The Community for Technology Leaders
Innovative Mobile and Internet Services in Ubiquitous Computing, International Conference on (2011)
Seoul, Korea
June 30, 2011 to July 2, 2011
ISBN: 978-0-7695-4372-7
pp: 347-352
We often receive unwanted information from a variety of electronic systems mainly through emails, electronic boards and messengers, called spam. Spam is the use of electronic messaging systems to send unsolicited bulk messages indiscriminately. Widely varying estimates of the cost associated with spam are available in the literature. However, a stochastic and quantitative analysis of the determinant characteristics of spam traffic is still an open problem. This work fills this gap. A 4-year data sample of real-time inbound traffic between May 2005 and July 2009 was collected to investigate and analyze characteristics of spam traffic through JIRANSOFT's Spam Sniper on the network at Korean Bible University. Our major findings of a statistical analysis of spam traffic are that (i) real-time inbound spam traffic is statistically more correlated (self-similar) when compared to normal traffic, and (ii) the degree of self-similarity measured in terms of the Hurst parameter H and obtained from different estimation techniques is very high.
Unsolicited electronic mail, Real time systems, Internet, Estimation, Quality of service, Correlation, future Internet, spam, self-similar process, Hurst parameter, estimation technique, real-time traffic

"Self-Similar Properties of Spam," 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), Seoul, 2011, pp. 347-352.
94 ms
(Ver 3.3 (11022016))