Internet Technologies in Depth The Technique of Spam Recognition Based On Header Investigating
Internet Technologies in Depth The Technique of Spam Recognition Based On Header Investigating
The Technique of
Spam Recognition Based on Header Investigating
Dr. Abzetdin Adamov
Chief Information Officer / Head of Computer Engineering Department,
Qafqaz University, Baku, Azerbaijan
[email protected]
Abstract – E-mail is most effective business and personal At the same time, because of Internet message concept and
communication tool. The popularity, openness and wide availability architecture, the most important features of which are simplicity,
of this Internet service makes it attractive for advertising of openness, compatibility, standardization, this service is
products and services by sending unsolicited e-mails (Spam). The vulnerable for security threats. The most prevalent of them is
goal of paper is to offer a comprehensive and usable technique to
spam or unsolicited e-mails. The spam continue to evolve
recognize spam that helps to detect and protect users from junk
email, fraudulent e-mail threats and viruses. While widespread becoming more complex and making harder to stop it. Today,
methods are complex and expensive, proposed technique is based on spam is not just unwanted e-mail, it’s also security problems,
header investigating without additional tools and hard processing. viruses, phishing, and other malware. Fortunately, recent years
computer professionals and business have intensified the fight
Keywords - Internet technologies, e-mail architecture, spam, spam against spam and spammers. And yet it is still a serious problem
recognition, which costs businesses tens of billions and continues to rise from
year to year [2]. There are several popular methods for spam
I. INTERNET MESSAGE AS COMMUNICATION TOOL AND SPAM detection and prevention like email filtering based on the content
of the email, DNS-based blackhole lists (DNSBL), greylisting,
The asynchronous nature of e-mail provides convenience and spamtraps, etc. [3]. However, most of them require advanced
more effective use of time for communication participants. In knowledge, special software, or a lot processing time. In contrast
contrast to immediate communication means like telephone, to them, technique proposed in this paper does not require any
email is deferred type of communication. So, instead of software or special experience. This technique makes it possible
immediate reaction, recipients now have the comfort to read, to examine e-mail using any e-mail client software, or even with
interpret and react on received information later, or do nothing if webmail (gmail, yahoo mail). Since this technique is based on
no action is required [1]. email header investigating, it’s necessary to observe e-mail
Because of mentioned and other advantages of email architecture, format and meaning of e-mail headers.
communication, the popularity of email as the communication
means for business and personal use has risen steadily over the II. EMAIL GENERAL STRUCTURE
last decade. The following Figure 1. shows rising popularity of
the email communication over the last years and some prediction As other Internet services the email system based on Internet
for future. standards and some dedicated protocols. There are a lot of
different email protocols implemented by different email servers,
however, some of them are common for all email servers and
email clients:
1. Basic email format standard [7] (RFC 5322)
2. Multipurpose Internet Mail Extensions (MIME) standard
3. Simple Message Transfer Protocol (SMTP)
4. Post Office Protocol (POP3) or Internet Message Access
Protocol (IMAP)