Sensor nodes (or addresses therefore), acting as real-time message decoys,
are distributed across a real-time communications network to attract
unsolicited real-time messages. Filtering rules are derived from the
message characteristics (such as the source address) and messaging
content of the traffic encountered at the sensor nodes. The filtering
rules are distributed to filtering agents positioned in the
communications network in such a way that they can filter traffic for
legitimate users. The filtering agents may identify and control the
disposition of real-time messaging traffic that is part of a mass
communication campaign on behalf of legitimate users of the real-time
messaging communication system. Disposition may include suppressing,
diverting, or labeling.