SlideShare a Scribd company logo
1 of 25
SPAM
Email spam
Email spam, also known as junk
 email or unsolicited bulk email (UBE), is a subset
 of electronic spam involving nearly identical messages
 sent to numerous recipients by email. the opposite of
 "spam", email which one wants, is called "ham",
 usually when referring to a message's automated
 analysis (such as Bayesian filtering).
Email spam has steadily grown since the early 1990s.
 Botnets, networks of virus-infected computers, are
 used to send about 80% of spam.
Spammers collect email addresses from chatrooms,
 websites, customer lists, newsgroups, and viruses
 which harvest users' address books, and are sold to
 other spammers. They also use a practice known as
 "email appending" or "epending" in which they use
 known information about their target (such as a
 postal address) to search for the target's email
 address.
Overview
 From the beginning of the Internet (the ARPANET), sending of junk
  email has been prohibited,enforced by the Terms of Service/
  Acceptable Use Policy (ToS/AUP) of internet service providers (ISPs)
  and peer pressure. Even with a thousand users junk email for
  advertising is not tenable, and with a million users it is not only
  impractical,but also expensive.It is estimated that spam cost
  businesses on the order of $100 billion in 2007.As the scale of the
  spam problem has grown, ISPs and the public have turned to
  government for relief from spam, which has failed to materialize.


                                  Types
 Spam has several definitions varying by source.
 Unsolicited bulk email (UBE)—unsolicited email, sent in large quantities.
 Unsolicited commercial email (UCE)—this more restrictive definition is
 used by regulators whose mandate is to regulate commerce, such as the
 U.S. Federal Trade Commission.
Spamvertised sites
 Many spam emails contain URLs to a website or websites. According
  to a Commtouch report in the first quarter of 2010, there are
  "...183 billion spam messages" sent every day. The most popular spam
  topic is "pharmacy ads" which make up 81% of email spam messages.
Most common products advertised
 According to information compiled by Commtouch Software Ltd.,
  email spam for the first quarter of 2010 can be broken down as
  follows.

 EMail Spam by
 TopicPharmacy81%
 Replica5.40%
 Enhancers2.30%
 Phishing2.30%
 Degrees1.30%
 Casino1%
 Weight Loss0.40%
 Other6.30%
Spam techniques
Appending
  If a marketer has one database containing names,
  addresses, and telephone numbers of prospective
  customers, they can pay to have their database matched
  against an external database containing email addresses.

Image spam
Image spam is an obfuscating method in which the text of
  the message is stored as a GIF or JPEG image and
  displayed in the email.
Blank spam
  Blank spam is spam lacking a payload advertisement. Often the
  message body is missing altogether, as well as the subject line. Still, it
  fits the definition of spam because of its nature as bulk and
  unsolicited email.

 Backscatter spam
 Backscatter is a side-effect of email spam, viruses and worms, where
  email servers receiving spam and other mail send bounce messages to
  an innocent party.
Statistics and estimates
 The total volume of email spam has been consistently growing, but in 2011 the
  trend seems to have reversed.

 The first known spam email, advertising a DEC product presentation, was sent in
  1978 by Gary Thuerk to 600 addresses, which was all the users of ARPANET at
  the time, though software limitations meant only slightly more than half of the
  intended recipients actually received it.

 As of August 2010, the amount of spam was estimated to be around 200 billion
  spam messages sent per day. More than 97% of all emails sent over the net are
  unwanted, according to a Microsoft security report.

 A 2010 survey of US and European email users showed that 46% of the
  respondents had opened spam messages, although only 11% had clicked on a
  link.[45]
Highest amount of spam received
 According to Steve Ballmer, Microsoft founder Bill Gates receives four
  million emails per year, most of them spam.This was originally incorrectly
  reported as "per day".

 At the same time Jef Poskanzer, owner of the domain name acme.com,
  was receiving over one million spam emails per day


                            Cost of spam
 A 2004 survey estimated that lost productivity costs Internet users in the
  United States $21.58 billion annually, while another reported the cost at
  $17 billion, up from $11 billion in 2003. In 2004, the worldwide productivity
  cost of spam has been estimated to be $50 billion in 2005.An estimate of
  the percentage cost borne by the sender of marketing junk mail (
  snail mail) is 88%, whereas in 2001 one spam was estimated to cost $0.10
  for the receiver and $0.00001 (0.01% of the cost) for the sender.
Origin of spam
 Origin or source of spam refers to the geographical location of the computer from
  which the spam is sent; it is not the country where the spammer resides, nor the
  country that hosts the spamvertised site. Because of the international nature of
  spam, the spammer, the hijacked spam-sending computer, the spamvertised
  server, and the user target of the spam are all often located in different countries.
 In terms of volume of spam: According to Sophos, the major sources of spam in
  the fourth quarter of 2008 (October to December) were:
 The United States (the origin of 19.8% of spam messages, up from 18.9% in Q3)
 China (9.9%, up from 5.4%)
 Russia (6.4%, down from 8.3%)
 Brazil (6.3%, up from 4.5%)
 Turkey (4.4%, down from 8.2%)
 When grouped by continents, spam comes mostly from:
 Asia (37.8%, down from 39.8%)
 North America (23.6%, up from 21.8%)
 Europe (23.4%, down from 23.9%)
 South America (12.9%, down from 13.2%)
Spam - It’s YOUR Mailbox
Top 6 lies of spammers
Spam law 101
What your ISP : Internet Service Provider. can do
 to reduce spam
What you can do to fight or limit spam
  Things not to do
  Things to do
Top Lies of Spammers
      Lie            Truth
First Amendment         First Amendment
 means you can’t          restricts your right to
 complain about spam      complain? See Rowan
                          v. USPS
You can trust           Spam violates most
 spammers. They’re        contracts with ISPs. If
 just honest business     they lied to their ISP,
 people trying to make    can you believe what
 a buck                   they tell you?
Top Lies of Spammers
      Lie            Truth
There is no cost if you   Costs are incurred as
 just hit delete            soon as the mail hits
                            your ISP’s server
By spamming I save        Ever get spam from
 trees                      someone who
                            previously sent you
                            something on paper?
                            Sierra Club uses MAPS
                            to block spam
Top Lies of Spammers
     Lie            Truth
• S1618 defines spam,   • S1618 never passed,
  and this isn’t spam     and didn’t define
                          spam.


• To be removed, send   • Remove addresses, if
  an email to             valid at all, are
  …..@yada.com            frequent sources of
                          validated email
                          addresses
Spam Law 101
Colorado - CRS 6-2.5-101
  ADV
  no forgeries
  remove
Federal -HR3113
  now in US Senate
  passed House with one dissenting vote
  may not pass before Oct 6 adjournment
Spam Law 101
Contract law
  contracts can bar spam, and are enforceable
  upstreams can require downstream anti-spam contracts
  should also ban spam support services
Trespass to Chattel
  See Flowers v. Nowak, Cyberpromo v. AOL
  no first amendment right
  No anti-trust
ISP Anti-Spam Tools
 A strong AUP(Acceptable Upload Policy)or TOS(Terms of service),
  with clean up fees and cancellation for spamming or spam support
  services is first line of defense.

 The Mail Abuse Prevention System (MAPS) is an organisation that
  provides anti-spam support by maintaining a DNSBL. They provide five
  black lists, categorising why an address or an IP block is listed:

 Real-time Blackhole List (RBL), the one for which MAPS is probably best
  known.

 Dialup Users List (DUL), blocks of addresses that include
  many SOHO(small office-home office) users.

 Relay Spam Stopper (RSS), spam relays, e.g. hijacked servers.

 Open Proxy Servers (OPS), natively open SMTP (Simple Mail Transfer
  Protocol (SMTP))servers.
ISP Anti-Spam Toolsuse opt-
Non-confirming Mailing List (NML), marketers who
 out strategy.
The acronym MAPS is spam spelled backwards.

above.net (NYSE: ABVT), provides
  high bandwidth connectivity primarily for large corporate
  enterprises and communications carriers in the United States,
  Canada, and Europe.

a word about ORBS(the Open Relay Behaviour-
  modification System)

The acronym MAPS is spam spelled backwards.
Things NOT to do
Never respond to remove instructions unless you
 really subscribed to their list
Don’t fight abuse with abuse
Don’t assume the address the spam seemed to
 come from is really where it came from
Never buy from spammers
Things you can do
Complain effectively
Use an ISP that uses MAPS
Protect your email address
  use me@privacy.net when giving an address
  munge or use a throw away addr on usenet
  always uncheck the consent to spam boxes on forms
Complain Effectively
Spamcop - automate the complaints
Sam Spade - Windows based tool
Combat - web based research tool
RBL nominations - they can’t spam you if they
 can’t reach you
"Spamming is the scourge of electronic-mail and newsgroups on
the Internet. It can seriously interfere with the operation of public
services, to say nothing of the effect it may have on any
individual's e-mail mail system. ... Spammers are, in effect, taking
resources away from users and service suppliers without
compensation and without authorization."
                         Vint Cerf, Senior Vice President, MCI
Yavuz Adabalı
    2009010206002

Department Of Computer
      Engineering

 Karabük Üniversitesi

More Related Content

What's hot

Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's typesAakash Baloch
 
E Mail & Spam Presentation
E Mail & Spam PresentationE Mail & Spam Presentation
E Mail & Spam Presentationnewsan2001
 
Philosophy of Artificial Intelligence
Philosophy of Artificial IntelligencePhilosophy of Artificial Intelligence
Philosophy of Artificial IntelligenceJuho Vaiste
 
Email Headers – Expert Forensic Analysis
Email Headers – Expert Forensic AnalysisEmail Headers – Expert Forensic Analysis
Email Headers – Expert Forensic AnalysisforensicEmailAnalysis
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber CrimeDr Raghu Khimani
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptPraveen362297
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speechUc Man
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam FilteringiNazneen
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 

What's hot (20)

Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
E Mail & Spam Presentation
E Mail & Spam PresentationE Mail & Spam Presentation
E Mail & Spam Presentation
 
Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Philosophy of Artificial Intelligence
Philosophy of Artificial IntelligencePhilosophy of Artificial Intelligence
Philosophy of Artificial Intelligence
 
Email Headers – Expert Forensic Analysis
Email Headers – Expert Forensic AnalysisEmail Headers – Expert Forensic Analysis
Email Headers – Expert Forensic Analysis
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Spamming
SpammingSpamming
Spamming
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Spam
Spam Spam
Spam
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
Artificial intelligence
Artificial intelligenceArtificial intelligence
Artificial intelligence
 
Freedom of speech
Freedom of speechFreedom of speech
Freedom of speech
 
Botnets
BotnetsBotnets
Botnets
 
System Security
System SecuritySystem Security
System Security
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Spamming and Spam Filtering
Spamming and Spam FilteringSpamming and Spam Filtering
Spamming and Spam Filtering
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
internet ppt
internet pptinternet ppt
internet ppt
 

Viewers also liked

Viewers also liked (6)

Phishing
PhishingPhishing
Phishing
 
Spam Filtering
Spam FilteringSpam Filtering
Spam Filtering
 
E mail image spam filtering techniques
E mail image spam filtering techniquesE mail image spam filtering techniques
E mail image spam filtering techniques
 
Spamming Ict
Spamming   IctSpamming   Ict
Spamming Ict
 
Spam
SpamSpam
Spam
 
Spam and Anti Spam Techniques
Spam and Anti Spam TechniquesSpam and Anti Spam Techniques
Spam and Anti Spam Techniques
 

Similar to What is SPAM?

Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filteringChippy Thomas
 
Final paper
Final paperFinal paper
Final paperJDonpfd3
 
Spam and Viral Marketing
Spam and Viral MarketingSpam and Viral Marketing
Spam and Viral Marketinghey4ndr3w
 
A review of spam filtering and measures of antispam
A review of spam filtering and measures of antispamA review of spam filtering and measures of antispam
A review of spam filtering and measures of antispamAlexander Decker
 
Cyber Spamming & its Types
Cyber Spamming & its TypesCyber Spamming & its Types
Cyber Spamming & its Typeshirakhalid2394
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010Symantec Italia
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy wayDeepakYadav1095
 
IRJET- Image Spam Detection: Problem and Existing Solution
IRJET-  	  Image Spam Detection: Problem and Existing SolutionIRJET-  	  Image Spam Detection: Problem and Existing Solution
IRJET- Image Spam Detection: Problem and Existing SolutionIRJET Journal
 
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Pinpointe On-Demand
 

Similar to What is SPAM? (20)

E spam
E spamE spam
E spam
 
E spam
E spamE spam
E spam
 
E spam
E spamE spam
E spam
 
E spam
E spamE spam
E spam
 
Spam!
Spam!Spam!
Spam!
 
Survey on spam filtering
Survey on spam filteringSurvey on spam filtering
Survey on spam filtering
 
Final paper
Final paperFinal paper
Final paper
 
Fighting spam
Fighting spamFighting spam
Fighting spam
 
Web spam
Web spamWeb spam
Web spam
 
402 406
402 406402 406
402 406
 
Spam Law - USC 2005
Spam Law - USC 2005Spam Law - USC 2005
Spam Law - USC 2005
 
Spam and Viral Marketing
Spam and Viral MarketingSpam and Viral Marketing
Spam and Viral Marketing
 
A review of spam filtering and measures of antispam
A review of spam filtering and measures of antispamA review of spam filtering and measures of antispam
A review of spam filtering and measures of antispam
 
Spam attacks
Spam attacksSpam attacks
Spam attacks
 
spam attacks
spam attacksspam attacks
spam attacks
 
Cyber Spamming & its Types
Cyber Spamming & its TypesCyber Spamming & its Types
Cyber Spamming & its Types
 
Spam Report Gennaio 2010
Spam Report Gennaio 2010Spam Report Gennaio 2010
Spam Report Gennaio 2010
 
Email marketing the easy way
Email marketing the easy wayEmail marketing the easy way
Email marketing the easy way
 
IRJET- Image Spam Detection: Problem and Existing Solution
IRJET-  	  Image Spam Detection: Problem and Existing SolutionIRJET-  	  Image Spam Detection: Problem and Existing Solution
IRJET- Image Spam Detection: Problem and Existing Solution
 
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
Whitepaper: Email Marketing Tips - How a SPAM Filter Works (Q & A)
 

Recently uploaded

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

What is SPAM?

  • 2. Email spam Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email. the opposite of "spam", email which one wants, is called "ham", usually when referring to a message's automated analysis (such as Bayesian filtering). Email spam has steadily grown since the early 1990s. Botnets, networks of virus-infected computers, are used to send about 80% of spam.
  • 3. Spammers collect email addresses from chatrooms, websites, customer lists, newsgroups, and viruses which harvest users' address books, and are sold to other spammers. They also use a practice known as "email appending" or "epending" in which they use known information about their target (such as a postal address) to search for the target's email address.
  • 4. Overview  From the beginning of the Internet (the ARPANET), sending of junk email has been prohibited,enforced by the Terms of Service/ Acceptable Use Policy (ToS/AUP) of internet service providers (ISPs) and peer pressure. Even with a thousand users junk email for advertising is not tenable, and with a million users it is not only impractical,but also expensive.It is estimated that spam cost businesses on the order of $100 billion in 2007.As the scale of the spam problem has grown, ISPs and the public have turned to government for relief from spam, which has failed to materialize. Types Spam has several definitions varying by source. Unsolicited bulk email (UBE)—unsolicited email, sent in large quantities. Unsolicited commercial email (UCE)—this more restrictive definition is used by regulators whose mandate is to regulate commerce, such as the U.S. Federal Trade Commission.
  • 5. Spamvertised sites  Many spam emails contain URLs to a website or websites. According to a Commtouch report in the first quarter of 2010, there are "...183 billion spam messages" sent every day. The most popular spam topic is "pharmacy ads" which make up 81% of email spam messages.
  • 6. Most common products advertised  According to information compiled by Commtouch Software Ltd., email spam for the first quarter of 2010 can be broken down as follows.  EMail Spam by  TopicPharmacy81%  Replica5.40%  Enhancers2.30%  Phishing2.30%  Degrees1.30%  Casino1%  Weight Loss0.40%  Other6.30%
  • 7. Spam techniques Appending If a marketer has one database containing names, addresses, and telephone numbers of prospective customers, they can pay to have their database matched against an external database containing email addresses. Image spam Image spam is an obfuscating method in which the text of the message is stored as a GIF or JPEG image and displayed in the email.
  • 8. Blank spam Blank spam is spam lacking a payload advertisement. Often the message body is missing altogether, as well as the subject line. Still, it fits the definition of spam because of its nature as bulk and unsolicited email.  Backscatter spam  Backscatter is a side-effect of email spam, viruses and worms, where email servers receiving spam and other mail send bounce messages to an innocent party.
  • 9. Statistics and estimates  The total volume of email spam has been consistently growing, but in 2011 the trend seems to have reversed.  The first known spam email, advertising a DEC product presentation, was sent in 1978 by Gary Thuerk to 600 addresses, which was all the users of ARPANET at the time, though software limitations meant only slightly more than half of the intended recipients actually received it.  As of August 2010, the amount of spam was estimated to be around 200 billion spam messages sent per day. More than 97% of all emails sent over the net are unwanted, according to a Microsoft security report.  A 2010 survey of US and European email users showed that 46% of the respondents had opened spam messages, although only 11% had clicked on a link.[45]
  • 10. Highest amount of spam received  According to Steve Ballmer, Microsoft founder Bill Gates receives four million emails per year, most of them spam.This was originally incorrectly reported as "per day".  At the same time Jef Poskanzer, owner of the domain name acme.com, was receiving over one million spam emails per day Cost of spam  A 2004 survey estimated that lost productivity costs Internet users in the United States $21.58 billion annually, while another reported the cost at $17 billion, up from $11 billion in 2003. In 2004, the worldwide productivity cost of spam has been estimated to be $50 billion in 2005.An estimate of the percentage cost borne by the sender of marketing junk mail ( snail mail) is 88%, whereas in 2001 one spam was estimated to cost $0.10 for the receiver and $0.00001 (0.01% of the cost) for the sender.
  • 11. Origin of spam  Origin or source of spam refers to the geographical location of the computer from which the spam is sent; it is not the country where the spammer resides, nor the country that hosts the spamvertised site. Because of the international nature of spam, the spammer, the hijacked spam-sending computer, the spamvertised server, and the user target of the spam are all often located in different countries.  In terms of volume of spam: According to Sophos, the major sources of spam in the fourth quarter of 2008 (October to December) were:  The United States (the origin of 19.8% of spam messages, up from 18.9% in Q3)  China (9.9%, up from 5.4%)  Russia (6.4%, down from 8.3%)  Brazil (6.3%, up from 4.5%)  Turkey (4.4%, down from 8.2%)  When grouped by continents, spam comes mostly from:  Asia (37.8%, down from 39.8%)  North America (23.6%, up from 21.8%)  Europe (23.4%, down from 23.9%)  South America (12.9%, down from 13.2%)
  • 12.
  • 13. Spam - It’s YOUR Mailbox Top 6 lies of spammers Spam law 101 What your ISP : Internet Service Provider. can do to reduce spam What you can do to fight or limit spam Things not to do Things to do
  • 14. Top Lies of Spammers Lie Truth First Amendment First Amendment means you can’t restricts your right to complain about spam complain? See Rowan v. USPS You can trust Spam violates most spammers. They’re contracts with ISPs. If just honest business they lied to their ISP, people trying to make can you believe what a buck they tell you?
  • 15. Top Lies of Spammers Lie Truth There is no cost if you Costs are incurred as just hit delete soon as the mail hits your ISP’s server By spamming I save Ever get spam from trees someone who previously sent you something on paper? Sierra Club uses MAPS to block spam
  • 16. Top Lies of Spammers Lie Truth • S1618 defines spam, • S1618 never passed, and this isn’t spam and didn’t define spam. • To be removed, send • Remove addresses, if an email to valid at all, are …..@yada.com frequent sources of validated email addresses
  • 17. Spam Law 101 Colorado - CRS 6-2.5-101 ADV no forgeries remove Federal -HR3113 now in US Senate passed House with one dissenting vote may not pass before Oct 6 adjournment
  • 18. Spam Law 101 Contract law contracts can bar spam, and are enforceable upstreams can require downstream anti-spam contracts should also ban spam support services Trespass to Chattel See Flowers v. Nowak, Cyberpromo v. AOL no first amendment right No anti-trust
  • 19. ISP Anti-Spam Tools  A strong AUP(Acceptable Upload Policy)or TOS(Terms of service), with clean up fees and cancellation for spamming or spam support services is first line of defense.  The Mail Abuse Prevention System (MAPS) is an organisation that provides anti-spam support by maintaining a DNSBL. They provide five black lists, categorising why an address or an IP block is listed:  Real-time Blackhole List (RBL), the one for which MAPS is probably best known.  Dialup Users List (DUL), blocks of addresses that include many SOHO(small office-home office) users.  Relay Spam Stopper (RSS), spam relays, e.g. hijacked servers.  Open Proxy Servers (OPS), natively open SMTP (Simple Mail Transfer Protocol (SMTP))servers.
  • 20. ISP Anti-Spam Toolsuse opt- Non-confirming Mailing List (NML), marketers who out strategy. The acronym MAPS is spam spelled backwards. above.net (NYSE: ABVT), provides high bandwidth connectivity primarily for large corporate enterprises and communications carriers in the United States, Canada, and Europe. a word about ORBS(the Open Relay Behaviour- modification System) The acronym MAPS is spam spelled backwards.
  • 21. Things NOT to do Never respond to remove instructions unless you really subscribed to their list Don’t fight abuse with abuse Don’t assume the address the spam seemed to come from is really where it came from Never buy from spammers
  • 22. Things you can do Complain effectively Use an ISP that uses MAPS Protect your email address use me@privacy.net when giving an address munge or use a throw away addr on usenet always uncheck the consent to spam boxes on forms
  • 23. Complain Effectively Spamcop - automate the complaints Sam Spade - Windows based tool Combat - web based research tool RBL nominations - they can’t spam you if they can’t reach you
  • 24. "Spamming is the scourge of electronic-mail and newsgroups on the Internet. It can seriously interfere with the operation of public services, to say nothing of the effect it may have on any individual's e-mail mail system. ... Spammers are, in effect, taking resources away from users and service suppliers without compensation and without authorization." Vint Cerf, Senior Vice President, MCI
  • 25. Yavuz Adabalı 2009010206002 Department Of Computer Engineering Karabük Üniversitesi