• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 91
Next 10 →

Global-scale Anti-spam Testing in Your Own Back Yard

by Margaret Nielsen, John Aycock, Dane Bertram, Nathan Friess, Sampson Pun
"... The effectiveness of anti-spam techniques is an important question: after all, spam has a real cost to legitimate users in terms of time and resources. The problem is how we determine effectiveness, especially for anti-spam techniques that are distributed, and require global scale to function. A sci ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
system that simulates relevant parts of the Internet on a single computer. We demonstrate the ability of our testing system to conduct large-scale experiments with some proof-of-concept experiments on SMTP tarpits and a variation on the Distributed Checksum Clearinghouse. 1

Reducing spam to 20% of its original value with a SMTP tar pit simulator

by Tobias Eggendorfer - In MIT Spam Conference , 2007
"... Unsolicited commercial email (UCE, spam), scam and phishing emails make up for more than 90 % of all emails sent world-wide. Most antispam methods known rely on filtering emails. Meanwhile, browsers also check URLs against blacklists to avoid fraud. However, all those methods are reactive, ergo they ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
solution is to take advantage of spammers ' bulk mailers ' terse time outs to avoid being trapped by a SMTP tar pit. This is done by implementing a SMTP proxy on a bridge simulating a tar pit for a configurable time only. To simplify the installation procedure and to have a transparent solution

USENIX Association

by Th Large Installation, Tim Hunter, Paul Terry, Alan Judge Eircom. Net - In Porc. USENIX LISA 2003 , 2003
"... This paper describes an Irish ISP's attempts to combat the abuse of resources caused by unsolicited commercial email. We describe the extension of a multicast system, used to implement POP-before-SMTP relaying, to share information about remote mail servers between multiple mail systems. The in ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
. The information may then be used to tarpit abusive servers -- placing delays between SMTP protocol answers thus mitigating their impact on our systems. We then examine how effective this has been, and come up with some ideas for future development.

On the Design and Use of Internet Sinks for Network Abuse Monitoring

by Vinod Yegneswaran, Paul Barford, Dave Plonka - In Proceedings of the 7 th International Symposium on Recent Advances in Intrusion Detection (RAID , 2004
"... Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with typical network intrusion detection and firewall systems. ..."
Abstract - Cited by 85 (10 self) - Add to MetaCart
Monitoring unused or dark IP addresses offers opportunities to significantly improve and expand knowledge of abuse activity without many of the problems associated with typical network intrusion detection and firewall systems.

on Exchange 2003

by unknown authors , 2003
"... This paper will evaluate a 'locked down ' inbound mail gateway (receives email from the Internet) design on Windows 2003 and Exchange 2003, using a set of complementing software products including Microsoft ISA Server 2004 and McAfee SecurityShield for Microsoft ISA Server 1.0. The purpose ..."
Abstract - Add to MetaCart
.0. The purpose is to create a more secure Exchange Internet gateway without resorting to using a third party SMTP engine for receiving Internet email. The focus is on hardening the Exchange SMTP engine, increasing the intelligence of mail filtering... Copyright SANS Institute

Email Spam Filtering: A Systematic Review

by Gordon V. Cormack - Foundations and Trends in Information Retrieval
"... Spam is information crafted to be delivered to a large number of recipients, in spite of their wishes. A spam filter is an automated tool to recognize spam so as to prevent its delivery. The purposes of spam and spam filters are diametrically opposed: spam is effective if it evades filters, while a ..."
Abstract - Cited by 29 (3 self) - Add to MetaCart
Spam is information crafted to be delivered to a large number of recipients, in spite of their wishes. A spam filter is an automated tool to recognize spam so as to prevent its delivery. The purposes of spam and spam filters are diametrically opposed: spam is effective if it evades filters, while a filter is effective if it recognizes spam. The circular nature of these definitions, along with their appeal to the intent of sender and recipient make them difficult to formalize. A typical email user has a working definition no more formal than “I know it when I see it.” Yet, current spam filters are remarkably effective, more effective than might be expected given the level of uncertainty and debate over a formal definition of spam, more effective than might be expected given the state-of-the-art information retrieval and machine learning methods for seemingly similar problems. But are they effective enough? Which are better? How might they be improved? Will their effectiveness be

Experiences with CoralCDN: A Five-Year Operational View

by Michael J. Freedman - In Proc NSDI , 2010
"... CoralCDN is a self-organizing web content distribution network (CDN). Publishing through CoralCDN is as simple as making a small change to a URL’s hostname; a decentralized DNS layer transparently directs browsers to nearby participating cache nodes, which in turn cooperate to minimize load on the o ..."
Abstract - Cited by 27 (3 self) - Add to MetaCart
CoralCDN is a self-organizing web content distribution network (CDN). Publishing through CoralCDN is as simple as making a small change to a URL’s hostname; a decentralized DNS layer transparently directs browsers to nearby participating cache nodes, which in turn cooperate to minimize load on the origin webserver. CoralCDN has been publicly available on PlanetLab since March 2004, accounting for the majority of its bandwidth and serving requests for several million users (client IPs) per day. This paper describes CoralCDN’s usage scenarios and a number of experiences drawn from its multi-year deployment. These lessons range from the specific to the general, touching on the Web (APIs, naming, and security), CDNs (robustness and resource management), and virtualized hosting (visibility and control). We identify design aspects and changes that helped CoralCDN succeed, yet also those that proved wrong for its current environment. 1

Design, Implementation and Test of an Email Virus Throttle

by Matthew M. Williamson - IN 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE , 2003
"... This paper presents an approach to preventing the damage caused by viruses that travel via email. The approach prevents an infected machine spreading the virus further. This directly addresses the two ways that viruses cause damage: less machines spreading the virus will reduce the number of ma ..."
Abstract - Cited by 20 (2 self) - Add to MetaCart
This paper presents an approach to preventing the damage caused by viruses that travel via email. The approach prevents an infected machine spreading the virus further. This directly addresses the two ways that viruses cause damage: less machines spreading the virus will reduce the number of machines infected and reduce the traffic generated by the virus. The approach

Resisting Spam Delivery by TCP Damping

by Kang Li, Calton Pu, Mustaque Ahamad - In Proceedings of First Conference on Email and Anti-Spam (CEAS , 2004
"... Spam has become a major problem that is threatening the efficiency of the current email system. Spam is overwhelming the Internet because 1) emails are pushed from senders to receivers without much control from recipients, and 2) the cost for delivering emails is very low. In this paper, we presen ..."
Abstract - Cited by 12 (0 self) - Add to MetaCart
Spam has become a major problem that is threatening the efficiency of the current email system. Spam is overwhelming the Internet because 1) emails are pushed from senders to receivers without much control from recipients, and 2) the cost for delivering emails is very low. In this paper, we present an anti-spam framework that slows down spammers: by adding delay to email delivery, and by consuming more sender resources. Both delay and resource consumption are controlled based on the likelihood of the source of email messages being a spammer, so that our technique only impact the spammers and has negligible impact on normal email senders. The mechanisms are implemented in the TCP level at the recipient side without requiring any modifications at the sender side. Our evaluations show that selectively delaying connections can effectively slow down a spammer thousands of times when they use a simple setup or use open relays. The mechanism of increasing sender's resource consumption can significantly slow down spammers even when they are spamming from their own optimized servers.

General Delivery- Receiver Driven Email Delivery

by Natascha Chrobok , 2010
"... I agree that this thesis may be consulted for research and study purposes and that reasonable quotation may be made from it, provided that proper acknowledgement of its use is made. I consent to this thesis being copied in part or in whole for i) a library ii) an individual at the discretion of the ..."
Abstract - Add to MetaCart
I agree that this thesis may be consulted for research and study purposes and that reasonable quotation may be made from it, provided that proper acknowledgement of its use is made. I consent to this thesis being copied in part or in whole for i) a library ii) an individual at the discretion of the University of Otago. Signature: Date:
Next 10 →
Results 1 - 10 of 91
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2018 The Pennsylvania State University