Skip to main content

Establishing Trust Between Mail Servers to Improve Spam Filtering

  • Conference paper
Autonomic and Trusted Computing (ATC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4610))

Included in the following conference series:

Abstract

This paper proposes a new way to improve spam filtering based on the establishment and maintenance of trust between mail domains. An architecture is presented where each mail domain has an associated trust manager that dynamically records trust measures pertaining to other domains. Trust by one mail domain in another is influenced by direct experience as well as recommendations issued by collaborators. Each trust manager interacts with local spam filtering and peer trust managers to continuously update trust. These trust measures are used to tune filter sensitivity. A simulation set-up is described with multiple nodes that send and receive mail, some of which is spam. Rogue mail servers that produce spam are also introduced. Results of these simulations demonstrate the potential of trust based spam filtering, and are assessed in terms of improvements in rates of false positives and false negatives.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schwartz, A.: SpamAssassin. O’Reilly (2004)

    Google Scholar 

  2. Goodman, J., Rounthwaite, R.: Stopping outgoing spam. In: Proc. ACM Conference on E-Commerce, New York (2004)

    Google Scholar 

  3. Abadi, M., Birrell, A., Burrows, M., Dabek, F., Wobber, T.: Bankable postage for network services. In: Saraswat, V.A. (ed.) ASIAN 2003. LNCS, vol. 2896, pp. 72–90. Springer, Heidelberg (2003)

    Google Scholar 

  4. Naor, M.: Verification of a human in the loop or identification via the Turing test. Unpublished manuscript (1996), http://w.wisdom.weizmann.ac.il/~naor

  5. Kong, J., Rezaei, B., Sarshar, N., Roychowdhury, V., Oscar Boykin, P.: Collaborative spam filtering using e-mail networks. IEEE Computer 39(8), 67–73 (2006)

    Google Scholar 

  6. Golbeck, J., Hendler, J.: Reputation network analysis for email filtering. In: Proc. Conf. on Email and Anti-Spam (2004)

    Google Scholar 

  7. Neustaedter, C., Bernheim Brush, A., Smith, M., Fisher, D.: The social network and relationship finder: social sorting for email triage. In: Proc. Conf. on Email and Anti-Spam (2005)

    Google Scholar 

  8. Han, S., Ahn, Y., Moon, S., Jeong, H.: Collaborative blog spam filtering using adaptive percolation search. In: Proc. International World Wide Web Conference. Edinburgh (2006)

    Google Scholar 

  9. Foukia, N., Zhou, L., Neuman, C.: Multilateral decisions for collaborative defense against unsolicited bulk e-mail. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 77–92. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Androutsopoulos, I., Magirou, E., Vassilakis, O.: A game theoretic model of spam e-mailing. In: Proc. Conf. on Email and Anti-Spam, Stanford (2005)

    Google Scholar 

  11. Gambetta, D.: Can we trust trust? In: Gambetta, D. (ed.) Trust: making and breaking cooperative relations, pp. 213–237. Blackwell, Oxford (1988)

    Google Scholar 

  12. McGibney, J., Botvich, D.: A trust overlay architecture and protocol for enhanced protection against spam. In: Proc. Conf. on Availability, Reliability & Security, Vienna, pp. 749–756 (2007)

    Google Scholar 

  13. Douceur, J.: The Sybil attack. In: Proc. International Workshop on P2P Systems (2002)

    Google Scholar 

  14. Klimt, B., Yang, Y.: The Enron corpus: a new dataset for email classification research. In: Proc. European Conf. on Machine Learning, pp. 217–226 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Bin Xiao Laurence T. Yang Jianhua Ma Christian Muller-Schloer Yu Hua

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

McGibney, J., Botvich, D. (2007). Establishing Trust Between Mail Servers to Improve Spam Filtering. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds) Autonomic and Trusted Computing. ATC 2007. Lecture Notes in Computer Science, vol 4610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73547-2_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73547-2_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73546-5

  • Online ISBN: 978-3-540-73547-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics