Blocking spam by separating end-user machines from legitimate mail server machines

被引:4
|
作者
Sanchez, Fernando [1 ]
Duan, Zhenhai [1 ]
Dong, Yingfei [2 ]
机构
[1] Florida State Univ, Dept Comp Sci, Tallahassee, FL 32306 USA
[2] Univ Hawaii, Dept Elect & Comp Engn, Honolulu, HI 96822 USA
关键词
content-independent spam control; spamming bot; machine classification; learning;
D O I
10.1002/sec.587
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Spamming botnets present a critical challenge in the control of spam messages because of the sheer volume and wide spread of the botnet members. In this paper, we advocate the approach for recipient mail servers to filter messages directly delivered from remote end-user (EU) machines, given that the majority of spamming bots are EU machines. We develop a support vector machine (SVM)-based classifier to separate EU machines from legitimate mail server (LMS) machines, using a set of machine features that cannot be easily manipulated by spammers. We investigate the efficacy and performance of the SVM-based classifier using a number of real-world data sets. Our performance studies show that the SVM-based classifier is indeed a feasible and effective approach in distinguishing EU machines from LMS machines. For example, training and testing on an aggregated data set containing both EU machines and LMS machines, on average, we found that the SVM-based classifier can achieve a 99.25% detection accuracy, with very small false positive rate (0.35%) and false negative rate (1.27%), significantly outperforming eight Domain Name System-based blacklists widely used today. Copyright (c) 2012 John Wiley & Sons, Ltd.
引用
收藏
页码:316 / 326
页数:11
相关论文
共 50 条
  • [21] From smart objects to smart experiences: An end-user development approach
    Ardito, Carmelo
    Buono, Paolo
    Desolda, Giuseppe
    Matera, Maristella
    INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 2018, 114 : 51 - 68
  • [22] Requirements analysis in ubiquitous computing - Insights from end-user surveys
    Du, Yong
    PROCEEDINGS OF THE 10TH IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND APPLICATIONS, 2006, : 574 - 579
  • [23] End-user perceptions of intelligence dissemination from a state fusion center
    Lewandowski, Carla
    Carter, Jeremy G.
    SECURITY JOURNAL, 2017, 30 (02) : 467 - 486
  • [24] FACILITATING AND BENEFITING FROM END-USER INVOLVEMENT DURING REQUIREMENTS ANALYSIS
    Luis de la Vara, Jose
    Sanchez, Juan
    ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL ISAS-1: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, VOL 1, 2008, : 316 - 319
  • [25] Fit for purpose: perspectives on rapid reviews from end-user interviews
    Hartling, Lisa
    Guise, Jeanne-Marie
    Hempel, Susanne
    Featherstone, Robin
    Mitchell, Matthew D.
    Motu'apuaka, Makalapua L.
    Robinson, Karen A.
    Schoelles, Karen
    Totten, Annette
    Whitlock, Evelyn
    Wilt, Timothy J.
    Anderson, Johanna
    Berliner, Elise
    Gozu, Aysegul
    Kato, Elisabeth
    Paynter, Robin
    Umscheid, Craig A.
    SYSTEMATIC REVIEWS, 2017, 6
  • [26] Energy Trading in the Smart Grid: From End-user's Perspective
    Chen, Shengbo
    Shroff, Ness B.
    Sinha, Prasun
    2013 ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, 2013, : 327 - 331
  • [27] End-user perceptions of intelligence dissemination from a state fusion center
    Carla Lewandowski
    Jeremy G Carter
    Security Journal, 2017, 30 : 467 - 486
  • [28] Fit for purpose: perspectives on rapid reviews from end-user interviews
    Lisa Hartling
    Jeanne-Marie Guise
    Susanne Hempel
    Robin Featherstone
    Matthew D. Mitchell
    Makalapua L. Motu’apuaka
    Karen A. Robinson
    Karen Schoelles
    Annette Totten
    Evelyn Whitlock
    Timothy J. Wilt
    Johanna Anderson
    Elise Berliner
    Aysegul Gozu
    Elisabeth Kato
    Robin Paynter
    Craig A. Umscheid
    Systematic Reviews, 6
  • [29] Managing end-user system development: Lessons from a case study
    Jennex, ME
    INFORMATION TECHNOLOGY AND ORGANIZATIONS: TRENDS, ISSUES, CHALLENGES AND SOLUTIONS, VOLS 1 AND 2, 2003, : 818 - 820
  • [30] Unveiling the End-User Viewport Resolution From Encrypted Video Traces
    Belmoukadam, Othmane
    Barakat, Chadi
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (03): : 3324 - 3335