Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2011
Empirical comparison of IP reputation databases
CEAS '11: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam ConferencePages 220–226https://doi.org/10.1145/2030376.2030402IP reputation is a common technique to address email spam problem and while there are commercial implementations available, the algorithms behind them are confidential. A few open source implementations (gossip, RepuScore, IP-GroupREP, etc.) are ...
- research-articleSeptember 2011
Spam or ham?: characterizing and detecting fraudulent "not spam" reports in web mail systems
CEAS '11: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam ConferencePages 210–219https://doi.org/10.1145/2030376.2030401Web mail providers rely on users to "vote" to quickly and col-laboratively identify spam messages. Unfortunately, spammers have begun to use bots to control large collections of compromised Web mail accounts not just to send spam, but also to vote "not ...
- research-articleSeptember 2011
A strategic analysis of spam botnets operations
CEAS '11: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam ConferencePages 162–171https://doi.org/10.1145/2030376.2030395We present in this paper a strategic analysis of spam botnets operations, i.e., we study the inter-relationships among bot-nets through their spam campaigns, and we focus on identifying similarities or differences in their modus operandi. The ...
- research-articleSeptember 2011
Blocking spam by separating end-user machines from legitimate mail server machines
CEAS '11: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam ConferencePages 116–124https://doi.org/10.1145/2030376.2030390Spamming botnets present a critical challenge in the control of spam messages due to the sheer volume and wide spread of the botnet members. In this paper we advocate the approach for recipient mail servers to filter messages directly delivered from ...
- research-articleSeptember 2011
A rule-based system for end-user e-mail annotations
CEAS '11: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam ConferencePages 102–108https://doi.org/10.1145/2030376.2030388A new system for spam e-mail annotation by end-users is presented. It is based on the recursive application of handwritten annotation rules by means of an inferential engine based on Logic Programming. Annotation rules allow the user to express nuanced ...
- research-articleSeptember 2011
Spam detection using web page content: a new battleground
- Marco Túlio Ribeiro,
- Pedro H. Calais Guerra,
- Leonardo Vilela,
- Adriano Veloso,
- Dorgival Guedes,
- Wagner Meira,
- Marcelo H. P. C. Chaves,
- Klaus Steding-Jessen,
- Cristine Hoepers
CEAS '11: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam ConferencePages 83–91https://doi.org/10.1145/2030376.2030386Traditional content-based e-mail spam filtering takes into account content of e-mail messages and apply machine learning techniques to infer patterns that discriminate spams from hams. In particular, the use of content-based spam filtering unleashed an ...
- research-articleSeptember 2011
Filtering harmful sentences based on three-word co-occurrence
CEAS '11: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam ConferencePages 64–72https://doi.org/10.1145/2030376.2030384Many bulletin board systems and social network services have become popular collaboration tools in recent years. In such systems, users can easily upload and share their own information via personal computers and mobile phones. However, some information, ...
- research-articleSeptember 2011
Using classifier cascades for scalable e-mail classification
CEAS '11: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam ConferencePages 55–63https://doi.org/10.1145/2030376.2030383In many real-world scenarios, we must make judgments in the presence of computational constraints. One common computational constraint arises when the features used to make a judgment each have differing acquisition costs, but there is a fixed total ...
- research-articleSeptember 2011
Automatic authentication of email servers and personal computers independent of the active participation of server administrators or personal computer users
CEAS '11: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam ConferencePages 38–45https://doi.org/10.1145/2030376.2030381Universal email authentication is impossible with existing authentication schemes, namely DomainKeys Identified Mail (DKIM) and Sender Policy Framework (SPF), primarily because at a minimum this would require the ongoing participation of every domain ...
- research-articleSeptember 2011
How is e-mail sender authentication used and misused?
CEAS '11: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam ConferencePages 31–37https://doi.org/10.1145/2030376.2030380E-mail sender authentication is a promising way of verifying the sources of e-mail messages. Since today's primary e-mail sender authentication mechanisms are designed as fully decentralized architecture, it is crucial for e-mail operators to know how ...