SocialFilter: Collaborative Spam Mitigation using Social Networks

نویسندگان

  • Michael Sirivianos
  • Xiaowei Yang
  • Kyungbaek Kim
چکیده

Spam mitigation can be broadly classified into two main approaches: a) centralized security infrastructures that rely on a limited number of trusted monitors to detect and report malicious traffic; and b) highly distributed systems that leverage the experiences of multiple nodes within distinct trust domains. The first approach offers limited threat coverage and slow response times, and it is often proprietary. The second approach is not widely adopted, partly due to the lack of assurances regarding the trustworthiness of nodes that comprise the system. Our proposal, SocialFilter, aims to achieve the trustworthiness of centralized security services and the wide coverage, responsiveness and inexpensiveness of large-scale collaborative spam mitigation. We propose a large-scale distributed system that enables nodes with no email classification functionality to query the network on whether a host is a spammer. A SocialFilter node builds trust for its peers by auditing their reports on spamming hosts and by leveraging the social network of SocialFilter administrators. The node combines the confidence its peers have in their own spammer reports and the trust it places on its peers to derive the likelihood that a host is a spammer. The simulation-based evaluation of our approach indicates its potential under a real-world deployment: during a simulated spam campaign, SocialFilter nodes characterized 95% of spam connections with confidence greater than 50%, while yielding no false positives.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Introducing Social Trust to Collaborative Spam Mitigation

We propose SocialFilter, a trust-aware collaborative spam mitigation system. SocialFilter enables nodes with no email classification functionality to query the network on whether a host is a spammer. It employs Sybil-resilient trust inference to weigh the reports concerning spamming hosts that collaborating spam-detecting nodes (reporters) submit to the system. It weighs the spam reports accord...

متن کامل

FaceTrust: Collaborative Unwanted Traffic Mitigation Using Social Networks

Current unwanted traffic mitigation techniques are heavily reliant on centralized infrastructures and place trust on a small number of security authorities. As a result, they offer limited threat coverage and slow response times. To address this problem, we propose FaceTrust: a large scale collaborative system for the rapid propagation of reports concerning the behavior of Internet entities (ho...

متن کامل

FaceTrust: Collaborative Threat Mitigation Using Social Networks

Unwanted traffic mitigation can be broadly classified into two main approaches: a) centralized security infrastructures that rely on a limited number of trusted monitors to detect and report malicious traffic; and b) highly distributed systems that leverage the experiences of multiple nodes within distinct trust domains. The first approach offers limited threat coverage and slow response times....

متن کامل

Social Networks Privacy-Preserving On Collaborative Tagging and Spam Filter Using Naive Bayes Algorithm

Collaborative tagging is one of the most popular services available in social networks, and it allows user to classify either online or offline resources based on their feedback, deliver in the form of tags. Although tags may not be secret information the wide use of collaborative tagging services increases the risk, thereby seriously compromising user privacy. In this paper, we make a contribu...

متن کامل

Scalable and Reliable Collaborative Spam Filters: Harnessing the Global Social Email Networks

We introduce a collaborative anti-spam system that is based on pervasive global social email networks. Essentially, we provide a solution to this open research problem: given a network of N users who are willing to share information collaboratively (e.g. the digests or ngerprints of known spams), how do we search for each user's content e ciently and reliably in a distributed manner with minima...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/0908.3930  شماره 

صفحات  -

تاریخ انتشار 2009