Abstract
This paper presents a basic design and principles to protect enterprise networks from spam mail after considering a taxonomy of spam mail based on their delivery schemes as well as their message envelope formats. The analysis of MTA mail logs of a mail gateway at a sample enterprise network provides a correlation between senders’ mail addresses and their IP addresses. Thus, a mail filter for gateways of these networks is proposed to prevent them from receiving spam mail from the Internet. Finally, the effectiveness of this filter is demonstrated based on the results of mail log analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Costales, B., Allman, E.: sendmail. Second Edition. O’Reilly and Associates, Cambridge Köln Paris Sebastopol Tokyo (1997)
J. Myers, J., Rose, M.: Post Office Protocol-Version 3. RFC1939 (1996)
Crispin, M.: Internet Message Access Protocol-Version 4rev1. RFC2060 (1996)
Schwartz, A., Garfinkel, S.: Stopping Spam. O’Reilly and Associates, Cambridge Köln Paris Sebastopol Tokyo (1998)
Lindberg, G.: Anti-Spam Recommendations for SMTP MTAs. RFC 2505 (1999)
Postel, J.: Simple Mail Transfer Protocol. RFC0821 (1982)
Myers, J.: SMTP Service Extension for Authentication. RFC2554 (1999)
MAPS: Basic Mailing List Management Guidelines For Preventing Abuse. http://www.mail-abuse.org/manage.html (2001)
MAPS Transport Security Initiative Team: MAPS Transport Security Initiative. http://www.mail-abuse.org/tsi/ (2001)
Hoffman, P.: Allowing Relaying in SMTP: A Series of Surveys. Internet Mail Consortium Report IMCR-015, http://www.imc.org/ube-relay.html (2001)
Gellens, R., Klensin, J.: Message Submission. RFC 2476 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Asami, T., Kikuchi, T., Rikitake, K., Nagata, H., Hamai, T., Hatori, Y. (2002). A Taxonomy of Spam and a Protection Method for Enterprise Networks. In: Chong, I. (eds) Information Networking: Wireless Communications Technologies and Network Applications. ICOIN 2002. Lecture Notes in Computer Science, vol 2344. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45801-8_43
Download citation
DOI: https://doi.org/10.1007/3-540-45801-8_43
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44255-4
Online ISBN: 978-3-540-45801-2
eBook Packages: Springer Book Archive