Empirical research on IP blacklisting
نویسندگان
چکیده
This paper describes two innovative analysis methods for IPv4 address sets such as antispam blacklists. First, the contents analysis provides means of measuring key properties of any set of IPv4 addresses as well as revealing relationships between such sets. Second, the behavior analysis defines behavioral attributes of querying addresses and requested addresses. Furthermore, the behavior analysis provides an insight into the global email communication. These two analysis methods are applied and the empirical results are presented as part of this paper.
منابع مشابه
Identifying New Spam Domains by Hosting IPs: Improving Domain Blacklisting
This paper studies the possibility of using hosting IP addresses to identify potential spam domains. Current domain blacklisting may not be effective if spammers keep replacing blacklisted domains with newly registered domains. In this study, we cluster spam domains based on their hosting IP addresses and associated email subjects. We found some hosting IP addresses were heavily used by spammer...
متن کاملOn the Optimal Blacklisting Threshold for Link Selection in Wireless Sensor Networks
Empirical studies on link blacklisting show that the delivery rate is very sensitive to the calibration of the blacklisting threshold. If the calibration is too restrictive (the threshold is too high), all neighbors get blacklisted. On the other hand, if the calibration is too loose (the threshold is too low), unreliable links get selected. This paper investigates blacklisting analytically usin...
متن کاملProposal Title : Email Spam Detection using a Multi - Objective Memetic Algorithm
IP Address blacklisting [1, 2] works by storing a list of the origin of known spam and then ignoring further email sent from that IP address, under the assumption it is also spam. This approach has two problems: spammers are able to circumvent it by regularly switching IP addresses, and after spam has been sent from an IP address hijacked by a spammer, email sent by the unsuspecting computer us...
متن کاملA Survey of Anonymous Blacklisting Systems
Anonymous communications networks, such as Tor, help to solve the real and important problem of enabling users to communicate privately over the Internet. However, by doing so, they also introduce an entirely new problem: How can service providers on the Internet allow anonymous access while protecting themselves against abuse by misbehaving anonymous users? Recent research efforts have propose...
متن کاملImproving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation
Unsolicited bulk e-mail (UBE) or spam constitutes a significant fraction of all e-mail connection attempts and routinely frustrates users, consumes resources, and serves as an infection vector for malicious software. In an effort to scalably and effectively reduce the impact of these e-mails, e-mail system designers have increasingly turned to blacklisting. Blacklisting (blackholing, block list...
متن کامل