Addressing Spam E-Mail Using Hashcast

Addressing Spam E-Mail Using Hashcast

Kevin Curran, John Stephen Honan
Copyright: © 2005 |Volume: 1 |Issue: 2 |Pages: 25
ISSN: 1548-0631|EISSN: 1548-064X|ISSN: 1548-0631|EISBN13: 9781615201761|EISSN: 1548-064X|DOI: 10.4018/jbdcn.2005040103
Cite Article Cite Article

MLA

Curran, Kevin, and John Stephen Honan. "Addressing Spam E-Mail Using Hashcast." IJBDCN vol.1, no.2 2005: pp.41-65. http://doi.org/10.4018/jbdcn.2005040103

APA

Curran, K. & Honan, J. S. (2005). Addressing Spam E-Mail Using Hashcast. International Journal of Business Data Communications and Networking (IJBDCN), 1(2), 41-65. http://doi.org/10.4018/jbdcn.2005040103

Chicago

Curran, Kevin, and John Stephen Honan. "Addressing Spam E-Mail Using Hashcast," International Journal of Business Data Communications and Networking (IJBDCN) 1, no.2: 41-65. http://doi.org/10.4018/jbdcn.2005040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This paper investigates the problem of e-mail spam and identifies methods to efficiently minimize the volumes. It is argued that the usefulness of e-mail and its potential for future growth are jeopardized by the rising tide of unwanted e-mail, both SPAM and viruses. This threatens to wipe out the advantages and benefits of e-mail. An important flaw in current e-mail standards (most notably SMTP) is the lack of any technical requirement that ensures the reliable identification of the sender of messages. A message’s domain of origin can easily be faked, or “spoofed”. We focus on the Hashcash proof-of-work approach and investigate the feasibility of implementing a Hashcash-based solution. We conclude that a hybrid antispam system in conjunction with a legal and policy framework is best. However, this needs to be agreed on and implemented by the main industry players and technical bodies to be successful.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.