[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1281100.1281182acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
Article

Trinitya: distributed defense against transient spam-bots

Published: 12 August 2007 Publication History

Abstract

Transient spam-bots are hijacked computers that are connected to the Internet for short periods of time, during which they send large amounts of spam. These spam-bots have become a principle source of spam; against which, static countermeasures such as DNS Black Lists are largely ineffective, and content-based filters provide temporary relief without ongoing tuning and upgrading---a never-ending cat-and-mouse game.
This is a brief overview of Trinity [1], a distributed, content independent, spam classification system that is specifically aimed at transient spam-bots. Trinity uses source identification in combination with a peer-to-peer based distributed database to identify and track transient spam-bots. Trinity's design load balances the task of tracking the transient spam-bots and provides a robust defense against denial-of-service and malevolent peer attacks.

References

[1]
Brodsky, A., and Brodsky, D. A distributed content independent method for spam detection. In 1st USENIX Workshop on Hot Topics in Understanding Botnet (2007).
[2]
Damiani, E., de Vimercati, S. D. C., and Samarati, P. P2P-based collaborative spam detection and filtering. In 4th IEEE Conference on P2P (2004).
[3]
Goodman, J. IP addresses in email clients. In 1st Conference on Email and Anti-Spam (2004).
[4]
Gray, A., and Haahr, M. Personalised, collaborative spam filtering. In 4th Conference on Email and Anti-Spam (2007).
[5]
Iverson, A. Dnsbl resource. http://www.dnsbl.com/, 2007.
[6]
Jung, J., and Sit, E. An empirical study of spam traffic and the use of DNS black lists. In 4th ACM SIGCOMM Conference on Internet Measurement (2004).
[7]
Kong, J., Boykiny, P., Rezaei, B., Sarshar, N., and Roychowdhury, V. Scalable and reliable collaborative spam filters: Harnessing the global social email networks. In 3rd Annual Workshop on the Weblogging Ecosystem: Aggregation, Analysis and Dynamics (2006).
[8]
Prakash, V. Vipul's Razor. http://razor.sf.net, 2007.
[9]
Ramachandran, A., Dagon, D., and Feamster, N. Can DNS-based blacklists keep up with bots? In 3rd Conference on Email and Anti-Spam (2006).
[10]
SpamAssassin. http://spamassassin.apache.org/, 2007.
[11]
SpamCop. http://www.spamcop.net/, 2007.
[12]
Spamhaus. http://www.spamhaus.org/, 2007.
[13]
Stoica, I., Morris, R., Karger, D., Kaashoek, F., and Balakrishnan, H. Chord: A scalable peer-to-peer lookup service for internet applications. In ACM SIGCOMM Conference (2001).
[14]
Vixie, P., and Rhyolite LLC. Distributed Checksum Clearinghouse. http://www.rhyolite.com/anti-spam/dcc/, 2007.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
PODC '07: Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
August 2007
424 pages
ISBN:9781595936165
DOI:10.1145/1281100
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 August 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. e-mail classification
  2. peer-to-peer

Qualifiers

  • Article

Conference

PODC07

Acceptance Rates

Overall Acceptance Rate 740 of 2,477 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media