Sciweavers

CEAS
2011
Springer
12 years 4 months ago
Blocking spam by separating end-user machines from legitimate mail server machines
Spamming botnets present a critical challenge in the control of spam messages due to the sheer volume and wide spread of the botnet members. In this paper we advocate the approach...
Fernando Sanchez, Zhenhai Duan, Yingfei Dong
AIMS
2011
Springer
12 years 8 months ago
Finding and Analyzing Evil Cities on the Internet
Abstract. IP Geolocation is used to determine the geographical location of Internet users based on their IP addresses. When it comes to security, most of the traditional geolocatio...
Matthijs G. T. van Polen, Giovane Cesar Moreira Mo...
JSW
2008
127views more  JSW 2008»
13 years 4 months ago
A Trust Based System for Enhanced Spam Filtering
The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to filtering techniques and the lack of incentive for mail servers to filter outgoing ...
Jimmy McGibney, Dmitri Botvich
SAINT
2005
IEEE
13 years 10 months ago
A Protection Method Against Massive Error Mails Caused by Sender Spoofed Spam Mails
Wide spread of spam mails is one of the most serious problems on e-mail environment. Particularly, spam mails with a spoofed sender address should not be left alone, since they ma...
Nariyoshi Yamai, Kiyohiko Okayama, Takuya Miyashit...
CEAS
2007
Springer
13 years 10 months ago
A Case for a Spam-Aware Mail Server Architecture
The current mail server architecture spawns a new process upon every new connection it receives. The new process deals with the handling of the mail from accepting “Helo” info...
Abhinav Pathak, Sabyasachi Roy, Y. Charlie Hu
ICC
2007
IEEE
119views Communications» more  ICC 2007»
13 years 11 months ago
Behavioral Characteristics of Spammers and Their Network Reachability Properties
By analyzing a two-month trace of more than 25 million emails received at a large US university campus network, of which more than 18 million are spam messages, we characterize th...
Zhenhai Duan, Kartik Gopalan, Xin Yuan
PAM
2009
Springer
13 years 11 months ago
Inferring Spammers in the Network Core
Despite a large amount of effort devoted in the past years trying to limit unsolicited mail, spam is still a major global concern. Content-analysis techniques and blacklists, the m...
Dominik Schatzmann, Martin Burkhart, Thrasyvoulos ...