“…For example, a "bomber" sent over 24,000 messages to a university computer in one day [5] and the other hacker sent approximately 25,000 messages to a military unit within 8 h [2]. Preventing e-mail bombs are difficult [2,3], because there are many email bomb techniques employed by hackers, such as direct email spam, indirect e-mail spam, rejected e-mail spam, chain relay e-mail spam, mailing list spam [2], chain bombs, error message bombs, covert distribution channels, exploiting mail exploders and list servers, and automated attack tools [3].…”