Spam or unsolicited emails constitute a major threat to the Internet, the corporations, and the end-users. Statistics show that about 70% - 80% of the emails are spam. There are several techniques that have been implemented to react to the spam on its arrival. These techniques consist in filtering the emails and placing them in the Junk or Spam folders of the users. Regardless of the accuracy of these techniques, they are all passive. In other words, they are like someone is hitting you and you are trying by all the means to protect yourself from these hits without fighting your opponent. As we know the proverbs \"The best defense is a good offense\" or \"Attack is the best form of defense\". Thus, we believe that attacking the spammers is the best way to minimize their impact. Spammers send millions of emails to the users for several reasons and usually they include some links or images that direct the user to some web pages or simply to track the users. The proposed idea of attacking the spammers is by building some software to collect these links from the Spam and Junk folders of the users. Then, the software periodically and actively visit these links and the subsequent redirect links as if a user clicks on these links or as if the user open the email containing the tracking link. If this software is used by millions of users (included in the major email providers), then this will act as a storm of Distributed Denial of Service attack on the spammers servers and there bandwidth will be completely consumed by this act. In this case, no human can visit their sites because they will be unavailable. In this paper, we describe this approach and show its effectiveness. In addition, we present an application we have developed that can be used for this reason.
L. Androutsopoulos, G. Paliouras, V. Karkaletsis, G. Sakkis, C. D. Spyropoulos and P. Stamatopoulos, “Learning to Filter Spam E-Mail: A Comparison of a Naive Bayesian and a Memory-Based Approach,” Proceedings of the Workshop on Machine Learning and Textual Information Access, 2000, pp. 1-13.
D. Karthika-Renuka, et al., “Spam Classification Based on Supervised Learning Using Machine Learning Techniques,” International Conference on Process Automation, Control and Computing, Coimbatore, 20-22 July 2011, pp. 1-7. doi:10.1109/PACC.2011.5979035
S. Suwa, et al., “DNS Resource Record Analysis of URLs in E-Mail Messages for Improving Spam Filtering,” IEEE/IPSJ 11th International Symposium on Applications and the Internet (SAINT), Munich, 18-21 July 2011, pp. 439-444.
A. Khanal, et al., “Improving the Efficiency of Spam Filtering through Cache Architecture,” 15th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, Istanbul, 24-26 October 2007, pp. 303-309.
I. M. Rafiqul, et al., “Dynamic Feature Selection for Spam Filtering Using Support Vector Machine,” 6th IEEE/ACIS International Conference on Computer and Information Science, Melbourne, 11-13 July 2007, pp. 757-762.
A. Taweesiriwate, et al., “Web Spam Detection Using Link-Based Ant Colony Optimization,” IEEE 26th International Conference on Advanced Information Networking and Applications (AINA), Fukuoka, 26-29 March 2012, pp. 868-873.
S. Mohamed, et al., “A New Technique for Automatic Text Categorization for Arabic Documents,” Proceeding of 5th International Conference on Internet and Information Technology in Modern Organizations, Cario, 13-15 December 2005.
J.-H. Hsia, et al., “Language-Model-Based Detection Cascade for Efficient Classification of Image-Based Spam E-Mail,” IEEE International Conference on Multimedia and Expo, New York, 28 June-3 July 2009, pp. 1182-1185.
H. B. Aradhye, G. K. Myers and J. A. Herson, “Image Analysis for Categorization of Image-Based Spam E-Mail,” Proceeding of the 8th International Conference on Document Analysis and Recognition, Korea, 29 August-1 September 2005, pp. 914-918.
K. Saraubon, et al., “Fast Effective Botnet Spam Detection,” Fourth International Conference on Computer Sciences and Convergence Information Technology, Seoul, 24-26 November 2009, pp. 1066-1070.