Skip to main content
Log in

Effektivität von Lösungsansätzen zur Bekämpfung von Spam

Effectiveness of Anti-Spam Approaches

  • WI — State-of-the-Art
  • Published:
Wirtschaftsinformatik

Abstract

Spam as unsolicited email has certainly crossed the border of just being bothersome. In 2003, it surpassed legitimate email — growing to more than 50% of all Internet emails. Annually, it causes economic harms of several billion Euros. Fighting spam, beside legal approaches especially technical means are deployed in practical systems, mainly focussing on blocking and filtering mechanisms.

This article introduces into the spam field and describes, assesses, and classifies the currently most important approaches against spam.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Literatur

  1. Australian Department of the Treasury: Australian E-commerce Best Practice Model. http://www.ecommerce.treasury.gov.au/html/ecommerce.htm, 2000, Abruf am 2004-05-25

    Google Scholar 

  2. BBC: E-mail vetting blocks MPs’ sex debate. http://news.bbc.co.uk/1/hi/uk_politics/2723851.stm, 2003, Abruf am 2004-05-01.

    Google Scholar 

  3. Brightmail: Brightmail Reports on Spam Trends of 2003. http://www.brightmail.com/pressreleases/121803_spam_2003.html, 2003, Abruf am 2004-05-01.

    Google Scholar 

  4. Brightmail: The State of Spam — Impact & Solutions. http://www.brightmail.com/press/state_of_spam.pdf, 2003, Abruf am 2004-05-01.

    Google Scholar 

  5. Center for Democracy & Technology: Why Am I Getting All This Spam? Unsolicited Commercial E-mail Research Six Month Report. http://www.cdt.org/speech/spam/030319spamreport.shtml, 2003, Abruf am 2004-05-01.

    Google Scholar 

  6. Commission Nationale de l’Informatique et des Libertés: Le Publipostage Électronique Et La Protection Des Données Personnelles. http://www.cnil.fr/thematic/docs/publpost.pdf, 1999, Abruf am 2004-05-01.

    Google Scholar 

  7. Danisch, H.: The RMX DNS RR and method for lightweight SMTP sender authorization. Internet Draft. http://www.ietf.org/internet-drafts/draft-danisch-dns-rr-smtp-03.txt, 2003, Abruf am 2004-05-01.

    Google Scholar 

  8. Dwork, C.; Goldberg, A.; Naor, M.: On Memory-Bound Functions for Fighting Spam. Microsoft Research Report. http://research.microsoft.com/research/sv/PennyBlack/demo/lbdgn.pdf, 2002, Abruf am 2004-05-01.

    Google Scholar 

  9. Dwork, C.; Naor, M.: Pricing Via Processing Or Combatting Junk Mail. In: Lecture Notes in Computer Science (1993) 740, S. 137–147, Proceedings of CRYPTO’92. http://research.microsoft.com/research/sv/PennyBlack/junk1.pdf, Abruf am 2004-05-01.

    Google Scholar 

  10. ECT News Network: ISPs Consider Digital Stamps To Fight Spam. http://www.technewsworld.com/perl/story/32760.html, 2004-02-03, Abruf am 2004-05-25.

    Google Scholar 

  11. Fahlman, S. E.: Selling Interrupt Rights: a way to control unwanted e-mail and telephone calls. In: IBM Systems Journal 41 (2002) 4, S. 759–766. http://www.research.ibm.com/journal/sj/414/forum.pdf, Abruf am 2004-05-01.

    Google Scholar 

  12. Fecyk, G.: Designated Mailers Protocol — A Way to Identify Hosts Authorized to Send SMTP Traffic. Internet Draft. http://asrg.kavi.com/apps/group_public/download.php/24/DMP, 2003, Abruf am 2004-05-01.

    Google Scholar 

  13. Garfinkel, Simon: False Hope for Stopping Spam. MIT Enterprise Technology Review. http://www.technologyreview.com/articles/wo_garfinkel020404.asp, 2004-04-02, Abruf am 2004-05-01.

    Google Scholar 

  14. Gauthronet, S.; Etienne Drouard, E.: Unsolicited Commercial Communications and Data Protection. Commission Of The European Communities. http://europa.eu.int/comm/internal_market/privacy/docs/studies/spamsum_en.pdf, 2001, Abruf am 2004-05-01.

    Google Scholar 

  15. Hall, R.: Channels: Avoiding Unwanted Electronic Mail. Proceedings DIMACS Symposium on Network Threats DIMACS, 1996. ftp://ftp.research.att.com/dist/hall/papers/agents/channels-long.ps, Abruf am 2004-05-01.

    Google Scholar 

  16. Harris, E.: The Next Step in the Spam Control War: Greylisting. http://projects.puremagic.com/greylisting/, 2003, Abruf am 2004-05-01.

    Google Scholar 

  17. Hashcash.org: Hashcash. http://www.hashcash.org/, Abruf am 2004-05-01.

    Google Scholar 

  18. Heise: Uncovered: Trojans as Spam Robots. http://www.heise.de/english/newsticker/news/44879, 2004-02-21, Abruf am 2004-05-01.

    Google Scholar 

  19. ICANN: New sTLD RFP Application.mail. http://www.icann.org/tlds/stld-apps-19mar04/mail.htm, 2004, Abruf am 2004-05-01.

    Google Scholar 

  20. Köcher, J.: Anti-Spam-Gesetze: Der Versuch globaler rechtlicher Lösungsansätze. In: DFN Mitteilungen 64 (2004) 3, S. 29–30.

    Google Scholar 

  21. Levine, J.; DeKok, A. et al.: Lightweight MTA Authentication Protocol (LMAP) Discussion and Comparison. Internet Draft. http://asrg.kavi.com/apps/group_public/download.php/31/draft-irtf-asrg-lmapdiscussion-00.txt, 2004, Abruf am 2004-05-01.

    Google Scholar 

  22. Lentczner, M.; Wong, M. W.: Sender Policy Framework (SPF) — A Convention to Describe Hosts Authorized to Send SMTP Traffic. Internet Draft. http://spf.pobox.com/draftmengwong-spf-00.txt, 2004, Abruf am 2004-05-01.

    Google Scholar 

  23. Linke, A.: Spam oder nicht Spam? E-Mail sortieren mit Bayes-Filtern. In: c’t magazin für computertechnik (2003) 17, S. 150–153.

    Google Scholar 

  24. Microsoft Corporation: Caller ID for EMail: The Next Step to Deterring Spam. http://www.microsoft.com/mscorp/twc/privacy/spam_callerid.mspx, 2004, Abruf am 2004-05-01.

    Google Scholar 

  25. Mori, G.; Malik, J.: Recognizing Objects in Adversarial Clutter: Breaking a Visual CAPTCHA. IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 16.-22.06.2003, Wisconsin. http://www.cs.berkeley.edu/~mori/research/papers/mori_cvpr03.pdf, 2003, Abruf am 2004-05-01.

    Google Scholar 

  26. Mueller, S. H.: What is spam? Website of abuse.net. http://spam.abuse.net/overview/whatisspam.shtml, 2004, Abruf am 2004-05-01.

    Google Scholar 

  27. National Office for the Information Economy: Final Report Of The NOIE Review Of The Spam Problem And How It Can Be Countered. http://www.noie.gov.au/publications/NOIE/spam/final_report/index.htm, 2002, Abruf am 2004-05-01.

  28. Nucleus Research: Spam: The Silent ROI Killer. Research Note D59, 2003. http://www.gwtools.com/sales/pdf/spam_roi_analysis.pdf, Abruf am 2004-05-01.

    Google Scholar 

  29. OECD: Background Paper For The OECD Workshop On Spam, 2003. http://www.olis.oecd.org/olis/2003doc.nsf/LinkTo/dsti-iccp(2003)10-final, 2004-01-22, Abruf am 2004-05-01.

    Google Scholar 

  30. The Spamhaus Project: The Spamhaus Block List (SBL) Advisory Frequently Asked Questions. http://www.spamhaus.org/sbl/sblfaqs.lasso, 2004, Abruf am 2004-05-01.

    Google Scholar 

  31. Treiber, M.: Bayes Spamfilter. http://141.30.51.183/~treiber/statistik2/folien13_spamfilter.pdf, 2004-02-23, Abruf am 2004-05-17.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guido Schryen.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Schryen, G. Effektivität von Lösungsansätzen zur Bekämpfung von Spam. Wirtschaftsinf 46, 281–288 (2004). https://doi.org/10.1007/BF03250945

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF03250945

Keywords

Navigation