SocialFilter: Collaborative Spam Mitigation using Social Networks
نویسندگان
چکیده
Spam mitigation can be broadly classified into two main approaches: a) centralized security infrastructures that rely on a limited number of trusted monitors to detect and report malicious traffic; and b) highly distributed systems that leverage the experiences of multiple nodes within distinct trust domains. The first approach offers limited threat coverage and slow response times, and it is often proprietary. The second approach is not widely adopted, partly due to the lack of assurances regarding the trustworthiness of nodes that comprise the system. Our proposal, SocialFilter, aims to achieve the trustworthiness of centralized security services and the wide coverage, responsiveness and inexpensiveness of large-scale collaborative spam mitigation. We propose a large-scale distributed system that enables nodes with no email classification functionality to query the network on whether a host is a spammer. A SocialFilter node builds trust for its peers by auditing their reports on spamming hosts and by leveraging the social network of SocialFilter administrators. The node combines the confidence its peers have in their own spammer reports and the trust it places on its peers to derive the likelihood that a host is a spammer. The simulation-based evaluation of our approach indicates its potential under a real-world deployment: during a simulated spam campaign, SocialFilter nodes characterized 95% of spam connections with confidence greater than 50%, while yielding no false positives.
منابع مشابه
Introducing Social Trust to Collaborative Spam Mitigation
We propose SocialFilter, a trust-aware collaborative spam mitigation system. SocialFilter enables nodes with no email classification functionality to query the network on whether a host is a spammer. It employs Sybil-resilient trust inference to weigh the reports concerning spamming hosts that collaborating spam-detecting nodes (reporters) submit to the system. It weighs the spam reports accord...
متن کاملFaceTrust: Collaborative Unwanted Traffic Mitigation Using Social Networks
Current unwanted traffic mitigation techniques are heavily reliant on centralized infrastructures and place trust on a small number of security authorities. As a result, they offer limited threat coverage and slow response times. To address this problem, we propose FaceTrust: a large scale collaborative system for the rapid propagation of reports concerning the behavior of Internet entities (ho...
متن کاملFaceTrust: Collaborative Threat Mitigation Using Social Networks
Unwanted traffic mitigation can be broadly classified into two main approaches: a) centralized security infrastructures that rely on a limited number of trusted monitors to detect and report malicious traffic; and b) highly distributed systems that leverage the experiences of multiple nodes within distinct trust domains. The first approach offers limited threat coverage and slow response times....
متن کاملSocial Networks Privacy-Preserving On Collaborative Tagging and Spam Filter Using Naive Bayes Algorithm
Collaborative tagging is one of the most popular services available in social networks, and it allows user to classify either online or offline resources based on their feedback, deliver in the form of tags. Although tags may not be secret information the wide use of collaborative tagging services increases the risk, thereby seriously compromising user privacy. In this paper, we make a contribu...
متن کاملScalable and Reliable Collaborative Spam Filters: Harnessing the Global Social Email Networks
We introduce a collaborative anti-spam system that is based on pervasive global social email networks. Essentially, we provide a solution to this open research problem: given a network of N users who are willing to share information collaboratively (e.g. the digests or ngerprints of known spams), how do we search for each user's content e ciently and reliably in a distributed manner with minima...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/0908.3930 شماره
صفحات -
تاریخ انتشار 2009