Skip to main content

TRAP: Open Decentralized Distributed Spam Filtering

  • Conference paper
Trust, Privacy and Security in Digital Business (TrustBus 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6863))

  • 871 Accesses

Abstract

Spam is a significant problem in the day-to-day operations of large networks and information systems, as well as a common conduit for malicious software. The problem of detecting and eliminating spam remains of great interest, both commercially and in a research context. In this paper we present TRAP, a reputation-based open, decentralized and distributed system to aid in detecting unwanted e-mail. In TRAP, all participants are equal, all participants can see how the system works, and there is no reliance on any member or subset of members. This paper outlines the TRAP system itself and shows, through simulation, that the fundamental component of TRAP, a distributed low-overhead trust management system, is efficient and robust under the normal conditions present on the Internet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Distributed checksum clearinghouses, http://www.rhyolite.com/dcc

  2. Chirita, P., Diederich, J., Nejdl, W.: MailRank: Using Ranking for Spam Detection. In: 14th ACM International Conference on Information and Knowledge Management, pp. 373–380. ACM, Bremen (2005)

    Google Scholar 

  3. Damiani, E., Vimercati, S.D.C.D., Paraboschi, S., Samarati, P.: P2P-Based Collaborative Spam Detection and Filtering. Peer-to-Peer Computing, pp. 176–183 (2004)

    Google Scholar 

  4. Douceur, J.R.: In: Druschel, P., Kaashoek, M.F., Rowstron, A.I.T. (eds.) The Sybil Attack: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp. 251–260. Springer, London (2002)

    Google Scholar 

  5. Duma, C., Karresand, M., Shahmehri, N., Caronni, G.: A Trust-Aware, P2P-Based Overlay for Intrusion Detection. In: 17th International Workshop on Database and Expert Systems Applications, pp. 692–697. Krakow, Poland (2006)

    Google Scholar 

  6. Duma, C., Shahmehri, N., Caronni, G.: Dynamic Trust Metrics for Peer-to-Peer Systems. In: Sixteenth International Workshop on Database and Expert Systems Applications, Copenhagen, Denmark, pp. 776–781 (2005)

    Google Scholar 

  7. Foukia, N., Zhou, L., Neuman, C.: Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail: Trust Management. In: Stølen, K., Winsborough, W., Martinelli, F., et al. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 77–92. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  8. FreePastry, http://www.freepastry.org

  9. Gong, Y., Chen, Q.: Research of Spam Filtering Based on Bayesian Algorithm. In: International Conference on Computer Application and System Modeling (ICCASM), Taiyuan, China, PP. V4-678–V4-680 (2010)

    Google Scholar 

  10. Gray, A., Haahr, M.: Personalised, Collaborative Spam Filtering. In: First Conference on Email and Anti-Spam, CA, USA (2004)

    Google Scholar 

  11. Hoffman, K., Zage, D., Nita-Rotaru, C.: A Survey of Attack and Defense Techniques for Reputation Systems. ACM Computing Surveys, 1:1–1:31 (2009)

    Google Scholar 

  12. Internet Traffic Report, http://www.internettrafficreport.com

  13. Kong, J.S., Rezaei, B.A., Sarshar, N., Roychowdhury, V.P., Boykin, P.O.: Collaborative Spam Filtering using E-Mail Networks. Computer 39, 67–73 (2006)

    Article  Google Scholar 

  14. Lee, Y., Kim, J.: Characterization of Large-Scale SMTP Traffic: The Coexistence of the Poisson Process and Self-Similarity. In: 2008 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS (2008)

    Google Scholar 

  15. Li, K., Zhong, Z., Ramaswamy, L.: Privacy-Aware Collaborative Spam Filtering. IEEE Transactions on Parallel and Distributed Systems 20, 725–739 (2009)

    Article  Google Scholar 

  16. Measuring the popularity of SMTP server implementations on the Internet, http://www.stillhq.com/research/smtpsurveys_feb2010.html

  17. McGibney, J., Botvich, D.: A Trust Based System for Enhanced Spam Filtering. Journal of Software 3, 55–64 (2008)

    Article  Google Scholar 

  18. MAAWG: Messaging Anti-Abuse Working Group, http://www.maawg.org

  19. Mills, D.: Network Time Protocol Version 4 Reference and Implementation Guide. Technical report (2006)

    Google Scholar 

  20. Milter.org, https://www.milter.org

  21. Mo, G., Zhao, W., Cao, H., Dong, J.: Multi-Agent Interaction Based Collaborative P2P System for Fighting Spam. In: 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, Washington, DC, USA, pp. 428–431 (2007)

    Google Scholar 

  22. Postfix, http://www.postfix.org

  23. Vipul’s Razor, http://razor.sourceforge.net

  24. Pyzor, http://sourceforge.net/apps/trac/pyzor

  25. Rowstron, A.I.T., Druschel, P.: Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems. In: IFIP/ACM International Conference on Distributed Systems Platforms, pp. 329–350. Springer, Heidelberg (2001)

    Google Scholar 

  26. The Apache SpamAssassin Project, http://spamassassin.apache.org

  27. A Reputation-Based Approach for Efficient Filtration of Spam, http://www.cloudmark.com

  28. Wallach, D.S.: A survey of peer-to-peer security issues. In: Okada, M., Babu, C. S., Scedrov, A., Tokuda, H. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 42–57. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  29. Xiong, L., Liu, L.: Peertrust: Supporting Reputation-Based Trust For Peer-To-Peer Electronic Communities. IEEE Transactions on Knowledge and Data Engineering 16, 843–857 (2004)

    Article  Google Scholar 

  30. Zhou, F., Zhuang, L., Zhao, B.Y., Huang, L., Joseph, A.D., Kubiatowicz, J.: Approximate Object Location and Spam Filtering on Peer-to-Peer Systems. In: Endler, M., Schmidt, D.C. (eds.) Middleware 2003. LNCS, vol. 2672, pp. 1–20. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shahmehri, N., Byers, D., Hiran, R. (2011). TRAP: Open Decentralized Distributed Spam Filtering. In: Furnell, S., Lambrinoudakis, C., Pernul, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2011. Lecture Notes in Computer Science, vol 6863. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22890-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22890-2_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22889-6

  • Online ISBN: 978-3-642-22890-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics