Analysis and simulation of a fair queueing algorithm
SIGCOMM '89 Symposium proceedings on Communications architectures & protocols
Internet Privacy for Dummies
Design, Implementation and Test of an Email Virus Throttle
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
An effective defense against email spam laundering
Proceedings of the 13th ACM conference on Computer and communications security
Workload models of spam and legitimate e-mails
Performance Evaluation
DMTP: Controlling spam through message delivery differentiation
Computer Networks: The International Journal of Computer and Telecommunications Networking
Improving spam detection based on structural similarity
SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
Separating wheat from the chaff: a deployable approach to counter spam
SRUTI'06 Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet - Volume 2
Proceedings of the ninth international conference on Electronic commerce
Exploiting network structure for proactive spam mitigation
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Thwarting E-mail Spam Laundering
ACM Transactions on Information and System Security (TISSEC)
How to secure your email address book and beyond
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
A collaboration-based autonomous reputation system for email services
INFOCOM'10 Proceedings of the 29th conference on Information communications
Social feature-based enterprise email classification without examining email contents
Journal of Network and Computer Applications
Hi-index | 0.00 |
In recent years the volume of junk email (spam, virus etc.) has increased dramatically. These unwanted messages clutter up users' mailboxes, consume server resources, and cause delays to the delivery of mail. This paper presents an approach that ensures that nonjunk mail is delivered without excessive delay, at the expense of delaying junk mail. Using data from two Internet-facing mail servers, we show how it is possible to simply and accurately predict whether the next message sent from a particular server will be good or junk, by monitoring the types of messages previously sent. The prediction can be used to delay acceptance of junk mail, and prioritize good mail through the mail server, ensuring that loading is reduced and delays are low, even if the server is overloaded. The paper includes a review of server-based anti-spam techniques, and an evaluation of these against the data. We develop and calibrate a model of mail server performance, and use it to predict the performance of the prioritization scheme. We also describe an implementation on a standard mail server.