PR3 Email Honeypot

نویسندگان

  • Jean-Marc Seigneur
  • Anselm Lambert
  • Patroklos G. Argyroudis
  • Christian D. Jensen
چکیده

Although there are different tools and technologies available to prevent attacks on privacy when online applications are used, few tools are available for detection of actions that violate privacy agreements. The loss of privacy when third parties obtain email addresses of users without their consent can be followed by unsolicited emails – known as spam – sent on the open communication channel. In this case, the loss of privacy is aggravated by the cost spent by people having to go through all these email messages. However, spam can also be used to detect Websites that default on their privacy policy by giving away private information, such as email addresses. If spam is received by an email address that has only been given to a single Website, we may conclude that this Website has either given the address to the spammer or very poor security. In either case, registration with that Website should be avoided. In this paper, we present a tool to detect such exchange of subscribers’ private email addresses between online providers and to check whether these providers have respected their advertised privacy policies.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Outlier Detection in Secure Shell Honeypot using Particle Swarm Optimization Technique

M.Sithara Department of Computer Science, SRMV College of Arts and Science, Coimbatore-20 Email: [email protected] M.Chandran Department of Computer Applications, SRMV College of Arts and Science, Coimbatore-20 Email: [email protected] G.Padmavathi Department of Computer Science, Avinashilingam Institute for Home Science and Higher Education for Women University, Coimbatore-43 Email:...

متن کامل

A Virtual Honeypot Framework

A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new attack and exploitation trends, or allow in-depth examination of adversaries during and after exploitation of a honeypot. Deploying a physical honeypot is often time intensive and expensive as different operating syst...

متن کامل

The impact that placing email addresses on the Internet has on the receipt of spam: An empirical analysis

Email communication is encumbered with a mass of email messages which their recipients have neither requested nor require. Even worse, the impacts of these messages are far from being simply an annoyance, as they also involve economic damage. This manuscript examines the resource " email addresses " , which is vital for any potential bulk mailer and spammer. Both a methodology and a honeypot co...

متن کامل

Investigating Identity Concealing and Email Tracing Techniques

At present it is very difficult to trace the identity of spammers who use identity concealment techniques. It is difficult to determine the identity of the spammer by just analysing the electronic trail. This paper will look at standard email tracing techniques and how email senders try and hide their electronic trail. The identity concealing techniques that that are discussed are: Spoofing, Bo...

متن کامل

Feedback Email Worm Defense System for Enterprise Networks

As email becomes one of the most convenient and indispensable communication mediums in our life, it is very important to protect email users from increasing email worm attacks. In this paper, we present the architecture and system design of a “feedback email worm defense system” to protect email users in enterprise networks. The defense system is flexible and able to integrate many existing det...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003