2009
DOI: 10.1007/978-3-642-02918-9_3
|View full text |Cite
|
Sign up to set email alerts
|

Towards Proactive Spam Filtering (Extended Abstract)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…An attacker would install a tool on compromised machines that can open chosen ports, port 8975 for SOCKS, turning it into a SOCKS proxy (Kaspersky Lab, 2016a). A network of such compromised machines can be used for spam distribution (Göbel, Holz, & Trinius, 2009). In this way, spam server blacklists can be circumvented (Ianelli & Hackworth, 2007), as the IP addresses of the compromised machines most likely do not appear on blacklists yet.…”
Section: Socksmentioning
confidence: 99%
“…An attacker would install a tool on compromised machines that can open chosen ports, port 8975 for SOCKS, turning it into a SOCKS proxy (Kaspersky Lab, 2016a). A network of such compromised machines can be used for spam distribution (Göbel, Holz, & Trinius, 2009). In this way, spam server blacklists can be circumvented (Ianelli & Hackworth, 2007), as the IP addresses of the compromised machines most likely do not appear on blacklists yet.…”
Section: Socksmentioning
confidence: 99%
“…Jan Gobal et al [98] have introduced a proactive approach for directly and efficiently collecting spam messages after the interaction with the controllers of spam botnets. The authors have executed spambots (malicious software responsible to send Email spam) in a controlled environment and collected all the Emails sent by those bots.…”
Section: Ieee Communications Surveys and Tutorials Accepted For Publicmentioning
confidence: 99%
“…If the sender's Internet Protocol address is on a blacklist, the email is classified as spam; otherwise, it is known as ham and is sent straight to the recipient. When many domains are hosted on the same IP address, domain-based blacklists are implemented [26]. Domain-based blacklists are very uncommon and are also referred to as right-hand blacklists [25].…”
Section: B the Meaning Of The Term "Spam"mentioning
confidence: 99%