| Download ( PDF | 119kB) |
An e-mail honeypot addressing spammers' behavior in collecting and applying addresses
Schryen, Guido (2005) An e-mail honeypot addressing spammers' behavior in collecting and applying addresses. In: 6th IEEE Information Assurance Workshop, 2005, Westpoint.Veröffentlichungsdatum dieses Volltextes: 27 Jun 2011 07:27
Konferenz- oder Workshop-Beitrag
DOI zum Zitieren dieses Dokuments: 10.5283/epub.21301
Zusammenfassung
Spam has become one of the most annoying and costly phenomenon in the Internet. Valid e-mail addresses belong to the most valuable resources of spammers, but little is known about spammers’ behavior when collecting and harvesting addresses and spammers’ capabilities and interest in carefully directed, consumer-oriented marketing have not been explored yet. Gaining insight into spammers’ ways to ...
Spam has become one of the most annoying and costly
phenomenon in the Internet. Valid e-mail addresses belong to
the most valuable resources of spammers, but little is known
about spammers’ behavior when collecting and harvesting
addresses and spammers’ capabilities and interest in carefully
directed, consumer-oriented marketing have not been explored
yet. Gaining insight into spammers’ ways to obtain and
(mis)use e-mail addresses is useful in many ways, e.g. for the
assessment of the effectiveness of address obscuring
techniques and the usability and necessity of hiding e-mail
addresses on the Internet. This paper presents a spam
honeypot project in progress addressing these issues by
systematically placing e-mail addresses in the Internet and
analyzing received e-mails. The honeypot’s conceptual
framework, its implementation, and first empirical results are
presented. Finally, an outlook on further work and activities is
provided.
Beteiligte Einrichtungen
Details
| Dokumentenart | Konferenz- oder Workshop-Beitrag (Nicht ausgewählt) |
| Seitenbereich: | S. 37-41 |
|---|---|
| Datum | 2005 |
| Institutionen | Wirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Entpflichtete oder im Ruhestand befindliche Professoren > Professur für Wirtschaftsinformatik (Prof. Dr. Guido Schryen) |
| Stichwörter / Keywords | Spam, ham, e-mail, honeypot, address obscuring technique, address taxonomy |
| Dewey-Dezimal-Klassifikation | 300 Sozialwissenschaften > 330 Wirtschaft 000 Informatik, Informationswissenschaft, allgemeine Werke > 000 Allgemeines, Wissenschaft |
| Status | Veröffentlicht |
| Begutachtet | Ja, diese Version wurde begutachtet |
| An der Universität Regensburg entstanden | Nein |
| URN der UB Regensburg | urn:nbn:de:bvb:355-epub-213019 |
| Dokumenten-ID | 21301 |
Downloadstatistik
Downloadstatistik