Browse Prior Art Database

Spam Bot Email Evader (SPEE)

IP.com Disclosure Number: IPCOM000020428D
Original Publication Date: 2003-Nov-20
Included in the Prior Art Database: 2003-Nov-20
Document File: 1 page(s) / 37K

Publishing Venue

IBM

Abstract

Spam Bot Email Evader (SPEE)

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 1

Spam Bot Email Evader (SPEE)

Spam-assassin and similar products attempt to block incoming spam. A more proactive approach is to block the scavenging of email address from websites.

A common way for Spamers to acquire email address is to run bots which connect to a web site and traverse all links looking for text in the form of email addresses. This is particularly effective for example with standards organizations which have discussion email subscriptions and they achieve the email threads.

The idea behind Spam Bot Email Evader (SPEE), is to detect such behavior, identify the source location of the bot, and filter out all email addresses from data read by this source location. SPEE is based on placing a honey pot in the web site, detect its' access, and use of the email addresses within.

SPEE inserts a valid unique read-1-time email address into and obscure location of the website. This is the honey pot. It records when this address is read, by whom, and then immediately updates this address to another unique read-1-time address. If the address that was read receives email, then it is probably that the reader passed or sold this information to a spammer. This reader will be added to a list, such that future access will be blocked, or all email addresses will be filter from data read by this reader.

It is important to note that the behavior of the bot traversing all local links on the website is not enough to distinguish it as a spammer bot. Search engine sites routinely have bots with this similar behavior. Sites genera...