Stopping Outgoing Spam by Examining Incoming Server Logs

نویسنده

  • Richard Clayton
چکیده

Processing server logs for the email arriving at an ISP can be used to detect remote sites where machines are infected by email viruses or have been hijacked and used for sending spam. Simple heuristics distinguish the patterns of such traffic from those of legitimate email. Stopping this material being sent is matter for the remote site. Nevertheless, this paper shows that processing can also detect if any of the ISP’s own customers have problems, because their email is logged when it is sent to other customers (or even back to themselves). Experimental results from a medium-sized ISP show that the scheme is successful in detecting customer problems. Unfortunately, if the spam or virus is not sent to anyone local then the problem remains undetected. Estimates of worldwide rates of compromise of end-user machines are used to give an indication of the likely overall effectiveness of the detection scheme.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stopping Spam by Extrusion Detection

End users are often unaware that their systems have been compromised and are being used to send bulk unsolicited email (spam). We show how automated processing of the email logs recorded on the “smarthost” provided by an ISP for their customer’s outgoing email can be used to detect this spam. The variability and obfuscation being employed by the spammers to avoid detection at the destination cr...

متن کامل

Token Buckets for Outgoing Spam Prevention

In this paper we propose a concept for preventing unsolicited bulk e-mail (UBE, “spam”) at the outgoing SMTP server. In particular, we take the point of view of an Internet Service Provider (ISP), who wants to control the email traffic going out of its network. A central component of our concept contains the adaptation of a token bucket mechanism which allows the ISP to dynamically limit the nu...

متن کامل

Evaluating The Use of Spam-triggered TCP/IP Rate Control To Protect SMTP Servers

This paper examines an approach to spam mitigation that rate limits incoming TCP/IP connections to an SMTP server based on the real-time detection of spam within the SMTP message exchange. Our approach is motivated by a desire to cause increased resource consumption at the spammer end of each SMTP connection, and to avoid the negative impact of falsepositives by eventually allowing all emails t...

متن کامل

A Trust Based System for Enhanced Spam Filtering

The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to filtering techniques and the lack of incentive for mail servers to filter outgoing spam. A new approach, based on decentralised trust management, is described in this paper. An architecture and protocol, called TOPAS (Trust Overlay Protocol for Anti Spam), are presented. Each mail server records tru...

متن کامل

Mining Email Data

E-mail has become one of the most important communication media for business and private purposes. Large amounts of past e-mail records reside on corporate servers and desktop clients. There is a huge potential for mining this data. E-mail filing and spam filtering are wellestablished e-mail mining tasks. E-mail filing addresses the assignment of incoming e-mails to predefined categories to sup...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005