Abstract
This paper proposes a new way to improve spam filtering based on the establishment and maintenance of trust between mail domains. An architecture is presented where each mail domain has an associated trust manager that dynamically records trust measures pertaining to other domains. Trust by one mail domain in another is influenced by direct experience as well as recommendations issued by collaborators. Each trust manager interacts with local spam filtering and peer trust managers to continuously update trust. These trust measures are used to tune filter sensitivity. A simulation set-up is described with multiple nodes that send and receive mail, some of which is spam. Rogue mail servers that produce spam are also introduced. Results of these simulations demonstrate the potential of trust based spam filtering, and are assessed in terms of improvements in rates of false positives and false negatives.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Schwartz, A.: SpamAssassin. O’Reilly (2004)
Goodman, J., Rounthwaite, R.: Stopping outgoing spam. In: Proc. ACM Conference on E-Commerce, New York (2004)
Abadi, M., Birrell, A., Burrows, M., Dabek, F., Wobber, T.: Bankable postage for network services. In: Saraswat, V.A. (ed.) ASIAN 2003. LNCS, vol. 2896, pp. 72–90. Springer, Heidelberg (2003)
Naor, M.: Verification of a human in the loop or identification via the Turing test. Unpublished manuscript (1996), http://w.wisdom.weizmann.ac.il/~naor
Kong, J., Rezaei, B., Sarshar, N., Roychowdhury, V., Oscar Boykin, P.: Collaborative spam filtering using e-mail networks. IEEE Computer 39(8), 67–73 (2006)
Golbeck, J., Hendler, J.: Reputation network analysis for email filtering. In: Proc. Conf. on Email and Anti-Spam (2004)
Neustaedter, C., Bernheim Brush, A., Smith, M., Fisher, D.: The social network and relationship finder: social sorting for email triage. In: Proc. Conf. on Email and Anti-Spam (2005)
Han, S., Ahn, Y., Moon, S., Jeong, H.: Collaborative blog spam filtering using adaptive percolation search. In: Proc. International World Wide Web Conference. Edinburgh (2006)
Foukia, N., Zhou, L., Neuman, C.: Multilateral decisions for collaborative defense against unsolicited bulk e-mail. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 77–92. Springer, Heidelberg (2006)
Androutsopoulos, I., Magirou, E., Vassilakis, O.: A game theoretic model of spam e-mailing. In: Proc. Conf. on Email and Anti-Spam, Stanford (2005)
Gambetta, D.: Can we trust trust? In: Gambetta, D. (ed.) Trust: making and breaking cooperative relations, pp. 213–237. Blackwell, Oxford (1988)
McGibney, J., Botvich, D.: A trust overlay architecture and protocol for enhanced protection against spam. In: Proc. Conf. on Availability, Reliability & Security, Vienna, pp. 749–756 (2007)
Douceur, J.: The Sybil attack. In: Proc. International Workshop on P2P Systems (2002)
Klimt, B., Yang, Y.: The Enron corpus: a new dataset for email classification research. In: Proc. European Conf. on Machine Learning, pp. 217–226 (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
McGibney, J., Botvich, D. (2007). Establishing Trust Between Mail Servers to Improve Spam Filtering. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds) Autonomic and Trusted Computing. ATC 2007. Lecture Notes in Computer Science, vol 4610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73547-2_17
Download citation
DOI: https://doi.org/10.1007/978-3-540-73547-2_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73546-5
Online ISBN: 978-3-540-73547-2
eBook Packages: Computer ScienceComputer Science (R0)