| Download ( PDF | 100kB) |
Do anti-spam measures effectively cover the e-mail communication network? A formal approach
Schryen, Guido (2007) Do anti-spam measures effectively cover the e-mail communication network? A formal approach. The Journal of Information Systems Security (AIS Special Interest Group in Security) 3 (2), S. 66-90.Veröffentlichungsdatum dieses Volltextes: 20 Jun 2011 07:40
Artikel
DOI zum Zitieren dieses Dokuments: 10.5283/epub.21252
Zusammenfassung
Spam e-mails have become a serious technological and economic problem. Up to now, by deploying complementary anti-spam measures, we have been reasonably able to withstand spam e-mails and use the Internet for regular communication. However, if we are to avert the danger of losing the Internet e-mail service in its capacity as a valuable, free and worldwide medium of open communication, anti-spam ...
Spam e-mails have become a serious technological and economic problem. Up to now, by deploying complementary anti-spam measures, we have been reasonably able to withstand spam e-mails and use the Internet for regular communication. However, if we are to avert the danger of losing the Internet e-mail service in its capacity as a valuable, free and worldwide medium of open communication, anti-spam activities should be performed more systematically than is currently the case regarding the mainly heuristic, anti-spam measures in place. A formal framework, within which the existing delivery routes that a spam e-mail may take, and anti-spam measures and their effectiveness can be investigated, will perhaps encourage a shift in methodology and pave the way for new, holistic anti-spam measures. This paper presents a model of the Internet e-mail infrastructure as a directed graph and a deterministic finite automaton and draws on automata theory to formally derive the spam delivery routes. The most important anti-spam measures are then described. Methods controlling only specific delivery routes are evaluated in terms of how effectively they cover the modeled e-mail infrastructure; methods operating independently of any particular routes receive a more general assessment.
Beteiligte Einrichtungen
Details
| Dokumentenart | Artikel |
| Titel eines Journals oder einer Zeitschrift | The Journal of Information Systems Security (AIS Special Interest Group in Security) |
| Band: | 3 |
|---|---|
| Nummer des Zeitschriftenheftes oder des Kapitels: | 2 |
| Seitenbereich: | S. 66-90 |
| Datum | 2007 |
| Institutionen | Wirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Entpflichtete oder im Ruhestand befindliche Professoren > Professur für Wirtschaftsinformatik (Prof. Dr. Guido Schryen) |
| Stichwörter / Keywords | e-mail, spam, e-mail infrastructure, anti-spam measures, spamming options |
| Dewey-Dezimal-Klassifikation | 000 Informatik, Informationswissenschaft, allgemeine Werke > 000 Allgemeines, Wissenschaft |
| Status | Veröffentlicht |
| Begutachtet | Ja, diese Version wurde begutachtet |
| An der Universität Regensburg entstanden | Nein |
| Dokumenten-ID | 21252 |
Downloadstatistik
Downloadstatistik