The Community for Technology Leaders
RSS Icon
Issue No.06 - Nov.-Dec. (2012 vol.16)
pp: 22-29
H. Rafiee , Univ. of Potsdam, Potsdam, Germany
M. von Löwis , Univ. of Potsdam, Potsdam, Germany
C. Meinel , Univ. of Potsdam, Potsdam, Germany
Spam has posed a serious problem for users of email since its infancy. Today, automated strategies are required to deal with the massive amount of spam traffic. IPv4 networks offer a variety of solutions to reduce spam, but IPv6 networks' large address space and use of temporary addresses - both of which are particularly vulnerable to spam attacks - makes dealing with spam and the use of automated approaches much more difficult. IPv6 thus poses a unique security issue for ISPs because it's more difficult for them to differentiate between good IP addresses and those that are known to originate spam messages.
unsolicited e-mail, computer network security, IP networks, spam messages, IPv6 deployment, email, spam traffic, address space, temporary addresses, spam attacks, ISP, IP addresses, IP networks, Servers, Electronic mail, Internet, Postal services, Protocols, Network security, antispam classification, IP networks, Servers, Electronic mail, Internet, Postal services, Protocols, Network security, IPv6 antispam classification, IPv6 security, spam challenges, DKIM
H. Rafiee, M. von Löwis, C. Meinel, "IPv6 Deployment and Spam Challenges", IEEE Internet Computing, vol.16, no. 6, pp. 22-29, Nov.-Dec. 2012, doi:10.1109/MIC.2012.97
1. “Minutes of the Senate Committee on Judiciary,” Nevada State Legislature, 14 Mar. 2003; Senate/JUD/Final2197.html.
2. S. Suwa et al., “DNS Resource Record Analysis of URLs in Email Messages for Improving Spam Filtering,” Proc. IEEE/IPSJ Int'l Symp. Applications and the Internet, 2011, IEEE CS Press, pp. 439–444.
3. F. Paget, “From Fast-Flux to RockPhish,” McAfee Blog Central, 30 Nov. 2007; .
4. T.A. Almeida and A. Yamakami, “Content-Based Spam Filtering,” Proc. 23rd IEEE Int'l Joint Conf. Neural Networks, IEEE Press, 2010, pp. 1–7.
5. J. Wu and T. Deng, “Research in Anti-Spam Method Based on Bayesian Filtering,” Proc. Pacific-Asia Workshop on Computational Intelligence and Industrial Application, IEEE CS Press, 2008, pp. 887–891.
6. G.L. Wittel and S.F. Wu, “On Attacking Statistical Spam Filters,” Proc. 1st Conf. Email and Anti-Spam (CEAS), 2004;
7. J. Zhang, Z.H. Du, and W. Liu, “A Behavior-Based Detection Approach to Mass-Mailing Host,” Proc. Int'l Conf. Machine Learning, IEEE Press, 2007, pp. 2140–2144.
8. A. Ramachandran, N. Feamster, and S. Vempala, “Filtering Spam with Behavioral Blacklisting,” Proc. 14th ACM Conf. Computer and Communications Security, ACM, 2007, pp. 342–351.
9. P. Sousa et al., “A Collaborative Approach for Spam Detection,” Proc. 2nd Int'l Conf. Evolving Internet, IEEE Press, 2010, pp. 92–97.
10. N.T. Anh, T.Q. Anh, and N.X. Thang, “Spam Filter Based on Dynamic Sender Policy Framework,” Proc. IEEE Int'l Conf. Knowledge and Systems Eng., 2010; KSE.2010.11.
11. M. Takesue, “E-mail Sender Identification through Trusted Local Deposit-Agents,” Proc. 14th Int'l Conf. Network-Based Information Systems, IEEE Press, 2011, pp. 84–91.
12. “So Much Time, So Little Spam,” About Gmail, Google, fightspamspamexplained.html.
13. K.K. Kowser, K. Saruladha, and M. Packiavathy, “A DKIM-Based Architecture for Combating Good Word Attack in Statistical Spam Filters,” Int'l J. Scientific & Eng. Research, vol. 2, no. 6, 2011, pp. 120–122.
14. S. Aryapperuma and C.J. Mitchell, “Security Vulnerabilities in DNS and DNSSEC,” Proc. 2nd Int'l Conf. Availability, Reliability, and Security, IEEE CS Press, 2007, pp. 335–342.
15. Spamhaus IPv6 Blocklists Strategy Statement, the Spamhaus Project, 2012; 012spamhaus-ipv6-blocklists-strategy-statement .
48 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool