Filters








282 Hits in 3.9 sec

Weeding spammers at the root: A precise approach to spam reduction

Tu Ouyang, Michael Rabinovich
2008 IEEE INFOCOM 2008 - IEEE Conference on Computer Communications Workshops  
SpamWeeder can further generate warnings to users against submitting their email addresses to parties likely to engage in address trafficking.  ...  We propose SpamWeeder, a simple idea for spam prevention, which targets the root of the spam problem -the email address trafficking.  ...  Acknowledgements We would like to thank Mark Allman of ICSI and Shubho Sen of AT&T Labs for discussions of the ideas discussed in this paper.  ... 
doi:10.1109/infocom.2008.4544636 fatcat:a6pm2hlfiraelmm33gdtvod4my

Workload Characterization Of Spam Email Filtering Systems

Yan Luo
2010 Zenodo  
Email systems have suffered from degraded quality of service due to rampant spam, phishing and fraudulent emails.  ...  We are motivated to address this issue from the perspective of computer architecture support.  ...  Common Steps in Fighting Spam There is a growing set of software tools, hardware appliances and statistical filtering algorithms for fighting spam [1] , [2] , [24] , [3] , [32] , [28] .  ... 
doi:10.5281/zenodo.1252128 fatcat:dcliptrq6vfwjfbugxrb6a5mzu

Fighting E-Mail Abuses: The EMPE Approach [chapter]

Massimiliano Pala, Antonio Lioy
2006 Lecture Notes in Computer Science  
In this paper we present the E-Mail Policy Enforcer system (EMPE) which provides a method to cryptographically bind the identity of the original sender of an e-mail to the message body by combining digital  ...  Electronic mail is one of the most used and abused service in today communication. While many efforts have been made to fight e-mail abuses, no effective solution has yet been developed.  ...  For every word in these emails, it calculates a spam probability based on the proportion of spam occurrences.  ... 
doi:10.1007/11774716_11 fatcat:c2qrkpmazvhlnfupc4utatgbte

A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam

Jimmy McGibney, Dmitri Botvich
2007 The Second International Conference on Availability, Reliability and Security (ARES'07)  
This is motivated by the fact that the SMTP mail infrastructure is managed in a distributed way by a community of mail domain administrators.  ...  Initial simulations indicate the potential of this approach to improve rates of false positives and false negatives in anti-spam systems.  ...  Acknowledgement The authors' work is supported, respectively, by the European Commission FP6 project OPAALS and by Science Foundation Ireland (Foundations of Autonomics project).  ... 
doi:10.1109/ares.2007.28 dblp:conf/IEEEares/McGibneyB07 fatcat:pwaevfpiazekphh7kdfblznjbe

Adding digital forensic readiness to electronic communication using a security monitoring tool

F. R. Van Staden, H. S. Venter
2011 2011 Information Security for South Africa  
Tracing the origin of spam by using the information contained in SMTP headers is not possible because SMTP is a clear text protocol and can easily be intercepted and modified.  ...  Unsolicited electronic communication, also known as spam, is just one such example of abuse of email.  ...  Any opinion, findings and conclusions or recommendations expressed in this material are those of the author(s) and therefore the NRF does not accept any liability in regard thereto.  ... 
doi:10.1109/issa.2011.6027537 fatcat:s37tdxh3jfapxco37g5o4cu5fa

A Trust Based System for Enhanced Spam Filtering

Jimmy McGibney, Dmitri Botvich
2008 Journal of Software  
Trust by one mail server in another is influenced by direct experience as well as recommendations issued by collaborating mail servers.  ...  The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to filtering techniques and the lack of incentive for mail servers to filter outgoing spam.  ...  ACKNOWLEDGMENT This work was supported by the European Commission (OPAALS FP6 project) and by Science Foundation Ireland (Foundations of Autonomics project).  ... 
doi:10.4304/jsw.3.5.55-64 fatcat:imryywaj5bgttc4obmh6pptei4

Tightening the net: A review of current and next generation spam filtering tools

James Carpinter, Ray Hunt
2006 Computers & security  
This paper provides an overview of current and potential future spam filtering approaches. We examine the problems spam introduces, what spam is and how we can measure it.  ...  While a range of different techniques have and continue to be evaluated in academic research, heuristic and Bayesian filtering dominate commercial filtering systems; therefore, a case study of these techniques  ...  Many proposals to change the way in which we send email have been put forward, including the required authentication of all senders, a per email charge and a method of encapsulating policy within the email  ... 
doi:10.1016/j.cose.2006.06.001 fatcat:mk2faxflofbona6yi4a27h3pj4

An effective defense against email spam laundering

Mengjun Xie, Heng Yin, Haining Wang
2006 Proceedings of the 13th ACM conference on Computer and communications security - CCS '06  
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry.  ...  In this paper, we reveal one salient characteristic of proxy-based spamming activities, namely packet symmetry, by analyzing protocol semantics and timing causality.  ...  To counter the soaring growth of spam volume, many ISPs have adopted the policy of blocking port 25 (SMTP port), in which outbound email from a subscriber must be relayed by the ISP-designated email server  ... 
doi:10.1145/1180405.1180428 dblp:conf/ccs/XieYW06 fatcat:3yy7fnwy5jabfe5mbvur3nabm4

The Federal Trade Commission and the Future Development of U.S. Consumer Protection Policy

Timothy J. Muris
2004 Social Science Research Network  
FTC's tips for consumers to avoid unwanted spam include: (1) try not to display your email address in public; (2) check the privacy policy before you give a website your email address; (3) use a unique  ...  fight against spam.  ... 
doi:10.2139/ssrn.545182 fatcat:ucfqwwpw3nazpeveaketnt3tpm

Security by Any Other Name

Ian D. Foster, Jon Larson, Max Masich, Alex C. Snoeren, Stefan Savage, Kirill Levchenko
2015 Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15  
In this work we evaluate the security provided by these protocols, both in theory and in practice.  ...  Using a combination of measurement techniques, we determine whether major providers supports TLS at each point in their email message path, and whether they support SPF and DKIM on incoming and outgoing  ...  This work was supported in part by the National Science Foundation grant CNS-1237264 and by generous research, operational and/or in-kind support from the UCSD Center for Networked Systems (CNS).  ... 
doi:10.1145/2810103.2813607 dblp:conf/ccs/FosterLMSSL15 fatcat:be2dsmcinbdwnidcrlh4rtv5tm

IPclip: An architecture to restore Trust-by-Wire in packet-switched networks

Harald Widiger, Stephan Kubisch, Peter Danielis, Jens Schulz, Dirk Timmermann, Thomas Bahls, Daniel Duchow
2008 2008 33rd IEEE Conference on Local Computer Networks (LCN)  
Regaining Trust-by-Wire, comparable to classic fixed line telephones, could mitigate or even solve problems like Spam, Phishing, and the localization of VoIP emergency calls.  ...  Supported services are VoIP emergency calls, Spam detection and prevention, and phishing prevention.  ...  ., initiated by email spam, a phisher pretends to be a trustworthy person or institution.  ... 
doi:10.1109/lcn.2008.4664185 dblp:conf/lcn/WidigerKDSTBD08 fatcat:p6ld2ze53vhijae4m6zuqdrfqm

Understanding Cross-Channel Abuse with SMS-Spam Support Infrastructure Attribution [chapter]

Bharat Srinivasan, Payas Gupta, Manos Antonakakis, Mustaque Ahamad
2016 Lecture Notes in Computer Science  
We used CHURN to systematically conduct attribution around the domain names and IP addresses used in such SMS spam operations over a five year time period.  ...  While the long-term properties of email spam tactics have been extensively studied, such behavior for SMS spam is not well understood.  ...  Acknowledgements This work was supported in part by National Science Foundation grants CNS-1318167 and CNS-1514035.  ... 
doi:10.1007/978-3-319-45744-4_1 fatcat:5w2yn7sk2nfcdfqz3rtx3qkb6y

Thwarting E-mail Spam Laundering

Mengjun Xie, Heng Yin, Haining Wang
2008 ACM Transactions on Privacy and Security  
In this article, we reveal one salient characteristic of proxy-based spamming activities, namely packet symmetry, by analyzing protocol semantics and timing causality.  ...  Spammers have plagued the Internet by exploiting a large number of spam proxies.  ...  In terms of fighting spam at the source, HoneySpam [Andreolini et al. 2005 ] might be the closest work to ours.  ... 
doi:10.1145/1455518.1455525 fatcat:7qf7ezl275d2zjmq3fzmctdsau

A Situation Analysis on Cybercrime and its Economic Impact in Nigeria

Muhammad Ubale, Sulaiman Isyaku
2017 International Journal of Computer Applications  
Nigeria being one of the countries whose economic infrastructure is at the peak of developing has to do more in terms of fighting cybercrime before it damages the economic growth of the country.  ...  The need to address this issue has become paramount before more damage is done.  ...  and Phishing attacks Spams are typically considered unwanted grouped messages that are sent to the victim in bulk and which are by default filtered by the email server so as to protect the user.  ... 
doi:10.5120/ijca2017914788 fatcat:k5esu3f3cfd3bmyxir4m4cvnxm

Efail: Breaking S/MIME and OpenPGP Email Encryption using Exfiltration Channels

Damian Poddebniak, Christian Dresen, Jens Müller, Fabian Ising, Sebastian Schinzel, Simon Friedberger, Juraj Somorovsky, Somorovsky, Juraj Ruhr University Bochum Schwenk
2018 Zenodo  
The attack works for emails even if they were collected long ago, and it is triggered as soon as the recipient decrypts a single maliciously crafted email from the attacker.  ...  OpenPGP and S/MIME are the two prime standards for providing end-to-end security for emails.  ...  Christian Dresen and Jens Müller have been supported by the research training group 'Human Centered System Security' sponsored by the state of North-Rhine Westfalia.  ... 
doi:10.5281/zenodo.2594632 fatcat:nqh6igyhpnhndi365qnjcfckve
« Previous Showing results 1 — 15 out of 282 results