Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Spam Detection Using Network-Level Characteristics

  • Reference work entry
Encyclopedia of Cryptography and Security

Synonyms

Antispam based on sender reputation

Definition

Spam Detection Using Network-Level Characteristics is a type of method that is used to determine whether a given email is unsolicited based on the network characteristics of the sender, for example, the IP address, pattern of SMTP transactions, and the associated Autonomous System Number (ASN).

Background

Unsolicited email, also referred to as Spam, is one of the pernicious problems on Internet today. There have been numerous efforts to design an automated mechanism to determine whether an email is unsolicited or not. These methods can have two flavors: One that is based on the email’s content, and the other based on the network-level characteristics of the sender.

Theory and Applications

Senders could be identified by sender’s email ID, IP address, or domain. For instance, PGP [49] is an email ID-based authentication technique where a third-party server maintains individual users’ public keys. A sender’s signed emails can be...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Allman E (2005) Domain Keys Identified Mail (DKIM): introduction and overview

    Google Scholar 

  2. Microsoft Corporation (2004) Sender id framework – executive overview

    Google Scholar 

  3. Peterson P (2006) SIDF and DKIM overview scorecard, authentication summit II

    Google Scholar 

  4. Price W (2003) Inside PGP key reconstruction. A PGP corporation white paper

    Google Scholar 

  5. Ramachandran A, Feamster N (2006) Understanding the network-level behavior of spammers. In: Proceedings of ACM SIGCOMM’06, Pisa, 11–16 Sept 2006

    Google Scholar 

  6. Realtime Blackhole List (2002) Mail Abuse Prevention System LLC, California. http://www.mail-abuse.org/rbl/

  7. Wong MW (2004) Sender authentication: what to do, Technical document

    Google Scholar 

  8. Yahoo Inc, Domain Keys: proving and protecting email sender identity

    Google Scholar 

  9. Zimmermann P (1995) The official PGP user’s guide. MIT Press, Cambridge

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Kang, B.B., Singaraju, G. (2011). Spam Detection Using Network-Level Characteristics. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_850

Download citation

Publish with us

Policies and ethics