Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1855676.1855680guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Spamcraft: an inside look at spam campaign orchestration

Published: 21 April 2009 Publication History

Abstract

No abstract available.

References

[1]
jwSpamSpy Spam Domain Blacklist. http://www.joewein.net/spam/spam-bl.htm.
[2]
Spam URI Realtime Blackhole Lists. http://www.surbl.org.
[3]
D. S. Anderson, C. Fleizach, S. Savage, and G. M. Voelker. Spamscatter: Characterizing Internet Scam Hosting Infrastructure. In Proceedings of the USENIX Security Symposium, Boston, MA, Aug. 2007.
[4]
J. Franklin, V. Paxson, A. Perrig, and S. Savage. An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. In ACM CCS, Washington, D.C., Nov. 2007.
[5]
L. Frieder and J. Zittrain. Spam Works: Evidence from Stock Touts and Corresponding Market Activity. Technical Report 2006-11, Berkman Center, March 2007.
[6]
M. Hanke and F. Hauser. On the effects of stock spam e-mails. Journal of Financial Markets, 2007.
[7]
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. Spamalytics: An empirical analysis of spam marketing conversion. In ACM CCS, pages 3-14, Alexandria, Virginia, USA, October 2008.
[8]
C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, and S. Savage. The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. In First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), April 2008.
[9]
C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. On the Spam Campaign Trail. In Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Francisco, CA, April 2008.
[10]
Paul Bäher, Thorsten Holz, Markus Kötter and Georg Wicherski. Know your Enemy: Tracking Botnets. In The Honeynet Project & Research Alliance, March 2005.
[11]
P. Porras, H. Saïdi, and V. Yegneswaran. A Multiperspective Analysis of the Storm (Peacomm) Worm. Technical report, Computer Science Laboratory, SRI International, October 2007.
[12]
M. Prince, B. Dahl, L. Holloway, A. Keller, and E. Langheinrich. Understanding How Spammers Steal Your E-Mail Address: An Analysis of the First Six Months of Data from Project Honey Pot. In Second Conference on Email and Anti-Spam (CEAS), 2005.
[13]
C. Pu and S. Webb. Observed Trends in Spam Construction Techniques: A Case Study of Spam Evolution. In Third Conference on Email and Anti-Spam (CEAS), 2006.
[14]
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A Multifaceted Approach to Understanding the Botnet Phenomenon. In Proceedings of the ACM Internet Measurement Conference, Rio de Janeiro, Brazil, Oct. 2006.
[15]
A. Ramachandran and N. Feamster. Understanding the Network-Level Behavior of Spammers. In Proceedings of the ACM SIGCOMM Conference, Pisa, Italy, Sept. 2006.
[16]
S. Sarat and A. Terzis. Measuring the Storm Worm Network. Technical Report 01-10-2007, Johns Hopkins University, 2007.
[17]
L. Zhuang, J. Dunagan, D. R. Simon, H. J. Wang, I. Osipkov, G. Hulten, and J. Tygar. Characterizing Botnets from Email Spam Records. In First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), April 2008.

Cited By

View all
  • (2019)An Inquiry into Localized Email SpamProceedings of the 20th International Conference on Computer Systems and Technologies10.1145/3345252.3345298(42-48)Online publication date: 21-Jun-2019
  • (2016)PREDATORProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2978317(1568-1579)Online publication date: 24-Oct-2016
  • (2015)Drops for StuffProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security10.1145/2810103.2813620(1081-1092)Online publication date: 12-Oct-2015
  • Show More Cited By

Index Terms

  1. Spamcraft: an inside look at spam campaign orchestration
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      LEET'09: Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more
      April 2009
      9 pages

      Publisher

      USENIX Association

      United States

      Publication History

      Published: 21 April 2009

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 21 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2019)An Inquiry into Localized Email SpamProceedings of the 20th International Conference on Computer Systems and Technologies10.1145/3345252.3345298(42-48)Online publication date: 21-Jun-2019
      • (2016)PREDATORProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2978317(1568-1579)Online publication date: 24-Oct-2016
      • (2015)Drops for StuffProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security10.1145/2810103.2813620(1081-1092)Online publication date: 12-Oct-2015
      • (2015)On the Reliability of Profile Matching Across Large Online Social NetworksProceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining10.1145/2783258.2788601(1799-1808)Online publication date: 10-Aug-2015
      • (2015)Digital Waste SortingProceedings of the 11th International Workshop on Security and Trust Management - Volume 933110.1007/978-3-319-24858-5_1(3-19)Online publication date: 21-Sep-2015
      • (2014)Spam ain't as diverse as it seemsProceedings of the 30th Annual Computer Security Applications Conference10.1145/2664243.2664251(76-85)Online publication date: 8-Dec-2014
      • (2014)The harvester, the botmaster, and the spammerProceedings of the 9th ACM symposium on Information, computer and communications security10.1145/2590296.2590302(353-364)Online publication date: 4-Jun-2014
      • (2012)Longtime behavior of harvesting spam botsProceedings of the 2012 Internet Measurement Conference10.1145/2398776.2398823(453-460)Online publication date: 14-Nov-2012
      • (2012)Taster's choiceProceedings of the 2012 Internet Measurement Conference10.1145/2398776.2398821(427-440)Online publication date: 14-Nov-2012
      • (2012)Analysis of a "/0" stealth scan from a botnetProceedings of the 2012 Internet Measurement Conference10.1145/2398776.2398778(1-14)Online publication date: 14-Nov-2012
      • Show More Cited By

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media