By Topic

Observation and Analysis on Spam Sending Behavior

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Chun-Chao Yeh ; Dept. of Comput. Sci., Nat. Taiwan Ocean Univ., Keelung, Taiwan ; Tsung-Yu Wang ; Hsiang-Yuan Fu

Due to Internet, people prefer using emails instead of traditional post mails, because of its simple and easy to use. Meanwhile unsolicited emails (spam) become a serious problem, as sending bulk emails are almost cost free in terms of time and money. Spam not only reduces system performance of mail servers but also annoys mail receivers. Nowadays attacks from Internet usually have strong links with embedding malicious codes/links in spam mails. In this research study, we collected a large number of spam to observe and analyze spam sending behavior. For each spam, we gathered source IPs, the URLs in the spam, and web pages of the URL. Basing on the collected spam, we studied the spam sending behavior.

Published in:

Communications and Mobile Computing (CMC), 2011 Third International Conference on

Date of Conference:

18-20 April 2011