60 4 Anti-spam measures
[148] and Spammer-X [166] provide more updated outlines, Schryen [149] and
[18] likewise in the German language.
Before presenting and discussing anti-spam measures, a classification of
these may be helpful. The following taxonomies seem to be appropriate:
Measures are applied at different stages of the e-mail delivery process.
They can come into operation on the e-mail client, on the MTAs of the
sender’s ESP, on e-mail nodes outside the sender’s and recipient’s ESP, on
the MTAs of the recipient’s ESP recipient, or on the recipient’s client [18,
p. 85]. The first two locations enable measures to be preventive. Because
the spam e-mails have not been sent through the Internet, the latter are
denoted as reactive measures. It is desirable to stop spam e-mails as early
as possible so as not to waste resources like bandwidth, storage and recip-
ients’ time. Therefore, preventive measures should be treated privileged.
However, blocking and filter mechanisms (see Subsects. 4.4.1 and 4.4.2),
which are still the most common technological anti-spam measures, are
applied on the recipient’s side.
Spam e-mails can take different delivery routes. For example, sometimes
spammers set up their own MTAs and send spam e-mails to the recipi-
ents’ ESPs directly. Another option is to exploit the infrastructure of ESPs
by sending e-mails via their MTAs. While some anti-spam measures, like
filters, can be applied independently of the delivery route, others, like
blocking outgoing TCP port 25 by ISPs (see Subsect. 4.4.3), are only ap-
plicable when spammers use “adequate” routes. The model driven analysis
of measures’ effectiveness presented in Chap. 5 acts on this classification
by focusing on non-route-specific anti-spam measures.
Anti-spam measures can be functionally classified (see Fig. 4.3).
From a practice-oriented point of view, anti-spam measures may be divided
into short-, medium-, and long-term ones, according to the time and effort
their respective deployment takes. For example, filter and blocking mech-
anisms count as short-term measures as, usually, implementation can be
restricted to an organization’s local e-mail infrastructure with insignificant
modifications. Some DNS-based measures (see Paragraph 4.4.4), which af-
fect the structure and content of DNS entries, may take some months or
even years to come into operation. Public Key Infrastructure (PKI)-based
measures (see Paragraph 4.4.4) and resource-based measures (see Subsect.
4.4.6) may take even longer due to considerable modification and extension
respectively of the infrastructure. However, this classification is a bit arbi-
trary and fuzzy because it lacks (objective) criteria for deciding whether
a measure is implementable in the short-, medium-, or long-term.
Figure 4.3 shows the first three taxonomies of technological anti-spam
measures; because of the disposal of the time-related classification, this par-
ticular one is omitted. The (structure of this) chapter follows the functional
classification.