Detecting spam through their Sender Policy Framework records

被引:4
|
作者
Sipahi, Devrim [1 ]
Dalkilic, Gokhan [1 ]
Ozcanhan, Mehmet Hilal [1 ]
机构
[1] Dokuz Eylul Univ, Dept Comp Engn, Izmir, Turkey
关键词
email; Naive Bayes; Sender Policy Framework; spam;
D O I
10.1002/sec.1280
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Spamming has become one of the worst problems of email communication. Although various anti-spamming methods have been developed, because of creative spammers, none of them are able to stop the penetration of the innovated spam. The content-based anti-spam methods used for spam recognition require considerable amounts of computational resources. Therefore, less resource demanding methods are needed to match the growing number of spam. One example is network-based filtering, which is gaining importance. Sender Policy Framework (SPF) is a network protocol that can provide efficient network-based spam filtering. But, it is becoming evident that spammers have also started to manipulate SPF-based spam filtering. Presently, the spammers are purchasing domain names with SPF records to use them for sending spam. The only methods that can prevent such spam are the blacklist and content filtering techniques, or a blend of both. In the present study, the Domain Name System (DNS)/SPF records of spam-sending domain names are compared with nonspam-sending domain names, for improving SPF-based spam filtering. Research results show distinctive features between spam-sending and non-spam-sending domain names. Naive Bayes algorithmis utilized to identify spam-sending domain names. The time delay results of spam analysis shows that the devised SPF-based filtering offloads content filtering, significantly. Hence, our SPF-based method can act as a pre-filter that helps fighting spam. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:3555 / 3563
页数:9
相关论文
共 50 条
  • [31] One Way to Detecting of Link Spam
    Sharapov, Ruslan V.
    Sharapova, Ekaterina V.
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL NETWORK CONFERENCE (INC 2010), 2010, : 307 - 314
  • [32] Detecting image based spam email
    Ma, Wanli
    Tran, Dat
    Sharma, Dharmendra
    [J]. ADVANCES IN HYBRID INFORMATION TECHNOLOGY, 2007, 4413 : 168 - 177
  • [33] Detecting policy violations through traffic analysis
    Horton, Jeffrey
    Safavi-Naini, Rei
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 109 - +
  • [34] Developing A Framework For Detecting Asthma Endotypes From Electronic Health Records
    Ross, M. K.
    El-Kareh, R.
    Mowery, D.
    [J]. AMERICAN JOURNAL OF RESPIRATORY AND CRITICAL CARE MEDICINE, 2014, 189
  • [35] A VoIP SPAM Reduction Framework
    Ebrahim, Gamal A.
    [J]. 2013 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2013, : 357 - 362
  • [36] Teaching family policy through a policy practice framework
    Rocha, CJ
    Johnson, AK
    [J]. JOURNAL OF SOCIAL WORK EDUCATION, 1997, 33 (03) : 433 - 444
  • [37] A protection method against massive error mails caused by sender spoofed spam mails
    Yamai, N
    Okayama, K
    Miyashita, T
    Maruyama, S
    Nakamura, M
    [J]. 2005 SYMPOSIUM ON APPLICATIONS AND THE INTERNET, PROCEEDINGS, 2005, : 384 - 390
  • [38] A Sender-Centric Approach to Detecting Phishing Emails
    Sanchez, Fernando
    Duan, Zhenhai
    [J]. 2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 32 - 39
  • [39] A survey on detecting spam accounts on Twitter network
    Citlak, Oguzhan
    Dorterler, Murat
    Dogru, Ibrahim Alper
    [J]. SOCIAL NETWORK ANALYSIS AND MINING, 2019, 9 (01)
  • [40] Content trust model for detecting web spam
    Wang, Wei
    Zeng, Guosun
    [J]. TRUST MANAGEMENT, 2007, 238 : 139 - +