New Scientist article: Retracing spam steps could halt mass emails
Spammers can forge header information, but only up to the point where their messages reach a legitimate server, so for example a message claiming to be from Citibank will have a path that differs from real Citibank e-mail. A system like this could notice that.
This looks promising to me. They describe it as only one technique to be used in combination with others, such as content filtering, but I think it is a step in the right direction, using information shared among e-mail servers to identify messages with forged headers.A team from IBM and Cornell University developed the anti-spam technique, which they call "SMTP Path Analysis". The algorithm "learns" by examining the string of IP addresses included in both spam and legitimate email headers. When a new message arrives, it is then able to judge, with relative accuracy, whether it is legitimate or, in fact, unwanted spam.
The researchers behind SMTP Path Analysis had to deal with the fact that spammers can forge the address of the mail server used to send a message out. To counter this, they developed another algorithm that judges plausibility of the overall path that a message claims to have taken.
Spammers can forge header information, but only up to the point where their messages reach a legitimate server, so for example a message claiming to be from Citibank will have a path that differs from real Citibank e-mail. A system like this could notice that.