerticalResponse,Inc nd Street, Suite 700 San Francisco, CA 94107

eprism Security Suite

Technical Solutions for Controlling Spam

Dealing with Spam. February 16, Marc Berger SRJC Information Technology. Tuesday, April 10, 12

REPUTATION-BASED MAIL FLOW CONTROL

Using MDaemon AntiSpam for Spam Control

BUCKEYE EXPRESS HIGH SPEED INTERNET SERVICE ACCEPTABLE USE POLICY

When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper

Management CSCU9B2 CSCU9B2 1

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Anti-Spam Methodologies: A Comparative Study

OVERVIEW OF SPAM FILTERS FOR MAC OS X CLIENTS A PRESENTATION TO MACFUNDAMENTALS MADE ON WEDNESDAY, APRIL 9, 2008 BY LEE MAXWELL, FACILITATOR

Gordon State College. Spam Firewall. User Guide

BARRACUDA. N e t w o r k s SPAM FIREWALL 600

Mailworks Anti-Spam Policy

Acceptable Use Policy ("AUP")

Phoenix Information Technology Services. Julio Cardenas

How To Comply With The Can-Spam Act

Blackbaud Communication Services Overview of Delivery and FAQs

USAGE GUIDE ADAM INTERNET SPAM FILTER MANAGER

OIS. Update on the anti spam system at CERN. Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010

Savita Teli 1, Santoshkumar Biradar 2

5 SIMPLE WAYS TO AVOID GETTING AN AVALANCHE OF SPAM

Fighting Spam in an ISP Environment:

Avira Managed Security (AMES) User Guide

Hosted CanIt. Roaring Penguin Software Inc. 26 April 2011

Anti-SPAM Solutions as a Component of Digital Communications Management

Purchase College Barracuda Anti-Spam Firewall User s Guide

1. Introduction Deliverability-Benchmarks Working with Your Service Provider sent delivered...

SPAM FILTER Service Data Sheet

Microsoft Outlook 2010 contains a Junk Filter designed to reduce unwanted messages in your

Transcription:

Solutions to Spam simple analysis of solutions to spam Thesis Submitted to Prof. Dr. Eduard Heindl on E-business technology in partial fulfilment for the degree of Master of Science in Business Consulting at the Faculty of Wirtschaftsinformatik Hochschule Furtwangen University By Di Xu 2010/12/15

Declaration The work cites all sources and was done by Di Xu. 2

Simple analysis of solution to spam Abstract: The number of spam in Internet has grown rapidly in the past few years. And this problem attracts society s attention. Anti-spam technology develops a lot to reduce the number of spam and protect end-users right. For users good behaviors can keep their private email addresses safe and avoid harvesting by spammers. For administrators using proper technologies like IP blocking or Spam filtering can provide a better platform to communicate for users. For the governments legislation enforcement offers another pressure to spammers so that spammers activity deserves limit. However each method has limited scope, in reality anti-spam technology needs to be improved in practical cases. Key Words: Spam, Anti-spam, spammer 3

Content Chapter 1... 5 Introduction... 5 1.1 Definition of Spam... 5 1.2 Characteristics of Spam... 5 Chapter 2... 6 Overview of Spam... 6 2.1 How to harvest email addresses... 6 2.2How to send spam... 7 2.2.1 webmail... 7 2.2.2 Third-party computers... 8 2.2.3 Open relays... 8 2.2.4 Open proxies... 8 2.2.5 Spammer viruses... 8 2.3 Influence of Spam... 8 2.3.1Waste of social resources... 8 2.3.2Waste of social wealth... 9 2.3.3Affecting the development of E-business... 9 Chapter 3... 9 Solutions to Spam... 9 3.1 Anti-spam technology for administrators... 9 3.1.1 IP Blocking... 9 3.1.1.1 Blacklist... 9 3.1.1.2Whitelist... 10 3.1.1.3 Greylist... 10 3.1.2 Spam Filtering... 11 3.1.2.1 Rule-based Filtering... 11 3.1.2.2 Checksum-based Filtering... 11 3.1.2.3 Content filtering... 12 3.1.3 Honeypot Email Addresses... 12 3.1.4 Payment-based approach... 12 3.1.5 Other Anti-Spam Technologies... 13 3.2 Legislation enforcement for government... 13 3.3 Anti-spam behaviors for users... 14 3.3.1 Select an Unusual E-mail Address... 14 3.3.2 Disposable Addresses... 14 3.3.3 Use Provided Filtering Systems... 15 3.3.4Never reply to Spam and never use the Unsubscribe Link... 15 Chapter 4... 15 Conclusion... 15 Reference:... 16 4

Chapter 1 Introduction 1.1 Definition of Spam The advent of email makes the communication of people more convenient and the cost of sending email is very low, which leads to a large potential opportunity of business. It drives some enterprises use email system to send business advisements. As the enterprises do e-business, the usage of email is the basis of applying e-business services. At the same time, spam always appears in the email lists, sometimes the number of spam is more than normal email. The real Email marketing is not sending email, but spam exerts a far-reaching influence in e-business. So to research e-business, it is inevitable to talk about the problem of spam. So what is spam? Which kind of email is spam? In English dictionary there is a definition of spam: Advertising material sent by email to people who have not asked for it (Oxford Advanced Learner s Dictionary, 7 th edition 2005). Here is a technical definition of spam: An electronic message is "spam" if (A) the recipient's personal identity and context are irrelevant because the message is equally applicable to many other potential recipients; AND (B) the recipient has not verifiably granted deliberate, explicit, and still-revocable permission for it to be sent(http://www.spamhaus.org/definition.html 1998-2010). Here is another definition of spam which is similar with technical definition, but emphases that the transmission and reception of the message appears to the recipient to give a disproportionate benefit to the sender (http://www.mail-abuse.com/spam_def.html 1989-2005). To summarize, unsolicited email is not certain to be spam, the email with bother or trouble to recipients could be spam. 1.2 Characteristics of Spam People send Spam in order to sell products and services or to promote an email scam. Generally spam is sent in bulk whose content includes product and service 5

advertisement, electronic magazines or information about illegal content. Basically spam can be divided into two types. One is not affecting the recipients seriously which consist of some product advertisements, the other one is with destructiveness. Spam has the following characteristics: Too many recipients There is no relationship between the recipients. Because the spammers send spam at random. No header or use forged header Spammers hide their true origin. They use fake header leads to being difficult to trace their Forged sender s address If recipients reply to spam e-mail, they will get a delivery error. The content of email with specific HTML tag To add more content in email,spam always uses some HTML tag which is not used in normal email. If spam contains HTML, it could contain hidden JavaScript, which lead to opening up web sites and activating advertisement popup windows. The body of email consists of small font size Spammers enter normal text at the bottom of the message in order to appear legitimate. Some spammers include this text in small font size. Email subject consists of email address or recipient name Either the complete email address or part of the email address (the part before the domain) is added to the subject in order to personalize the message and trick the recipient into thinking that it is a legitimate message. For legitimate mails there is no reason to enter the recipient s email address in the subject, so the presence of this is a pretty sure sign of spam (http://blog.policypatrol.com/the-top-10-spam-characteristics-6-10). Chapter 2 Overview of Spam 2.1 How to harvest email addresses There are many ways in which spammers can get your email address. 6

From web pages Contact information is available on the websites. Spammers look for email addresses by the programs which can scan the web pages to fix the email addresses. That is very easy to harvest. By guessing & cleaning Some spammers guess email addresses. To judge whether the email address is true or not, they send a test message or a real spam to the guessed addresses and wait for reply. The reply could be confirmation which is proved that the email addresses are correct or an error message. From white and yellow pages There are a lot of sites like white or yellow pages contain addresses from various sources, Spammers go through those directories in order to get email addresses. It is a large database of email addresses. Although most directories are not allowed to harvest email address by spammers, for spammers it is so attractive. From a previous owner of the email address It happens on the user at ISPs. For instance, someone signs up for an ISP and then his email address got by spammers. After that the user cancels the account. Another one registers the account with the same ISP which is known already by spammers. Buying lists from others There are different types of trading email address lists. The first type is buying the list of email addresses from some technical staff or someone who wants to earn more money has already harvested the list of email addresses by other methods. The second type is buying the lists from companies. Sometimes some companies sell their products or service and require their customers subscribe for email to keep in touch. Selling the list of email addresses brings extra income for the company. 2.2How to send spam 2.2.1 webmail Spammers create free email accounts to send spam or to get email responses from potential customers. They send a large number of spam, so they need several e-mail accounts. To require more free accounts, they use web bots to automate the creation of free accounts. This is a common way to send spam. 7

2.2.2 Third-party computers Because spammers send a large number of spam, the recipients are very unsatisfactory. And then ISPs would shut down their email account. In order to hide their true origin, spammers began to use others system to send spam. 2.2.3 Open relays At the beginning, spammers utilize open mail relay which is an MTA or mail server. They can send messages to any recipient from any places. Due to the limited number of hosts on the internet at that time, open relays make sure mail delivered. But spammers utilize this way to send bunches of emails. Because they abuse this method, mail system administrators demand that other mail operators configure MTAs to cease being open relays. 2.2.4 Open proxies Due to limited number of open relays, spammers began to use open proxies instead of open relays. Open proxies is a network service which helps the users connect to the server, the server only finds the incoming connection from the open proxy, not users origin. Spammers utilize this point to hide their own track. They connect to a mail server through an open proxy to send spam, not use their own computer. 2.2.5 Spammer viruses With the development of IT, spammers create their own method instead of looking for open relays or open proxies. They design spammer viruses to deploy proxies and spam-sending tools to send a large number of spam by controlling end-user s computers. 2.3 Influence of Spam 2.3.1Waste of social resources Spam takes up a large number of network resources, system resources and the bandwidth. It affects the rate of network transmit and the normal running of network. For normal users, spam occupies large space of e-mail account and distributes online fraud and deception. It needs to take a lot of time to deal with lots of spam. 8

2.3.2Waste of social wealth ISP service deal with email most of which are spam. Considering that dealing with spam will spend labor cost and material cost. Every year dealing with the problem of spam will spend a lot of money. 2.3.3Affecting the development of E-business Many E-business enterprises become the source of spam. To reduce the number of spam, many international organizations blacklisted some business websites. So spam affects the development of E-business. Chapter 3 Solutions to Spam 3.1 Anti-spam technology for administrators 3.1.1 IP Blocking 3.1.1.1 Blacklist A blacklist is a list of known IP addresses that are used to send spam and the earliest anti-spam technology. Internet Service Providers and e-mail administrators can subscribe to these blacklist databases in order to filter out spam passing through their systems. Once subscribing to these blacklists, spam is refused to connecting to the users of email account. According to different criterion, the different DNS blacklist services have varying IP addresses and network lists. Common databases include open proxies, open relays, networks or individual addresses guilty of sending spam, networks known to consist of dial-up users, and varies other less common lists(measure, Monitor, Control, AUUG Conference Proceedings 4-6 Sep. 2002, 207). The determination of blacklists is based on the unsatisfactory report of users. The service provider measures the percentage of users who subscribe to the list report senders of spam when users receive emails. After that, they select the origin of spam to list on the blacklists and keep the networks off the blacklists. Also users can complain to abuse system, For example, the federation of German consumer 9

organizations set up a spam abuse system in September 2005, which aims at determent and prosecution. Abuse systems can also be maintained by international or supranational organizations such as the EU(Anti-Spam Measures : Analysis and Design 2007, 54). However, when the senders want to hide their origin, it is very difficult to find the true sender of the spam. The method helps to filter many spam, but cannot prevent unsolicited message from unlisted servers. And another problem is some authorized email servers also blacklisted. So this needs another solution. The similar approach with Blacklist is Whitelist, it can solve receiving unsolicited message from unlisted servers. 3.1.1.2Whitelist The whitelist somehow is the opposite concept of the blacklists. The users make a list which consists of contacts who are allowed to connect. The whitelist method makes users may get email from trusted contacts or domain, but reject emails from not already known domain and contacts, which restricts communication. Due to the reason, there is a variation of the approach which is an automated challenge-response system. The system is able to check the existence of sender s email account by sending a challenge email and receiving a valid response. If the reply is confirmed, the sender s email account will be whitelisted without confirmation in the future communication. But since the approach has a variation, it could not be ignored that it is not a good solution for a large enterprise. And on the other hand, it is not difficult for spammers to guess which domain is whitelisted. 3.1.1.3 Greylist Greylist is decided by not only IP address, but also some more information of e-mail like envelope data. If the e-mail is the first time sent to the e-mail account, it will be rejected. But the information of e-mail will be stored. If in a specific time, the e-mail tries to be sent to the e-mail account again, the e-mail server will analyze the information of the e-mail to measure the information is whether match with the information stored. If matching is successful, the e-mail will be allowed to send. Greylist bases on the assumption that most spam do not send e-mail to the same email account again. But greylist leads to deliver email in delay before resent email will be confirmed to send. Sometimes some normal emails cannot be delivered, when senders consider the 10

temporary rejection as the permanent rejection. 3.1.2 Spam Filtering 3.1.2.1 Rule-based Filtering Users can design the rules to filter e-mail. For example, Gmail provides this kind of filter which is shown as the picture. Users can set content of subject and body. But the disadvantage of rule-based filtering is that spammers change their content of spam very easily and frequently. So rule-based filtering is not flexible. Fig.3.1.2.1.1 Google mail filter 3.1.2.2 Checksum-based Filtering There is one way to overcome with the use of whitelist for sources that should not be flagged as spam. This is checksum-based filtering, sometimes referred to collaborative filtering. Here are two filtering methods, distributed checksum clearinghouse and Vipul s Razor. Both of them are checksum-based and spam-detection-and-filtering network. It is the fact that spam has the very similar part of messages being sent to multiple recipients. When a user gets a spam, the content of spam is hashed into a unique identification which is submitted to the nearest Razor or DCC server. And DCC server will share it with other DCC servers to track submissions. They build an updating and distributed catalogue of spam. Some spammers change some parts of spam, but keep the same meaning. DCC owns fuzzy checksum which is able to ignore the differences. For most of email account providers it could be responsible to deal with the problem of spam. So the approach could be the better choice for them. It is an effective way to solve spam, but it costs comparative license fees. And another problem is that if spammers insert something unique invisible to the body of email, it will lead to different checksum. 11

3.1.2.3 Content filtering As the meaning of Content filters, the solution is content-based filters which scan the nature content of spam to measure whether it is spam or not. A Bayesian filter is a content-based filter with statistical analysis. It is an effective solution which generates fewer spam of false positives. The Bayesian filter uses one corpus of spam and on corpus of non-spam email. The content of these corpuses is from the entire text of each message. These messages are scanned, including the headers, embedded html and JavaScript, Alphanumeric characters, dollar signs, dasher and apostrophes were considered to be part of tokens and everything else as a token separator. Then according to the number of a token occurs in each corpus, that generates two hash tables. One of them is form every corpus, mapping tokens to the number of occurrences. The other one is mapping every token to the probability of the email consisting of it as a spam. That is for calculation the probability of spam. However the disadvantage of the approach is for some rare spam words, Bayesian could decrease the probability of the email is spam. The other problem is the Bayesian filter cannot filter email which consist of no words only image. So the filter has to disconnect the HTML link from accessing the external image. 3.1.3 Honeypot Email Addresses Mentioned above is how to reduce spam. Here talks about how to attack senders of spam. Honeypot or Tarpit look attractive for spammers. Honeypot addresses are forged email addresses which pollute spammers address database. Another method is spamtrapping which designs email address that can be found by spammers, normal users cannot find it. So if spammers use these addresses, the sender will be blacklisted. It is like bait to attract and attack spammers. However some articles said that the Honeypot system trains more and more hackers, because hackers challenge the systems and work around them. That leads to the systems keep ideal situation difficultly. 3.1.4 Payment-based approach Spammers send a large number of spam. One of the reasons is that cannot cost too much. So the payment-based approach relies on disincentive of profit to spam. In order to achieve the object, the e-mail servers require payment to delivery e-mail to 12

the recipients for the senders. But the payment can be the real currency or something else somehow like cost of senders computing. There is a kind of system require senders spend computational cost. The payment system called proof-of-work system such as hashcash and Penny Black. For example, when a user generate the stamp and send the email, it will take an amount of time. Because if the sender takes a certain amount of time to do this before sending email, that means the sender is not likely to be a spammer. Hashcash can calculate the computing time by the stamp added to the header of the email. But the problem is the difficulty of the calculations required must be increased over time. For example, if the hardware is old, it will affect the ability of calculation. So it will be difficult to participate in the email system. 3.1.5 Other Anti-Spam Technologies Each approach has advantages and disadvantages. If there is an approach which combines different approaches, that would be the most effective solution like hybrid filtering. SpamAssassin is one of the hybrid filtering methods. It uses content-based filter and real-time blacklists. It is wildly used content-based anti-spam filtering packages. Here is another approach. That is a system which uses whitelist, blacklist and content filter. This system blocks all the emails from some countries where the number of spam produced comparative high. Due to blocking the emails from the whole country, so it is easy to list whitelist according to successful cases. Content filter can reduce source of false positive e-mails. 3.2 Legislation enforcement for government Of course, simply deleting spam is not really the best solution. For users learning how to use anti-spam technology will take a long time. Nowadays many countries establish their own laws about anti-spam to protecting users, such as United States CAN-SPAM Act of 2003, Canada Electronic Commerce Protection Act and Australia Spam Act 2003 and so on. Some laws are very tough and strict like United States CAN-SPAM Act of 2003. The CAN-SPAM Act has four main provisions: 13 False and misleading header information is banned - This means that an email's "From," "To" and routing information, including the originating domain name and address, must be accurate and identify the sender. Deceptive subject lines are prohibited - The subject line cannot mislead the receiver of the message to open it under false pretenses, thinking it's

something else. The receiver must not be mislead as to the contents or subject matter of the email. Opt-out methods must be provided - A response mechanism must be provided for the receiver to opt-out of any future commercial messages from the sender. In addition, opt-out requests must be processed for at least 30 days after the initial commercial email was sent, and senders have 10 business days after an opt-out request to stop sending messages to that address. Messages cannot be sent to the opt-out requestor on behalf of the sender by any other entity. Commercial email must be identified as an advertisement and it must include the sender's valid physical postal address The receiver must be clearly informed that the message is an advertisement or solicitation, he must be told he can opt-out of future mailings, and a valid physical postal address must be included in the message. Receivers must be warned of sexually explicit material - For any message that contains sexually explicit material, the warning SEXUALLY-EXPLICIT must be contained in the subject line (http://www.spamlaws.com/spam-laws.html 2009). Somehow the legislative efforts reduce the number of spam. The legislation is also an effective and wild-cover solution to spam. 3.3 Anti-spam behaviors for users For spammers it is important to harvest recipients email address. So it is a good way that is users try to avoid own email addresses harvested by spammers. 3.3.1 Select an Unusual E-mail Address It is better to select an unusual username. That helps users to avoid their email addresses harvested. Because sometimes spammers guess email addresses, if users pick a usual username. It is very easy for spammers to guess. Or users can change the domain portion of e-mail address by a technology called address munging. For example, the e-mail address peter@antispam.gmail.com will instead of peter@gmail.com. That is a simple way to protect private e-mail address. 3.3.2 Disposable Addresses Some public forums and newsgroups require users for their e-mail address. Disposable e-mail addresses are the better choice for users. That means users can apply two e-mail accounts. One is created for private using, like communicate with family and friends or business partners. The other one is used to be public and users do not care about whether this e-mail account gets spam. 14

3.3.3 Use Provided Filtering Systems Nowadays there are some e-mail systems which provide some filtering tools. For end-users, using these tools can help to filter some spam. This tool is a simple option and do not require users master too complicated technology. For example, Hotmail are providers that give the end-users this option to filter e-mail. The default level can catch obvious spam. The enhanced level is most of the spam sent to the e-mail account, and finally the user can decide whether it is spam or not. They also allow the user to decide how to deal with the junk e-mail. The spam can be blacklisted or it can be kept in the junk folder so that the user can review it, and it is then deleted after a certain period of time. 3.3.4Never reply to Spam and never use the Unsubscribe Link When the recipients received spam, if the recipients reply to the spam, that means the recipients tell the spammer the e-mail address is valid. Although at the same time, on the other side there is no one to receive the recipients response. In addition, unsubscribe link in the spam should not either be used. Some links are clicked, then pop-up advisements will be opened. The other links are used to link some other commercial websites or other spam services. So respond to spam and using the unsubscribe link are the confirmation of the e-mail address is valid. Chapter 4 Conclusion Spam becomes the series problem of the society. Spam distributes online fraud and deception and viruses. Dealing with the problems which spam brings takes a certain amount of time and money. Anti-spam technology develops very rapidly, IP blocking and spam filtering are both very effective solution to spam. But for different and varied spam, flexible solutions are needed to tackle spam. So Honeypot email address and payment-based approach appear, from different points of view to reduce the number of spam. Nowadays although there are many approaches to solve the problem, even some countries establish spam laws to limit and administrate spam, spam still act in our life. Developing anti-spam technology is one way to cease spam, on the other hand motivating spammers awareness is also important. 15

Reference: AUUG Conference Proceedings Measure, Monitor, Control 4-6 Sep. 2002,207 Guido Schryen Anti-Spam Measures : Analysis and Design 2007,54 Oxford university press Oxford Advanced Learner s Dictionary 7 th edition 2005 Technical definition: http://www.spamhaus.org/definition.html 1998-2010 Standard definition: http://www.mail-abuse.com/spam_def.html 1989-2005 http://blog.policypatrol.com/the-top-10-spam-characteristics-6-10 US law: http://www.spamlaws.com/spam-laws.html 2009 16