Unformatted text preview:

SPAMSlide 2Slide 3Slide 4Slide 5Cost of SpamSlide 7Slide 8Slide 9Slide 10Slide 11Slide 12Slide 13Slide 14Slide 15Slide 16General costs of spamSlide 18Slide 19How bulk emailers operateGathering of addressesSlide 22Slide 23Slide 24DeliverySlide 26Using other people's computersOpen relaysOpen proxiesSpammer virusesObfuscating message contentHiding SPAMFiltersAnti-spam techniquesSlide 35Slide 36Slide 37Slide 38SummarySPAMhttp://video.google.com/videoplay?docid=5627694446211716271SPAMGeneralhttp://en.wikipedia.org/wiki/Spam_%28electronic%29SPAMSpammingAbuse of electronic messaging systems to indiscriminately send unsolicited bulk messagesMost common form of spam is e-mail spamTerm is applied to similar abuses in other media:instant messaging spamUsenet newsgroup spamWeb search engine spamspam in blogswiki spammobile phone messaging spamInternet forum spamjunk fax transmissionsSPAMSpamming is economically viable because:“Advertisers” have very little operating costs beyond the management of their mailing listsDifficult to hold senders accountable for their mass mailingsSince the barrier to entry is so lowSpammers are numerousVolume of unsolicited mail has become very highThe costs are borne by the public and by ISPsLost productivity and fraudNeeded to add extra capacity to cope with the delugeSpamming is widely reviledSubject of legislation in many jurisdictionsSPAMThe people that create electronic spam are called spammersCost of SpamCost of SpamThe European Union's Internal Market Commission estimated in 2001 that "junk e-mail" cost Internet users €10 billion per year worldwideThe California legislature found that spam cost United States organizations alone more than $13 billion in 2007IncludesLost productivityAdditional equipment, software, and manpower needed to combat the problemCost of SpamSpam's direct effects include:the consumption of computer and network resourcesthe cost in human time and attention of dismissing unwanted messagesSpam has costs stemming fromthe kinds of spam messages sentthe ways spammers send themthe arms race between spammers and those who try to stop or control spamCost of SpamIndirect costs borne by the victimsThose related to the spamming itselfOther crimes that usually accompany itFinancial theftIdentity theftData and intellectual property theftVirus and other malware infectionChild pornographyFraudDeceptive marketingCost of SpamThe cost to providers of search engines is not insignificant:"The secondary consequence of spamming is that search engine indexes are inundated with useless pages, increasing the cost of each processed query."[1]Cost of SpamThe methods of spammers are likewise costly: Spamming contravenes the vast majority of ISPs' acceptable-use policiesMost spammers go to some trouble to conceal the origins of their spamE-mail, Usenet, and instant-message spam are often sent through insecure proxy servers belonging to unwilling (and unknowing) third partiesSpammers frequently use false names, addresses, phone numbers, and other contact information to set up "disposable" accounts at various Internet service providersIn some cases, they have used falsified or stolen credit card numbers to pay for these accounts. Allows them to quickly move from one account to the next as each one is discovered and shut down by the host ISPsCost of SpamCosts of spam also includeThe collateral costs of the struggle between spammers and the administratorsUsers of the media threatened by spammingMany users are bothered by spam:Increased time reading their e-mailFind the content of spam frequently offensivePornography is one of the most frequently advertised productsSpammers send their spam largely indiscriminatelyObjectionable material may arrive in inappropriate areasA work place e-mail inboxAn underage individualCost of SpamSome spammers argue that most of these costs could potentially be alleviated by having spammers reimburse ISPs and individuals for their materialTwo problems with this logic: Rate of reimbursement they could credibly budget is not nearly high enough to pay the direct costsHuman cost is basically unrecoverableLost mailLost timeLost opportunitiesCost of SpamE-mail spam exemplifies a tragedy of the commons: Spammers use resources without bearing the entire cost of those resourcesBoth physical and humanSpammers commonly do not bear the cost at allRaises the costs for everyoneCost of SpamEconomics:E-mail is so cheap to sendTiny number of spammers can saturate the Internet with junk mailOnly a tiny percentage of their targets may be motivated to purchase their products (or fall victim to their scams)Low cost provides a sufficient conversion rate to keep the spamming aliveEven though spam appears not to be economically viable as a way for a reputable company to do businessSuffices for professional spammers to convince a tiny proportion of gullible advertisers that it is viable for those spammers to stay in businessNew spammers go into business every dayLow costs allow a single spammer to do a lot of harm before finally realizing that the business is not profitableCost of SpamSecretive nature of spamming operations makes it difficult to determine how proliferated an individual spammer can beSpammer hard to track, block or avoidSpammers may target different networks to different extentsDepending on how successful they are at attacking the targetConsiderable resources are employed to actually measure the amount of spam generated by a single person or groupVictims that use common antispam hardware, software or services provide opportunities for such trackingGeneral costs of spamGeneral costs of spam“Spam happens" due to a positive Cost-benefit analysis resultCost is the combination ofOverhead: The costs and overhead of electronic spamming include bandwidth, developing or acquiring an email/wiki/blog spam tool, taking over or acquiring a host/zombie, etc. Transaction cost: The incremental cost of contacting each additional recipient once a method of spamming is constructed, multiplied by the number of recipients. Risks: Chance and severity of legal and/or public reactions, including damages and punitive damages Damage: Impact on the community and/or


View Full Document

UNCC ITIS 3100 - SPAM

Download SPAM
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view SPAM and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view SPAM 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?