2015
DOI: 10.1186/s13174-015-0025-5
|View full text |Cite
|
Sign up to set email alerts
|

Neighborhoods and bands: an analysis of the origins of spam

Abstract: Despite the continuous efforts to mitigate spam, the volume of such messages continues to grow and identifying spammers is still a challenge. Spam traffic analysis is an important tool in this context, allowing network administrators to understand the behavior of spammers, both as they obfuscate messages and try to hide inside the network. This work adds to that body of information by analyzing the sources of spam to understand to what extent they explain the traffic observed. Our results show that, in many ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Email Signatures; Trojans can spoof sender's address to reflect well known organisations such as banks, power companies and post office. A signature based on these known malicious trends can be created along with a blocking rule on an IDS to prevent users from receiving such emails [111], [112]. Although this strategy can be easily bypassed by adversaries, it is still effective in the absence of adversaries' knowledge of being shunned.…”
Section: Host Based Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Email Signatures; Trojans can spoof sender's address to reflect well known organisations such as banks, power companies and post office. A signature based on these known malicious trends can be created along with a blocking rule on an IDS to prevent users from receiving such emails [111], [112]. Although this strategy can be easily bypassed by adversaries, it is still effective in the absence of adversaries' knowledge of being shunned.…”
Section: Host Based Detectionmentioning
confidence: 99%
“…As Trojans are mostly delivered though unsolicited emails (referred to as spam) [125], analysis of these emails can lead to establishment of a pattern or a detection matrix . Filters can be set to scan for specific fingerprints from subject headers, message bodies, white and even black lists email addresses [111], [112].…”
Section: Analysis Of Spam Records;mentioning
confidence: 99%
“…Another approach of email thread reassembly using similarity matching is presented by Yeh and Harnly [39]. Fonseca et al presented a technique to reduce spam messages based on neighbourhoods by classifying it into good or bad neighbourhoods and source of spam [40].…”
Section: Related Workmentioning
confidence: 99%