[{"file_date_updated":"2018-12-18T13:27:01Z","extern":"1","user_id":"61579","department":[{"_id":"277"}],"_id":"5658","status":"public","type":"journal_article","author":[{"first_name":"Guido","last_name":"Schryen","full_name":"Schryen, Guido","id":"72850"}],"volume":2,"date_updated":"2022-01-06T07:02:22Z","oa":"1","citation":{"apa":"Schryen, G. (2007). The Impact that Placing Email Addresses on the Internet has on the Receipt of Spam ? An Empirical Analysis. <i>Computers &#38; Security</i>, <i>2</i>(5), 361–372.","bibtex":"@article{Schryen_2007, title={The Impact that Placing Email Addresses on the Internet has on the Receipt of Spam ? An Empirical Analysis}, volume={2}, number={5}, journal={Computers &#38; Security}, publisher={Elsevier}, author={Schryen, Guido}, year={2007}, pages={361–372} }","short":"G. Schryen, Computers &#38; Security 2 (2007) 361–372.","mla":"Schryen, Guido. “The Impact That Placing Email Addresses on the Internet Has on the Receipt of Spam ? An Empirical Analysis.” <i>Computers &#38; Security</i>, vol. 2, no. 5, Elsevier, 2007, pp. 361–72.","ama":"Schryen G. The Impact that Placing Email Addresses on the Internet has on the Receipt of Spam ? An Empirical Analysis. <i>Computers &#38; Security</i>. 2007;2(5):361-372.","ieee":"G. Schryen, “The Impact that Placing Email Addresses on the Internet has on the Receipt of Spam ? An Empirical Analysis,” <i>Computers &#38; Security</i>, vol. 2, no. 5, pp. 361–372, 2007.","chicago":"Schryen, Guido. “The Impact That Placing Email Addresses on the Internet Has on the Receipt of Spam ? An Empirical Analysis.” <i>Computers &#38; Security</i> 2, no. 5 (2007): 361–72."},"intvolume":"         2","page":"361-372","has_accepted_license":"1","language":[{"iso":"eng"}],"ddc":["000"],"keyword":["Address-obfuscating techniques","email","empirical analysis","honeypot","security by design","security by obscurity","spam"],"file":[{"file_size":3026200,"file_id":"6326","access_level":"open_access","file_name":"The Impact that Placing Email Addresses on the Internet has on the Receipt of Spam - An Empirical Analysis - Journal version.pdf","date_updated":"2018-12-18T13:27:01Z","creator":"hsiemes","date_created":"2018-12-18T13:27:01Z","relation":"main_file","content_type":"application/pdf"}],"abstract":[{"lang":"eng","text":"Email communication is encumbered with a mass of email messages which their recipients have neither requested nor require. Even worse, the impacts of these messages are far from being simply an annoyance, as they also involve economic damage. This manuscript examines the resource ?email addresses?, which is vital for any potential bulk mailer and spammer. Both a methodology and a honeypot conceptualization for implementing an empirical analysis of the usage of email addresses placed on the Internet are proposed here. Their objective is to assess, on a quantitative basis, the extent of the current harassment and its development over time. This ?framework? is intended to be extensible to measuring the effectiveness of address-obscuring techniques. The implementation of a pilot honeypot is described, which led to key findings, some of them being: (1) Web placements attract more than two-thirds (70\\%) of all honeypot spam emails, followed by newsgroup placements (28.6\\%) and newsletter subscriptions (1.4\\%), (2) the proportions of spam relating to the email addresses? top-level domain can be statistically assumed to be uniformly distributed, (3) More than 43\\% of addresses on the web have been abused, whereas about 27\\% was the case for addresses on newsgroups and only about 4\\% was the case for addresses used for a newsletter subscription, (4) Regarding the development of email addresses? attractiveness for spammers over time, the service ?web sites? features a negative linear relationship, whereas the service ?Usenet? hows a negative exponential relationship. (5) Only 1.54\\% of the spam emails showed an interrelation between the topic of the spam email and that of the location where the recipient?s address was placed, so that spammers are assumed to send their emails in a ?context insensitive? manner. The results of the empirical analysis motivate the need for the protection of email addresses through obscuration. We analyze this need by formulating requirements for address obscuring techniques and we reveal to which extent today?s most relevant approaches fulfill these requirements."}],"publication":"Computers & Security","title":"The Impact that Placing Email Addresses on the Internet has on the Receipt of Spam ? An Empirical Analysis","date_created":"2018-11-14T14:53:12Z","publisher":"Elsevier","year":"2007","issue":"5"},{"date_updated":"2022-01-06T07:02:24Z","oa":"1","author":[{"first_name":"Guido","last_name":"Schryen","full_name":"Schryen, Guido","id":"72850"}],"citation":{"ama":"Schryen G. An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses. In: <i>Proceedings of the 6th IEEE Information Assurance Workshop</i>. Westpoint; 2005:37-41.","chicago":"Schryen, Guido. “An E-Mail Honeypot Addressing Spammers’ Behavior in Collecting and Applying Addresses.” In <i>Proceedings of the 6th IEEE Information Assurance Workshop</i>, 37–41. Westpoint, 2005.","ieee":"G. Schryen, “An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses,” in <i>Proceedings of the 6th IEEE Information Assurance Workshop</i>, 2005, pp. 37–41.","apa":"Schryen, G. (2005). An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses. In <i>Proceedings of the 6th IEEE Information Assurance Workshop</i> (pp. 37–41). Westpoint.","bibtex":"@inproceedings{Schryen_2005, title={An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses}, booktitle={Proceedings of the 6th IEEE Information Assurance Workshop}, publisher={Westpoint}, author={Schryen, Guido}, year={2005}, pages={37–41} }","mla":"Schryen, Guido. “An E-Mail Honeypot Addressing Spammers’ Behavior in Collecting and Applying Addresses.” <i>Proceedings of the 6th IEEE Information Assurance Workshop</i>, Westpoint, 2005, pp. 37–41.","short":"G. Schryen, in: Proceedings of the 6th IEEE Information Assurance Workshop, Westpoint, 2005, pp. 37–41."},"page":"37-41","has_accepted_license":"1","extern":"1","file_date_updated":"2018-12-18T13:31:41Z","_id":"5661","user_id":"61579","department":[{"_id":"277"}],"status":"public","type":"conference","title":"An e-mail honeypot addressing spammers' behavior in collecting and applying addresses","publisher":"Westpoint","date_created":"2018-11-14T14:55:48Z","year":"2005","ddc":["000"],"keyword":["Spam","ham","e-mail","honeypot","address obscuring technique","address taxonomy"],"language":[{"iso":"eng"}],"abstract":[{"text":"Spam has become one of the most annoying and costly phenomenon in the Internet. Valid e-mail addresses belong to the most valuable resources of spammers, but little is known about spammers? behavior when collecting and harvesting addresses and spammers? capabilities and interest in carefully directed, consumer-oriented marketing have not been explored yet. Gaining insight into spammers? ways to obtain and (mis)use e-mail addresses is useful in many ways, e.g. for the assessment of the effectiveness of address obscuring techniques and the usability and necessity of hiding e-mail addresses on the Internet. This paper presents a spam honeypot project in progress addressing these issues by systematically placing e-mail addresses in the Internet and analyzing received e-mails. The honeypot?s conceptual framework, its implementation, and first empirical results are presented. Finally, an outlook on further work and activities is provided.","lang":"eng"}],"file":[{"file_size":119362,"file_name":"Schryen - An e-mail honeypot addressing spammers' behavior in collecting and applying addresses.pdf","access_level":"open_access","file_id":"6331","date_updated":"2018-12-18T13:31:41Z","date_created":"2018-12-18T13:31:41Z","creator":"hsiemes","relation":"main_file","content_type":"application/pdf"}],"publication":"Proceedings of the 6th IEEE Information Assurance Workshop"}]
