IEEE INFOCOM 2008 - The 27th Conference on Computer Communications 2008
DOI: 10.1109/infocom.2008.104
|View full text |Cite
|
Sign up to set email alerts
|

ALPACAS: A Large-Scale Privacy-Aware Collaborative Anti-Spam System

Abstract: While the concept of collaboration provides a natural defense against massive spam emails directed at large numbers of recipients, designing effective collaborative anti-spam systems raises several important research challenges. First and foremost, since emails may contain confidential information, any collaborative anti-spam approach has to guarantee strong privacy protection to the participating entities. Second, the continuously evolving nature of spam demands the collaborative techniques to be resilient to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(19 citation statements)
references
References 7 publications
(4 reference statements)
0
19
0
Order By: Relevance
“…Prior work also includes proposals for collaborative spam filtering [3,7,29,30]. Kong et al [16] also consider untrustworthy reporters, using Eigentrust to derive their reputation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Prior work also includes proposals for collaborative spam filtering [3,7,29,30]. Kong et al [16] also consider untrustworthy reporters, using Eigentrust to derive their reputation.…”
Section: Related Workmentioning
confidence: 99%
“…Motivated by the shortcomings in terms of effectiveness and cost of email reputation services, researchers have proposed open and collaborative peer-to-peer spam filtering platforms, e.g., [29,30]. These collaborative systems assume compliant behavior from all participating spam reporting nodes, i.e., that nodes submit truthful reports regarding spammers.…”
Section: Introductionmentioning
confidence: 99%
“…The authors would like to thank the anonymous reviewers for their insightful comments. A shorter version of this paper appeared in the Proceedings of the 27th Conference on Computer Communications (IEEE INFOCOM 2008) [1].…”
Section: Acknowledgmentsmentioning
confidence: 99%
“…Yet, due to logistic and privacy issues, it is quite difficult to obtain such data and make it public. Hence, we will use a synthetic mixture of real spam and ham messages, in a strategy similar to what has been proposed in [6], [13]. The ham messages will be related to five Enron employees with the largest mailboxes collected during the same time period.…”
Section: Spam Datamentioning
confidence: 99%
“…common spam words). CF can be based on blacklists [5], which contain IP addresses of known spam senders, or fingerprints extracted from spam messages [6]. Current research on spam CBF relies mainly on improving individual classifier performance, by a better preprocessing [4] or enhancement of the learning algorithm [7].…”
Section: Introductionmentioning
confidence: 99%