Sciweavers

459 search results - page 2 / 92
» Detecting Spam at the Network Level
Sort
View
ICC
2007
IEEE
119views Communications» more  ICC 2007»
14 years 1 months ago
Behavioral Characteristics of Spammers and Their Network Reachability Properties
By analyzing a two-month trace of more than 25 million emails received at a large US university campus network, of which more than 18 million are spam messages, we characterize th...
Zhenhai Duan, Kartik Gopalan, Xin Yuan
CEAS
2008
Springer
13 years 8 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
CCS
2006
ACM
13 years 10 months ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
NETWORK
2006
290views more  NETWORK 2006»
13 years 6 months ago
Progressive multi gray-leveling: a voice spam protection algorithm
As voice over IP gains popularity, it is easy to imagine that Internet hacking and other security problems we currently face with email spam will attack the VoIP environment. In c...
Dongwook Shin, Jinyoung Ahn, Choon Shim
SP
2010
IEEE
176views Security Privacy» more  SP 2010»
13 years 4 months ago
Investigation of Triangular Spamming: A Stealthy and Efficient Spamming Technique
Spam is increasingly accepted as a problem associated with compromised hosts or email accounts. This problem not only makes the tracking of spam sources difficult but also enables ...
Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fa...