Nothing Special   »   [go: up one dir, main page]

Skip to main content

Filters that Fight Back Revisited: Conceptualization and Future Agenda

  • Conference paper
  • First Online:
Trends and Applications in Information Systems and Technologies (WorldCIST 2021)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1365))

Included in the following conference series:

  • 1559 Accesses

Abstract

Online scams, unsolicited advertisements, messages containing malicious files and other forms of spam continue to be a nuisance in today’s internet, wasting users’ time and causing financial damage to companies and organizations. There have been many proposals on how spam should be stopped, from various kinds of spam filters to legislative measures. One of the more extreme suggestions is fighting back by bombarding spammers’ servers with a deluge of HTTP requests. In the current study, we revisit this idea “filters that fight back” originally proposed by Graham in 2003, and investigate why the approach has received little attention recently. We also showcase an example solution that automatically sends false information back to spammers by filling forms on their websites or replying to mail addresses they have provided. We offer a conceptualization and future agenda of filters that fight back, and discuss the ethical and technical challenges related to this solution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Alghoul, A., Al Ajrami, S., Al Jarousha, G., Harb, G., Abu-Naser, S.S.: Email classification using artificial neural network (2018)

    Google Scholar 

  2. Almeida, T.A., Silva, T.P., Santos, I., Hidalgo, J.M.G.: Text normalization and semantic indexing to enhance instant messaging and SMS spam filtering. Knowl.-Based Syst. 108, 25–32 (2016)

    Article  Google Scholar 

  3. Bansagi, A., Bes, R., Garama, Z., Gosshalk, L.: The scam filter that fights back. https://repository.tudelft.nl/islandora/object/uuid%3A6099061a-4ca7-469b-b9c0-86d7bc0f52e3 (2016). Accessed 05 Nov 2020

  4. Bapat, R., Mandya, A., Liu, X., Abraham, B., Brown, D.E., Kang, H., Veeraraghavan, M.: Identifying malicious botnet traffic using logistic regression. In: 2018 Systems and Information Engineering Design Symposium (SIEDS), pp. 266–271 (2018)

    Google Scholar 

  5. Bercovitch, M., Renford, M., Hasson, L., Shabtai, A., Rokach, L., Elovici, Y.: Honeygen: an automated honeytokens generator. In: Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, pp. 131–136. IEEE (2011)

    Google Scholar 

  6. Bradbury, D.: Offensive defence. Netw. Secur. 2013(7), 9–12 (2013)

    Article  Google Scholar 

  7. Byrne, D.N.: 419 digilantes and the frontier of radical justice online. Radical Hist. Rev. 2013(117), 70–82 (2013)

    Article  Google Scholar 

  8. Cormack, G.V.: Email Spam Filtering: A Systematic Review. Now Publishers Inc. (2008)

    Google Scholar 

  9. Crawford, M., Khoshgoftaar, T.M., Prusa, J.D., Richter, A.N., Al Najada, H.: Survey of review spam detection using machine learning techniques. J. Big Data 2(1), 23 (2015)

    Article  Google Scholar 

  10. Egele, M., Kolbitsch, C., Platzer, C.: Removing web spam links from search engine results. J. Comput. Virol. 7(1), 51–62 (2011)

    Article  Google Scholar 

  11. Farrell, N.: Cisco says that 90 percent of email is spam. https://www.theinquirer.net/inquirer/news/1050056/cisco-90-percent-email-spam (2008). Accessed 17 Mar 2019

  12. Graham, P.: FFB FAQ. http://www.paulgraham.com/ffbfaq.html (2003). Accessed 13 Sep 2020

  13. Graham, P.: Filters that fight back. http://www.paulgraham.com/ffb.html (2003). Accessed 13 Sep 2020

  14. Hines, M.: Lycos Europe: ‘Make love not spam’. https://www.cnet.com/news/lycos-europe-make-love-not-spam/ (2004). Accessed 16 Sep 2020

  15. Vergelis, N., Demidova, M.T.S.: Spam and phishing in Q3 2018. https://securelist.com/spam-and-phishing-in-q3-2018/88686/ (2018). Accessed 13 Sep 2020

  16. Papalitsas, J., Rauti, S., Tammi, J., Leppänen, V.: A honeypot proxy framework for deceiving attackers with fabricated content. In: Cyber Threat Intelligence, pp. 239–258. Springer (2018)

    Google Scholar 

  17. Papalitsas, J., Tammi, J., Rauti, S., Leppänen, V.: Recognizing dynamic fields in network traffic with a manually assisted solution. In: World Conference on Information Systems and Technologies, pp. 208–217. Springer (2018)

    Google Scholar 

  18. Rauti, S.: Towards cyber attribution by deception. In: International Conference on Hybrid Intelligent Systems, pp. 419–428. Springer (2019)

    Google Scholar 

  19. Rusland, N.F., Wahid, N., Kasim, S., Hafit, H.: Analysis of Naïve Bayes algorithm for email spam filtering across multiple datasets. In: Proceedings of the IOP Conference Series: Materials Science and Engineering (2017)

    Google Scholar 

  20. Siponen, M., Stucke, C.: Effective anti-spam strategies in companies: an international study. In: Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS 2006), vol. 6, pp. 127c–127c. IEEE (2006)

    Google Scholar 

  21. Spitzner, L.: Honeypots: Tracking Hackers. Addison-Wesley Longman Publishing Co. Inc., Boston (2002)

    Google Scholar 

  22. Spitzner, L.: Honeytokens: The other honeypot. http://www.symantec.com/connect/articles/honeytokens-other-honeypot (2003)

  23. Statista: Spam: share of global email traffic 2014–2018. https://www.statista.com/statistics/420391/spam-email-traffic-share/ (2018). Accessed 13 Sep 2020

  24. Zdziarski, J.A.: Ending spam: Bayesian content filtering and the art of statistical language classification. No starch press (2005)

    Google Scholar 

  25. Zingerle, A.: Scambaiters, human flesh search engine, perverted justice, and internet haganah: Villains, avengers, or saviors on the internet? In: ISEA Conference (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sampsa Rauti .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rauti, S., Laato, S. (2021). Filters that Fight Back Revisited: Conceptualization and Future Agenda. In: Rocha, Á., Adeli, H., Dzemyda, G., Moreira, F., Ramalho Correia, A.M. (eds) Trends and Applications in Information Systems and Technologies. WorldCIST 2021. Advances in Intelligent Systems and Computing, vol 1365. Springer, Cham. https://doi.org/10.1007/978-3-030-72657-7_35

Download citation

Publish with us

Policies and ethics