Spam most often takes the form of a sales pitch, selling everything from erectile dysfunction medication to penny stocks. Most of these spam messages include a link to follow to purchase whatever is being sold. And since P.T. Barnum was right, enough people follow the links to keep the spammers in business.
The researchers from UCSD's creatively-titled Collaborative Center for Internet Epidemiology and Defenses, noted that while spam is often sent by bots (define) that go down within a day or so, the receiving site can be up for a week. So rather than play whack-a-mole with the bots, the UCSD group suggested going after the servers where suckers are directed to go.
"The availability of scam infrastructure is critical to spam profitability -- a single takedown of a scam server or a spammer redirect can curtail the earning potential of an entire spam campaign," the report said.
Using a real-time spam feed of about 150,000 e-mails per day the study identified more than 2,000 distinct scams hosted across more than 7,000 distinct servers.
Great idea. But it's already being done, points out Matthew Prince, CEO of Unspam, which is engaged in its own spam stomping projects by chasing after the sources. The largest project is called SURBL, or Spam URI Realtime Blocklists.
SURBL identifies the sites that spammers are sent to, and shares its list with other mail filter sites and also offers plug-ins to e-mail servers so Exchange and other servers can block e-mail based on the SURBL list.
"This is a powerful technology people have been working on for some time. I think this is a very good way of thinking about the spam problem because you want to focus on the narrowest points in the funnel of the spam chain," said Prince. "While there are a lot of servers sending mail out, there are fewer servers actually hosting the pages they are trying to get people to go to."
But this is not a complete solution to the problem, as few solutions in the war against spam are, he added. The more sophisticated spammers are using compromised servers to host pages and send the spam, which makes things more complicated. Pump and dump spam often don't have a link so it's trace the source on those, and other spam puts the link in an image, so there is no URL to follow.
This article was first published on InternetNews.com.