skip to main content
10.1145/1013367.1013474acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
Article

Spam attacks: p2p to the rescue

Published: 19 May 2004 Publication History

Abstract

We propose a decentralized privacy-preserving approach to spam filtering. Our solution exploits robust digests to identify messages that are a slight variation of one another and a peer-to-peer architecture between mail servers to collaboratively share knowledge about spam.

References

[1]
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. Managing and sharing servents' reputations in P2P systems. IEEE TKDE, 15(4):840--854, July/August 2003.
[2]
J. Metzger, M. Schillo, and K. Fischer. A multiagent-based peer-to-peer network in java for distributed spam filtering. In Proc. of the CEEMAS, Czech Republic, June 2003.
[3]
B. Yang and H. Garcia-Molina. Designing a super-peer network. In Proc. of the ICDE, Bangalore, India, March 2003.
[4]
F. Zhou, L. Zhuang, B. Zhao, L. Huang, A. Joseph, and J. Kubiatowicz. Approximate object-location and spam filtering on peer-to-peer systems. In Proc. of the ACM/IFIP/USENIX International Middleware Conference, June 2003.

Cited By

View all
  • (2017)Today's social network sites: An analysis of emerging security risks and their counter measures2017 International Conference on Communication Technologies (ComTech)10.1109/COMTECH.2017.8065764(143-148)Online publication date: Apr-2017
  • (2014)Differentiated Virtual Passwords, Secret Little Functions, and Codebooks for Protecting Users From Password TheftIEEE Systems Journal10.1109/JSYST.2012.21837558:2(406-416)Online publication date: Jun-2014
  • (2011)Enhanced Key Life in Online Authentication Systems Using Virtual PasswordProceedings of the 2011 Eighth International Conference on Information Technology: New Generations10.1109/ITNG.2011.71(366-369)Online publication date: 11-Apr-2011
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WWW Alt. '04: Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters
May 2004
532 pages
ISBN:1581139128
DOI:10.1145/1013367
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 May 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. reputation
  2. spam filtering
  3. structured P2P

Qualifiers

  • Article

Conference

WWW04
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Today's social network sites: An analysis of emerging security risks and their counter measures2017 International Conference on Communication Technologies (ComTech)10.1109/COMTECH.2017.8065764(143-148)Online publication date: Apr-2017
  • (2014)Differentiated Virtual Passwords, Secret Little Functions, and Codebooks for Protecting Users From Password TheftIEEE Systems Journal10.1109/JSYST.2012.21837558:2(406-416)Online publication date: Jun-2014
  • (2011)Enhanced Key Life in Online Authentication Systems Using Virtual PasswordProceedings of the 2011 Eighth International Conference on Information Technology: New Generations10.1109/ITNG.2011.71(366-369)Online publication date: 11-Apr-2011
  • (2008)A Virtual Password Scheme to Protect Passwords2008 IEEE International Conference on Communications10.1109/ICC.2008.297(1536-1540)Online publication date: May-2008
  • (2008)Secret Little Functions and Codebook for Protecting Users from Password Theft2008 IEEE International Conference on Communications10.1109/ICC.2008.295(1525-1529)Online publication date: May-2008
  • (2008)Virtual password using random linear functions for on-line services, ATM machines, and pervasive computingComputer Communications10.1016/j.comcom.2008.05.00531:18(4367-4375)Online publication date: 1-Dec-2008
  • (2007)Using header session messages to anti-spammingComputers and Security10.1016/j.cose.2006.12.01226:5(381-390)Online publication date: 1-Aug-2007
  • (2006)Lightweight email signatures (extended abstract)Proceedings of the 5th international conference on Security and Cryptography for Networks10.1007/11832072_20(288-302)Online publication date: 6-Sep-2006

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media