Spam and other electronic abuses have long been a focus
of computer security research. However, recent work in the domain has
emphasized an economic analysis of these operations in the hope of understanding
and disrupting the profit model of attackers. Such studies
do not lend themselves to passive measurement techniques. Instead, researchers
have become middle-men or active participants in spam behaviors;
methodologies that lie at an interest
Spam and other electronic abuses have long been a focus of computer security research. However, recent work in the domain has emphasized an economic analysis of these operations in the hope of understanding and disrupting the profit model of attackers. Such studies do not lend themselves to passive measurement techniques. Instead, researchers have become middle-men or active participants in spam behaviors; methodologies that lie at an interest