Abstract
Online scams, unsolicited advertisements, messages containing malicious files and other forms of spam continue to be a nuisance in today’s internet, wasting users’ time and causing financial damage to companies and organizations. There have been many proposals on how spam should be stopped, from various kinds of spam filters to legislative measures. One of the more extreme suggestions is fighting back by bombarding spammers’ servers with a deluge of HTTP requests. In the current study, we revisit this idea “filters that fight back” originally proposed by Graham in 2003, and investigate why the approach has received little attention recently. We also showcase an example solution that automatically sends false information back to spammers by filling forms on their websites or replying to mail addresses they have provided. We offer a conceptualization and future agenda of filters that fight back, and discuss the ethical and technical challenges related to this solution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alghoul, A., Al Ajrami, S., Al Jarousha, G., Harb, G., Abu-Naser, S.S.: Email classification using artificial neural network (2018)
Almeida, T.A., Silva, T.P., Santos, I., Hidalgo, J.M.G.: Text normalization and semantic indexing to enhance instant messaging and SMS spam filtering. Knowl.-Based Syst. 108, 25–32 (2016)
Bansagi, A., Bes, R., Garama, Z., Gosshalk, L.: The scam filter that fights back. https://repository.tudelft.nl/islandora/object/uuid%3A6099061a-4ca7-469b-b9c0-86d7bc0f52e3 (2016). Accessed 05 Nov 2020
Bapat, R., Mandya, A., Liu, X., Abraham, B., Brown, D.E., Kang, H., Veeraraghavan, M.: Identifying malicious botnet traffic using logistic regression. In: 2018 Systems and Information Engineering Design Symposium (SIEDS), pp. 266–271 (2018)
Bercovitch, M., Renford, M., Hasson, L., Shabtai, A., Rokach, L., Elovici, Y.: Honeygen: an automated honeytokens generator. In: Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, pp. 131–136. IEEE (2011)
Bradbury, D.: Offensive defence. Netw. Secur. 2013(7), 9–12 (2013)
Byrne, D.N.: 419 digilantes and the frontier of radical justice online. Radical Hist. Rev. 2013(117), 70–82 (2013)
Cormack, G.V.: Email Spam Filtering: A Systematic Review. Now Publishers Inc. (2008)
Crawford, M., Khoshgoftaar, T.M., Prusa, J.D., Richter, A.N., Al Najada, H.: Survey of review spam detection using machine learning techniques. J. Big Data 2(1), 23 (2015)
Egele, M., Kolbitsch, C., Platzer, C.: Removing web spam links from search engine results. J. Comput. Virol. 7(1), 51–62 (2011)
Farrell, N.: Cisco says that 90 percent of email is spam. https://www.theinquirer.net/inquirer/news/1050056/cisco-90-percent-email-spam (2008). Accessed 17 Mar 2019
Graham, P.: FFB FAQ. http://www.paulgraham.com/ffbfaq.html (2003). Accessed 13 Sep 2020
Graham, P.: Filters that fight back. http://www.paulgraham.com/ffb.html (2003). Accessed 13 Sep 2020
Hines, M.: Lycos Europe: ‘Make love not spam’. https://www.cnet.com/news/lycos-europe-make-love-not-spam/ (2004). Accessed 16 Sep 2020
Vergelis, N., Demidova, M.T.S.: Spam and phishing in Q3 2018. https://securelist.com/spam-and-phishing-in-q3-2018/88686/ (2018). Accessed 13 Sep 2020
Papalitsas, J., Rauti, S., Tammi, J., Leppänen, V.: A honeypot proxy framework for deceiving attackers with fabricated content. In: Cyber Threat Intelligence, pp. 239–258. Springer (2018)
Papalitsas, J., Tammi, J., Rauti, S., Leppänen, V.: Recognizing dynamic fields in network traffic with a manually assisted solution. In: World Conference on Information Systems and Technologies, pp. 208–217. Springer (2018)
Rauti, S.: Towards cyber attribution by deception. In: International Conference on Hybrid Intelligent Systems, pp. 419–428. Springer (2019)
Rusland, N.F., Wahid, N., Kasim, S., Hafit, H.: Analysis of Naïve Bayes algorithm for email spam filtering across multiple datasets. In: Proceedings of the IOP Conference Series: Materials Science and Engineering (2017)
Siponen, M., Stucke, C.: Effective anti-spam strategies in companies: an international study. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS 2006), vol. 6, pp. 127c–127c. IEEE (2006)
Spitzner, L.: Honeypots: Tracking Hackers. Addison-Wesley Longman Publishing Co. Inc., Boston (2002)
Spitzner, L.: Honeytokens: The other honeypot. http://www.symantec.com/connect/articles/honeytokens-other-honeypot (2003)
Statista: Spam: share of global email traffic 2014–2018. https://www.statista.com/statistics/420391/spam-email-traffic-share/ (2018). Accessed 13 Sep 2020
Zdziarski, J.A.: Ending spam: Bayesian content filtering and the art of statistical language classification. No starch press (2005)
Zingerle, A.: Scambaiters, human flesh search engine, perverted justice, and internet haganah: Villains, avengers, or saviors on the internet? In: ISEA Conference (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Rauti, S., Laato, S. (2021). Filters that Fight Back Revisited: Conceptualization and Future Agenda. In: Rocha, Á., Adeli, H., Dzemyda, G., Moreira, F., Ramalho Correia, A.M. (eds) Trends and Applications in Information Systems and Technologies. WorldCIST 2021. Advances in Intelligent Systems and Computing, vol 1365. Springer, Cham. https://doi.org/10.1007/978-3-030-72657-7_35
Download citation
DOI: https://doi.org/10.1007/978-3-030-72657-7_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-72656-0
Online ISBN: 978-3-030-72657-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)