Evaluating Third-Party Bad Neighborhood Blacklists for Spam Detection

被引:0
|
作者
Moura, Giovane C. M. [1 ]
Sperotto, Anna [1 ]
Sadre, Ramin [1 ]
Pras, Aiko [1 ]
机构
[1] Univ Twente, CTIT, Fac Elect Engn Math & Comp Sci EEMCS, NL-7500 AE Enschede, Netherlands
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The distribution of malicious hosts over the IP address space is far from being uniform. In fact, malicious hosts tend to be concentrated in certain portions of the IP address space, forming the so-called Bad Neighborhoods. This phenomenon has been previously exploited to filter Spam by means of Bad Neighborhood blacklists. In this paper, we evaluate how much a network administrator can rely upon different Bad Neighborhood blacklists generated by third-party sources to fight Spam. One could expect that Bad Neighborhood blacklists generated from different sources contain, to a varying degree, disjoint sets of entries. Therefore, we investigate (i) how specific a blacklist is to its source, and (ii) whether different blacklists can be interchangeably used to protect a target from Spam. We analyze five Bad Neighborhood blacklists generated from real-world measurements and study their effectiveness in protecting three production mail servers from Spam. Our findings lead to several operational considerations on how a network administrator could best benefit from Bad Neighborhood-based Spam filtering.
引用
收藏
页码:252 / 259
页数:8
相关论文
共 50 条
  • [21] Three's company - Evaluating third-party intervention in intrastate conflict
    Carment, D
    Rowlands, D
    JOURNAL OF CONFLICT RESOLUTION, 1998, 42 (05) : 572 - 599
  • [22] Evaluating the Information Usefulness of Online Health Information for Third-party Patients
    Shi, Dingyu
    Ren, Changchang
    Liu, Yixuan
    Zhang, Xiaofei
    PROCEEDINGS OF NINETEENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, 2020, : 431 - 438
  • [23] Up-To-Crash: Evaluating Third-Party Library Updatability on Android
    Huang, Jie
    Borges, Nataniel
    Bugiel, Sven
    Backes, Michael
    2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), 2019, : 15 - 30
  • [24] Evaluating third-party verification: auditing as a new role for the swine veterinarian
    Olsen, D
    AMERICAN ASSOCIATION OF SWINE VETERINARIANS, PROCEEDINGS, 2003, : 311 - 312
  • [25] Risks of third-party data
    Schneier, B
    COMMUNICATIONS OF THE ACM, 2005, 48 (05) : 136 - 136
  • [26] Third-party verification on sustainability
    不详
    CANADIAN MINING JOURNAL, 2007, 128 (07) : 6 - 6
  • [27] Third-party intervention in secessions
    Friedhelm Hentschel
    Economics of Governance, 2022, 23 : 65 - 82
  • [28] THE CASE FOR THE THIRD-PARTY DOCTRINE
    Kerr, Orin S.
    MICHIGAN LAW REVIEW, 2009, 107 (04) : 561 - 601
  • [29] Third-party coalitional action
    East, M
    PARTNERSHIPS FOR PEACE, DEMOCRACY AND PROSPERITY, 1997, : 49 - 50
  • [30] Orienting to third-party conversations
    Martinez-Sussmann, Carmen
    Akhtar, Nameera
    Diesendruck, Gil
    Markson, Lori
    JOURNAL OF CHILD LANGUAGE, 2011, 38 (02) : 273 - 296