Download Now Free registration required
Spam messages muddle up users inbox, consume network resources, and build up DDoS attacks, spread malware. The goal is to present a definite figure about the characteristics of spam and spam vulnerable email accounts. These evaluations help one to enhance the existing technology to combat spam effectively. The authors collected 400 thousand spam mails from a spam trap set up in a corporate mail server for a period of 14 months form January 2006 to February 2007. Spammers use common techniques to spam end users regardless of corporate server and public mail server.
- Format: PDF
- Size: 333.96 KB