Trinitya: distributed defense against transient spam-bots

  • Authors:
  • Alex Brodsky;Dmitry Brodsky

  • Affiliations:
  • University of Winnipeg, Winnipeg, MAN, Canada;Worio, Vancouver, BC, Canada

  • Venue:
  • Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Transient spam-bots are hijacked computers that are connected to the Internet for short periods of time, during which they send large amounts of spam. These spam-bots have become a principle source of spam; against which, static countermeasures such as DNS Black Lists are largely ineffective, and content-based filters provide temporary relief without ongoing tuning and upgrading---a never-ending cat-and-mouse game. This is a brief overview of Trinity [1], a distributed, content independent, spam classification system that is specifically aimed at transient spam-bots. Trinity uses source identification in combination with a peer-to-peer based distributed database to identify and track transient spam-bots. Trinity's design load balances the task of tracking the transient spam-bots and provides a robust defense against denial-of-service and malevolent peer attacks.