Abstract
Spam as unsolicited email has certainly crossed the border of just being bothersome. In 2003, it surpassed legitimate email — growing to more than 50% of all Internet emails. Annually, it causes economic harms of several billion Euros. Fighting spam, beside legal approaches especially technical means are deployed in practical systems, mainly focussing on blocking and filtering mechanisms.
This article introduces into the spam field and describes, assesses, and classifies the currently most important approaches against spam.
Similar content being viewed by others
Literatur
Australian Department of the Treasury: Australian E-commerce Best Practice Model. http://www.ecommerce.treasury.gov.au/html/ecommerce.htm, 2000, Abruf am 2004-05-25
BBC: E-mail vetting blocks MPs’ sex debate. http://news.bbc.co.uk/1/hi/uk_politics/2723851.stm, 2003, Abruf am 2004-05-01.
Brightmail: Brightmail Reports on Spam Trends of 2003. http://www.brightmail.com/pressreleases/121803_spam_2003.html, 2003, Abruf am 2004-05-01.
Brightmail: The State of Spam — Impact & Solutions. http://www.brightmail.com/press/state_of_spam.pdf, 2003, Abruf am 2004-05-01.
Center for Democracy & Technology: Why Am I Getting All This Spam? Unsolicited Commercial E-mail Research Six Month Report. http://www.cdt.org/speech/spam/030319spamreport.shtml, 2003, Abruf am 2004-05-01.
Commission Nationale de l’Informatique et des Libertés: Le Publipostage Électronique Et La Protection Des Données Personnelles. http://www.cnil.fr/thematic/docs/publpost.pdf, 1999, Abruf am 2004-05-01.
Danisch, H.: The RMX DNS RR and method for lightweight SMTP sender authorization. Internet Draft. http://www.ietf.org/internet-drafts/draft-danisch-dns-rr-smtp-03.txt, 2003, Abruf am 2004-05-01.
Dwork, C.; Goldberg, A.; Naor, M.: On Memory-Bound Functions for Fighting Spam. Microsoft Research Report. http://research.microsoft.com/research/sv/PennyBlack/demo/lbdgn.pdf, 2002, Abruf am 2004-05-01.
Dwork, C.; Naor, M.: Pricing Via Processing Or Combatting Junk Mail. In: Lecture Notes in Computer Science (1993) 740, S. 137–147, Proceedings of CRYPTO’92. http://research.microsoft.com/research/sv/PennyBlack/junk1.pdf, Abruf am 2004-05-01.
ECT News Network: ISPs Consider Digital Stamps To Fight Spam. http://www.technewsworld.com/perl/story/32760.html, 2004-02-03, Abruf am 2004-05-25.
Fahlman, S. E.: Selling Interrupt Rights: a way to control unwanted e-mail and telephone calls. In: IBM Systems Journal 41 (2002) 4, S. 759–766. http://www.research.ibm.com/journal/sj/414/forum.pdf, Abruf am 2004-05-01.
Fecyk, G.: Designated Mailers Protocol — A Way to Identify Hosts Authorized to Send SMTP Traffic. Internet Draft. http://asrg.kavi.com/apps/group_public/download.php/24/DMP, 2003, Abruf am 2004-05-01.
Garfinkel, Simon: False Hope for Stopping Spam. MIT Enterprise Technology Review. http://www.technologyreview.com/articles/wo_garfinkel020404.asp, 2004-04-02, Abruf am 2004-05-01.
Gauthronet, S.; Etienne Drouard, E.: Unsolicited Commercial Communications and Data Protection. Commission Of The European Communities. http://europa.eu.int/comm/internal_market/privacy/docs/studies/spamsum_en.pdf, 2001, Abruf am 2004-05-01.
Hall, R.: Channels: Avoiding Unwanted Electronic Mail. Proceedings DIMACS Symposium on Network Threats DIMACS, 1996. ftp://ftp.research.att.com/dist/hall/papers/agents/channels-long.ps, Abruf am 2004-05-01.
Harris, E.: The Next Step in the Spam Control War: Greylisting. http://projects.puremagic.com/greylisting/, 2003, Abruf am 2004-05-01.
Hashcash.org: Hashcash. http://www.hashcash.org/, Abruf am 2004-05-01.
Heise: Uncovered: Trojans as Spam Robots. http://www.heise.de/english/newsticker/news/44879, 2004-02-21, Abruf am 2004-05-01.
ICANN: New sTLD RFP Application.mail. http://www.icann.org/tlds/stld-apps-19mar04/mail.htm, 2004, Abruf am 2004-05-01.
Köcher, J.: Anti-Spam-Gesetze: Der Versuch globaler rechtlicher Lösungsansätze. In: DFN Mitteilungen 64 (2004) 3, S. 29–30.
Levine, J.; DeKok, A. et al.: Lightweight MTA Authentication Protocol (LMAP) Discussion and Comparison. Internet Draft. http://asrg.kavi.com/apps/group_public/download.php/31/draft-irtf-asrg-lmapdiscussion-00.txt, 2004, Abruf am 2004-05-01.
Lentczner, M.; Wong, M. W.: Sender Policy Framework (SPF) — A Convention to Describe Hosts Authorized to Send SMTP Traffic. Internet Draft. http://spf.pobox.com/draftmengwong-spf-00.txt, 2004, Abruf am 2004-05-01.
Linke, A.: Spam oder nicht Spam? E-Mail sortieren mit Bayes-Filtern. In: c’t magazin für computertechnik (2003) 17, S. 150–153.
Microsoft Corporation: Caller ID for EMail: The Next Step to Deterring Spam. http://www.microsoft.com/mscorp/twc/privacy/spam_callerid.mspx, 2004, Abruf am 2004-05-01.
Mori, G.; Malik, J.: Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA. IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 16.-22.06.2003, Wisconsin. http://www.cs.berkeley.edu/~mori/research/papers/mori_cvpr03.pdf, 2003, Abruf am 2004-05-01.
Mueller, S. H.: What is spam? Website of abuse.net. http://spam.abuse.net/overview/whatisspam.shtml, 2004, Abruf am 2004-05-01.
National Office for the Information Economy: Final Report Of The NOIE Review Of The Spam Problem And How It Can Be Countered. http://www.noie.gov.au/publications/NOIE/spam/final_report/index.htm, 2002, Abruf am 2004-05-01.
Nucleus Research: Spam: The Silent ROI Killer. Research Note D59, 2003. http://www.gwtools.com/sales/pdf/spam_roi_analysis.pdf, Abruf am 2004-05-01.
OECD: Background Paper For The OECD Workshop On Spam, 2003. http://www.olis.oecd.org/olis/2003doc.nsf/LinkTo/dsti-iccp(2003)10-final, 2004-01-22, Abruf am 2004-05-01.
The Spamhaus Project: The Spamhaus Block List (SBL) Advisory Frequently Asked Questions. http://www.spamhaus.org/sbl/sblfaqs.lasso, 2004, Abruf am 2004-05-01.
Treiber, M.: Bayes Spamfilter. http://141.30.51.183/~treiber/statistik2/folien13_spamfilter.pdf, 2004-02-23, Abruf am 2004-05-17.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Schryen, G. Effektivität von Lösungsansätzen zur Bekämpfung von Spam. Wirtschaftsinf 46, 281–288 (2004). https://doi.org/10.1007/BF03250945
Issue Date:
DOI: https://doi.org/10.1007/BF03250945