{"title":"An e-mail honeypot addressing spammers' behavior in collecting and applying addresses","language":[{"iso":"eng"}],"extern":"1","date_updated":"2022-01-06T07:02:24Z","has_accepted_license":"1","user_id":"61579","citation":{"bibtex":"@inproceedings{Schryen_2005, title={An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses}, booktitle={Proceedings of the 6th IEEE Information Assurance Workshop}, publisher={Westpoint}, author={Schryen, Guido}, year={2005}, pages={37–41} }","chicago":"Schryen, Guido. “An E-Mail Honeypot Addressing Spammers’ Behavior in Collecting and Applying Addresses.” In Proceedings of the 6th IEEE Information Assurance Workshop, 37–41. Westpoint, 2005.","ama":"Schryen G. An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses. In: Proceedings of the 6th IEEE Information Assurance Workshop. Westpoint; 2005:37-41.","short":"G. Schryen, in: Proceedings of the 6th IEEE Information Assurance Workshop, Westpoint, 2005, pp. 37–41.","ieee":"G. Schryen, “An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses,” in Proceedings of the 6th IEEE Information Assurance Workshop, 2005, pp. 37–41.","apa":"Schryen, G. (2005). An e-mail honeypot addressing spammers’ behavior in collecting and applying addresses. In Proceedings of the 6th IEEE Information Assurance Workshop (pp. 37–41). Westpoint.","mla":"Schryen, Guido. “An E-Mail Honeypot Addressing Spammers’ Behavior in Collecting and Applying Addresses.” Proceedings of the 6th IEEE Information Assurance Workshop, Westpoint, 2005, pp. 37–41."},"publisher":"Westpoint","department":[{"_id":"277"}],"date_created":"2018-11-14T14:55:48Z","publication":"Proceedings of the 6th IEEE Information Assurance Workshop","file_date_updated":"2018-12-18T13:31:41Z","page":"37-41","type":"conference","year":"2005","_id":"5661","status":"public","author":[{"last_name":"Schryen","full_name":"Schryen, Guido","id":"72850","first_name":"Guido"}],"abstract":[{"lang":"eng","text":"Spam has become one of the most annoying and costly phenomenon in the Internet. Valid e-mail addresses belong to the most valuable resources of spammers, but little is known about spammers? behavior when collecting and harvesting addresses and spammers? capabilities and interest in carefully directed, consumer-oriented marketing have not been explored yet. Gaining insight into spammers? ways to obtain and (mis)use e-mail addresses is useful in many ways, e.g. for the assessment of the effectiveness of address obscuring techniques and the usability and necessity of hiding e-mail addresses on the Internet. This paper presents a spam honeypot project in progress addressing these issues by systematically placing e-mail addresses in the Internet and analyzing received e-mails. The honeypot?s conceptual framework, its implementation, and first empirical results are presented. Finally, an outlook on further work and activities is provided."}],"ddc":["000"],"oa":"1","keyword":["Spam","ham","e-mail","honeypot","address obscuring technique","address taxonomy"],"file":[{"access_level":"open_access","file_id":"6331","date_created":"2018-12-18T13:31:41Z","relation":"main_file","content_type":"application/pdf","creator":"hsiemes","file_name":"Schryen - An e-mail honeypot addressing spammers' behavior in collecting and applying addresses.pdf","file_size":119362,"date_updated":"2018-12-18T13:31:41Z"}]}