The cuckoo's egg: tracking a spy through the maze of computer espionage
The cuckoo's egg: tracking a spy through the maze of computer espionage
Communications of the ACM
Intrusion Detection
Security in Computing
netWorker - SPAM! putting an end to a costly scourge
The Making of a Spam Zombie Army: Dissecting the Sobig Worms
IEEE Security and Privacy
Spam, Spam, Spam, Spam, Spam, the FTC, and Spam
Queue - Developer Tools
Spam filters: bayes vs. chi-squared; letters vs. words
ISICT '03 Proceedings of the 1st international symposium on Information and communication technologies
Computer
Filtering spam e-mail on a global scale
Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
An empirical study of spam traffic and the use of DNS black lists
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Spam and the Social-Technical Gap
Computer
Canning Spam: Proposed Solutions to Unwanted Email
IEEE Security and Privacy
Using uncleanliness to predict future botnet addresses
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Fighting unicode-obfuscated spam
Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit
Understanding web credibility: a synthesis of the research literature
Foundations and Trends in Human-Computer Interaction
Botnet: classification, attacks, detection, tracing, and preventive measures
ICICIC '09 Proceedings of the 2009 Fourth International Conference on Innovative Computing, Information and Control
Secured and trusted three-tier grid architecture
International Journal of Ad Hoc and Ubiquitous Computing
A survey of emerging approaches to spam filtering
ACM Computing Surveys (CSUR)
Segmental parameterisation and statistical modelling of e-mail headers for spam detection
Information Sciences: an International Journal
Genetic optimized artificial immune system in spam detection: a review and a model
Artificial Intelligence Review
Hi-index | 0.00 |
The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organisations and possibly an increasing reluctance to use email by some users. Currently most spam prevention techniques rely on methods that examine the whole email message at the mail server. This paper describes research that aims to deny spam entry into the internal network in the first place.Examination of live amalgamated audit logs from a Linux kernel firewall, the PortSentry intrusion detection system and the Sendmail mail transfer agents has shown that it is possible that automated mailing programs send characteristic probes to the network gateway just before launching an avalanche of mail. Similarly it seems possible to detect precursor activity from some potential zombie machines. A real time system that could detect such activity needs to be certain that a particular IP address is about to send spam before blocking all of its packets at the network gateway. The architecture for a system that establishes certainty that a particular IP address is about to or has started sending spam is described in this paper. The eventual aim is to recognise precursor activity from spammers in real time, establish certainty that this IP address is about to send or is currently sending spam packets and to then deny packets from this IP address at a range of communicating gateways