Blocking spam by separating end-user machines from legitimate mail server machines

被引:4
|
作者
Sanchez, Fernando [1 ]
Duan, Zhenhai [1 ]
Dong, Yingfei [2 ]
机构
[1] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
[2] Univ Hawaii, Dept Elect & Comp Engn, Honolulu, HI 96822 USA
关键词
content-independent spam control; spamming bot; machine classification; learning;
D O I
10.1002/sec.587
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Spamming botnets present a critical challenge in the control of spam messages because of the sheer volume and wide spread of the botnet members. In this paper, we advocate the approach for recipient mail servers to filter messages directly delivered from remote end-user (EU) machines, given that the majority of spamming bots are EU machines. We develop a support vector machine (SVM)-based classifier to separate EU machines from legitimate mail server (LMS) machines, using a set of machine features that cannot be easily manipulated by spammers. We investigate the efficacy and performance of the SVM-based classifier using a number of real-world data sets. Our performance studies show that the SVM-based classifier is indeed a feasible and effective approach in distinguishing EU machines from LMS machines. For example, training and testing on an aggregated data set containing both EU machines and LMS machines, on average, we found that the SVM-based classifier can achieve a 99.25% detection accuracy, with very small false positive rate (0.35%) and false negative rate (1.27%), significantly outperforming eight Domain Name System-based blacklists widely used today. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:316 / 326
页数:11
相关论文
共 50 条
  • [1] IPTV over Wimax: Overview on the video path from the server to the Wimax end-user
    Moawad, Rabih Badih
    2008 IEEE LEBANON COMMUNICATIONS WORKSHOP, 2008, : 17 - 23
  • [2] E-mail Spam filtering based on support vector machines with Taguchi method for parameter selection
    Hsu W.-C.
    Yu T.-Y.
    Journal of Convergence Information Technology, 2010, 5 (08) : 9
  • [3] Improved spam e-mail filtering based on committee machines and information theoretic feature extraction
    Zorkadis, V
    Panayotou, M
    Karras, DA
    PROCEEDINGS OF THE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), VOLS 1-5, 2005, : 179 - 184
  • [4] Separating Quasars from Stars by Support Vector Machines
    Zhang, Yanxia
    Zheng, Hongwen
    Zhao, Yongheng
    SOFTWARE AND CYBERINFRASTRUCTURE FOR ASTRONOMY, 2010, 7740
  • [5] The chain from the forest to the end-user - in Sweden
    Thornqvist, Thomas
    MODELLING THE WOOD CHAIN: FORESTRY - WOOD INDUSTRY - WOOD PRODUCTS MARKETS, 2007, : 160 - 163
  • [6] Developing end-user innovation from circuits of learning
    Fosstenlokken, Siw M.
    LEARNING ORGANIZATION, 2015, 22 (03): : 182 - 194
  • [7] END-LOSSES FROM MIRROR MACHINES
    BING, GF
    ROBERTS, JE
    PHYSICS OF FLUIDS, 1961, 4 (08) : 1039 - 1046
  • [8] From User to Manufacturer: Correctly Implementing the Retrofit of Machines
    Staub-Lang, Pascal
    ATP MAGAZINE, 2018, (09): : 100 - 103
  • [9] End-user configuration of ambient intelligence environments: Feasibility from a user perspective
    Markopoulos, P
    Mavrommati, I
    Kameas, A
    AMBIENT INTELLIGENCE, PROCEEDINGS, 2004, 3295 : 243 - 254
  • [10] Localizing Basestations From End-User Timing Advance Measurements
    Eller, Lukas
    Raida, Vaclav
    Svoboda, Philipp
    Rupp, Markus
    IEEE ACCESS, 2022, 10 : 5533 - 5544