Skip to main content

Detecting Spammers via Aggregated Historical Data Set

  • Conference paper
Network and System Security (NSS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7645))

Included in the following conference series:

  • 1247 Accesses

Abstract

In this work we propose a new sender reputation mechanism that is based on an aggregated historical dataset, which encodes the behavior of mail transfer agents over exponential growing time windows. The proposed mechanism is targeted mainly at large enterprises and email service providers and can be used for updating both the black and the white lists. We evaluate the proposed mechanism using 9.5M anonymized log entries obtained from the biggest Internet service provider in Europe. Experiments show that proposed method detects more than 94% of the Spam emails that escaped the blacklist (i.e., TPR), while having less than 0.5% false-alarms. Therefore, the effectiveness of the proposed method is much higher than of previously reported reputation mechanisms, which rely on emails logs. In addition, on our data-set the proposed method eliminated the need in automatic content inspection of 4 out of 5 incoming emails, which resulted in dramatic reduction in the filtering computational load.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Alperovitch, D., Judge, P., Krasser, S.: Taxonomy of email reputation systems. In: ICDCS Workshops 2007 (2007)

    Google Scholar 

  2. Balthrop, J., Forrest, S., Newman, M.E.J., Williamson, M.M.: Technological networks and the spread of computer viruses. Science 304(5670), 527–529 (2004)

    Article  Google Scholar 

  3. Beverly, R., Sollins, K.: Exploiting the transport-level characteristics of am. In: 5th Conference on Email and Anti-Spam, CEAS (2008)

    Google Scholar 

  4. Boykin, P., Roychowdhury, V.: Leveraging social networks to fight spam. IEEE Computer 38(4), 61–68 (2005)

    Article  MathSciNet  Google Scholar 

  5. Eleven. expurgate (June 2010), http://www.eleven.de/overview-antispam.html

  6. Golbeck, J., Hendler, J.: Reputation network analysis for email filtering. In: First Conference on Email and Anti-Spam, Mountain View, California, USA (2004)

    Google Scholar 

  7. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The weka data mining software: an update. SIGKDD Explorations 11(1), 10–18 (2009)

    Article  Google Scholar 

  8. Hao, S., Syed, N.A., Feamster, N., Gray, A.G., Krasser, S.: Detecting spammers with snare: Spatiotemporal network-level automated reputation engine. In: 18th USENIX Security Symposium (2009)

    Google Scholar 

  9. Koprinska, I., Poon, J., Clark, J., Chan, J.: Learning to classify email. Inf. Sci. 177(10), 2167–2187 (2007)

    Article  Google Scholar 

  10. Liu, W.: Identifying and addressing rogue servers in countering internet email misuse. In: IEEE SADFE, pp. 13–24 (2010)

    Google Scholar 

  11. McAfee. Trustedsource, http://www.trustedsource.org/

  12. Namestnikova, M.: Securelist spam report (December 2011), http://www.securelist.com/en/analysis/204792212/Spam_report_December_2011

  13. Qian, Z., Mao, Z.M., Xie, Y., Yu, F.: On network-level clusters for spam detection. In: NDSS (2010)

    Google Scholar 

  14. Ramachandran, A., Feamster, N.: Understanding the network-level behavior of spammers. In: ACM SIGCOMM, Pisa, Italy (2006)

    Google Scholar 

  15. Ramachandran, A., Feamster, N., Vempala, S.: Filtering spam with behavioral blacklisting. In: ACM CCS, pp. 342–351 (2007)

    Google Scholar 

  16. Ruiz-Sanchez, M.A., Biersack, E.W.: Survey and taxonomy of ip address lookup algorithms. IEEE Network 15(2), 8–23 (2001)

    Article  Google Scholar 

  17. Soldo, F., Le, A., Markopoulou, A.: Predictive blacklisting as an implicit recommendation system. In: IEEE INFOCOM, pp. 1–9 (2010)

    Google Scholar 

  18. SORBS, http://www.au.sorbs.net/

  19. SpamCop, http://www.spamcop.net/bl.shtml

  20. Spamhaus, http://www.spamhaus.org

  21. Tang, Y., Krasser, S., Judge, P., Zhang, Y.-Q.: Fast and effective spam sender detection with granular svm on highly imbalanced mail server havior data. In: CollaborateCom, Atlanta, Georgia, USA (2006)

    Google Scholar 

  22. West, A.G., Aviv, A.J., Chang, J., Lee, I.: Preventing malicious behavior using spatio-temporal reputation. In: ACM EUROSYS 2010 (2010)

    Google Scholar 

  23. Youn, S., McLeod, D.: Improved spam filtering by extraction of information from text embedded image email. In: ACM SAC, New York, USA, pp. 1754–1755 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Menahem, E., Pusiz, R., Elovici, Y. (2012). Detecting Spammers via Aggregated Historical Data Set. In: Xu, L., Bertino, E., Mu, Y. (eds) Network and System Security. NSS 2012. Lecture Notes in Computer Science, vol 7645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34601-9_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34601-9_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34600-2

  • Online ISBN: 978-3-642-34601-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics