ABSTRACT
The paper describes the spam problem within a small company and a practical approach applied to mitigate it. The proposed solution is based on a practical approach to spam mitigation, as a combination of free online RBL services and a small PHP system for local black list management. The results of the pilot test period are conclusive about the positive effect of the suggested approach. The paper also offers ideas for further improvement.
- Gregory, P., A. Simon, Blocking Spam and Spyware For Dummies. For Dummies, 2005. Google ScholarDigital Library
- Ciampa M., Security Awareness: Applying Practical Security in Your World. Course Technology, 5 edition, 2016.Google Scholar
- Sophos: https://www.sophos.com, last accessed on 30.03.2017.Google Scholar
- Fortinet: https://www.fortinet.com, last accessed on 30.03.2017.Google Scholar
- Bright Consulting JSC: https://bright.consulting, last accessed on 30.03.2017.Google Scholar
- Zen RBL: https://www.spamhaus.org/zen/, last accessed on 30.03.2017.Google Scholar
- Barracuda RBL: http://www.barracudacentral.org/, last accessed on 30.03.2017.Google Scholar
- PHP Project: http://php.net/, last accessed on 30.03.2017.Google Scholar
- Anti-spam and anti-malware cmdlets: https://technet.microsoft.com/ENUS/library/bb124601(v=exchg.160).aspx, last accessed on 30.03.2017.Google Scholar
Recommendations
An ensemble approach applied to classify spam e-mails
Spam e-mails, known as unsolicited e-mail messages, have become an increasing problem for information security. The intrusion of spam e-mails persecute the users and waste the network resources. Traditionally, machine learning and statistical filtering ...
Filtering spam with behavioral blacklisting
CCS '07: Proceedings of the 14th ACM conference on Computer and communications securitySpam filters often use the reputation of an IP address (or IP address range) to classify email senders. This approach worked well when most spam originated from senders with fixed IP addresses, but spam today is also sent from IP addresses for which ...
@spam: the underground on 140 characters or less
CCS '10: Proceedings of the 17th ACM conference on Computer and communications securityIn this work we present a characterization of spam on Twitter. We find that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blacklists. We analyze the accounts that send spam and find evidence that it ...
Comments