2009
DOI: 10.1007/978-3-642-00975-4_23
|View full text |Cite
|
Sign up to set email alerts
|

Inferring Spammers in the Network Core

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
17
0

Year Published

2009
2009
2014
2014

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(18 citation statements)
references
References 6 publications
1
17
0
Order By: Relevance
“…In order to validate the additional spammers we detect, we apply the methodology in [10] identify a more complete set addresses. Figure 3 shows the breakdown of these IP addresses.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…In order to validate the additional spammers we detect, we apply the methodology in [10] identify a more complete set addresses. Figure 3 shows the breakdown of these IP addresses.…”
Section: Resultsmentioning
confidence: 99%
“…From the set of 31,927 IP addresses we found 8,653 which exactly match the bot fingerprint, thus almost doubling again our current bot list. Since these are suspected spammers, we again resort to the spam detection methodology in [10] for validation. This test flagged 8,244 (95%) of these addresses as spammers.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Schatzmann et al propose a collaborative content-blind approach that an ISP can deploy to facilitate spam blocking, based on size distribution of the incoming SMTP flows [36]. The idea is that SMTP servers that perform pre-filtering terminate spam flows quickly after processing the envelope; hence flow size from these servers can be used to rate client MTAs for the benefit other SMTP servers that might not use prefiltering.…”
Section: Related Workmentioning
confidence: 99%