Wide area traffic: the failure of Poisson modeling
IEEE/ACM Transactions on Networking (TON)
Web server workload characterization: the search for invariants
Proceedings of the 1996 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Communications of the ACM
Analysis of educational media server workloads
NOSSDAV '01 Proceedings of the 11th international workshop on Network and operating systems support for digital audio and video
Characterizing reference locality in the WWW
DIS '96 Proceedings of the fourth international conference on on Parallel and distributed information systems
Probability and statistics with reliability, queuing and computer science applications
Probability and statistics with reliability, queuing and computer science applications
Models of mail server workloads
Performance Evaluation
A hierarchical characterization of a live streaming media workload
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
An analysis of Internet chat systems
Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement
"In vivo" spam filtering: a challenge problem for KDD
ACM SIGKDD Explorations Newsletter
Analyzing client interactivity in streaming media
Proceedings of the 13th international conference on World Wide Web
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
An empirical study of spam traffic and the use of DNS black lists
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Understanding the network-level behavior of spammers
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Learning spam: simple techniques for freely-available software
ATEC '03 Proceedings of the annual conference on USENIX Annual Technical Conference
Email prioritization: reducing delays on legitimate mail caused by junk mail
ATEC '04 Proceedings of the annual conference on USENIX Annual Technical Conference
Improving spam detection based on structural similarity
SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
Approximate object location and spam filtering on peer-to-peer systems
Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware
Adaptive e-mail intention finding mechanism based on e-mail words social networks
Proceedings of the 2007 workshop on Large scale attack defense
Peeking into spammer behavior from a unique vantage point
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
Identifying video spammers in online social networks
AIRWeb '08 Proceedings of the 4th international workshop on Adversarial information retrieval on the web
Understanding video interactions in youtube
MM '08 Proceedings of the 16th ACM international conference on Multimedia
Review: A review of machine learning approaches to Spam filtering
Expert Systems with Applications: An International Journal
Detecting spammers and content promoters in online video social networks
Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval
Video interactions in online video social networks
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Detectando usuários maliciosos em interações via vídeos no YouTube
Proceedings of the 14th Brazilian Symposium on Multimedia and the Web
A scalable intelligent non-content-based spam-filtering framework
Expert Systems with Applications: An International Journal
Using GMDH-based networks for improved spam detection and email feature analysis
Applied Soft Computing
On collection of large-scale multi-purpose datasets on internet backbone links
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security
Adaptive e-mails intention finding system based on words social networks
Journal of Network and Computer Applications
SpaDeS: Detecting spammers at the source network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Early detection of outgoing spammers in large-scale service provider networks
DIMVA'13 Proceedings of the 10th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Hi-index | 0.00 |
This article presents an extensive characterization of a spam-infected e-mail workload. The study aims at identifying and quantifying the characteristics that significantly distinguish spam from non-spam (i.e., legitimate) traffic, assessing the impact of spam on the aggregate traffic, providing data for creating synthetic workload models, and drawing insights into more effective spam detection techniques. Our analysis reveals significant differences in the spam and non-spam workloads. We conjecture that these differences are consequence of the inherently different mode of operation of the e-mail senders. Whereas legitimate e-mail transmissions are driven by social bilateral relationships, spam transmissions are a unilateral spammer-driven action.