Dynamically blocking access to web pages for spammers' harvesters
نویسندگان
چکیده
Almost all current anti spam measures are reactive, filtering being the most common. But to react means always to be one step behind. Reaction requires to predict the next action of the attacker. So the focus on fighting spam should rather be on prevention. Current proposals focus on fixing SMTP's lack of authentication, but introduce two new major problems: First, all current attempts break existing SMTP functionality and, second, it seems to be hardly possible to enforce a change of SMTP world wide. Therefore other preventive measures should be implemented. The most promising approach is to prevent spammers from collecting email addresses. Several proposals show ways to obfuscate addresses on web pages and to create HTTP tar pits in order to catch spammers' harvesters. In our previous work, we combined a HTTP tar pit with a SMTP tar pit and found it to be very effective in trapping harvesters. Here, we extend the use of the combined tar pit to identify harvesters and to dynamically block access to web pages for harvesters, because of the combined tar pit's high efficiency. We present a test setup to validate the effectiveness of our tool. As the experiment is still running, we can only report on preliminary findings so far.
منابع مشابه
Identifying Spammers by Their Resource Usage Patterns
Most studies on spam thus far have focused on its content or source. These types of studies, however, reveal little about the behavioral characteristics of spammers. In addition, privacy issues may prevent wide access to email content. In this paper, we try to identify spammers by investigating their resource usage patterns. Specifically, we look at usage patterns of harvesters, the bots that a...
متن کاملتشخیص ناهنجاری روی وب از طریق ایجاد پروفایل کاربرد دسترسی
Due to increasing in cyber-attacks, the need for web servers attack detection technique has drawn attentions today. Unfortunately, many available security solutions are inefficient in identifying web-based attacks. The main aim of this study is to detect abnormal web navigations based on web usage profiles. In this paper, comparing scrolling behavior of a normal user with an attacker, and simu...
متن کاملCombining SMTP and HTTP tar Pits to Proactively Reduce Spam
Unsolicited commercial emails (UCE, spam) are currently being fought using reactive methods, filtering being the most common. Reacting means to be always one step behind. So the focus on fighting spam should be on prevention. Current proposals focus on fixing SMTP's lack of authentication, but introduce two major problems: First of all current attempts break existing functionality and, second, ...
متن کاملAnalyzing the Popular Words to Evaluate Spam in Arabic Web Pages
The extensive expansion and use of the Web and the Internet comes at the price of seducing a number of intruders to utilize the Web for destructive purposes. In the scope of Websites and Web pages, spammers try to inject their own content and pages in Web sites and search engine search results to be more visible to users and attract users to their Websites or products. This paper analyses the b...
متن کاملSpam Blocking with a Dynamically Updated Firewall Ruleset
In this paper, we detail our methods for controlling spam at a small ISP, reducing both resource usage and customer complaints. We will discuss our initial unsuccessful tactics, and the resulting development of our unique spam blocking system. Deny-Spammers classifies hosts as probable spammers and inserts those hosts into a dynamically updated firewall ruleset on our mail server, thereby effec...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006