Skip to main content

Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise?

  • Conference paper
Passive and Active Measurement (PAM 2011)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 6579))

Included in the following conference series:

Abstract

Previous work has shown that the network dynamics experienced by both the initial packet and an entire connection carrying an email can be leveraged to classify the email as spam or ham. In the case of packet properties, the prior work has investigated their efficacy based on models of traffic collected from around the world. In this paper, we first revisit the techniques when only using information from a single enterprise’s vantage point and find packet properties to be less useful. We also show that adding flow characteristics to a model of packet features adds modest discriminating power, and some flow features’ information is captured by packet features.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Crm114 - the controllable regex mutilator, http://crm114.sourceforge.net/

  2. SpamAssassin, http://spamassassin.apache.org/

  3. Allman, E., Callas, J., Delany, M., Libbey, M., Fenton, J., Thomas, M.: Domain-Based Email Authentication Using Public Keys Advertised in the DNS (DomainKeys) (May 2007) RF 4871

    Google Scholar 

  4. Beverly, R., Sollins, K.: Exploiting Transport-Level Characteristics of Spam. In: 5th Conference on Email and Anti-Spam (August 2008)

    Google Scholar 

  5. Burton, B.: SpamProbe, http://spamprobe.sourceforge.net/

  6. Cormack, G., Lynam, T.: TREC Public Spam Corpus (2007), http://plg.uwaterloo.ca/~gvcormac/treccorpus07/

  7. Friedman, J.H., Popescu, B.E.: Predictive learning via rule ensembles. Annals of Applied Statistics 2(3), 916–954 (2008)

    Article  MATH  Google Scholar 

  8. Gomes, L.H., Cazita, C., Almeida, J.M., Almeida, V.A.F., Meira Jr., W.: Characterizing a spam traffic. In: IMC, pp. 356–369 (2004)

    Google Scholar 

  9. Hao, S., Feamster, N.: Personal Communication (2010)

    Google Scholar 

  10. Hao, S., Syed, N.A., Feamster, N., Gray, A.G., Krasser, S.: Detecting spammers with SNARE: Spatio-temporal network-level automatic reputation engine. In: Usenix Security Symp. (2009)

    Google Scholar 

  11. MaxMind, http://www.maxmind.com

  12. Meyer, T., Whateley, B.: SpamBayes: Effective Open-Source, Bayesian Based, Email classification System. In: Proc. First Conference on Email and Anti-Spam (June 2004)

    Google Scholar 

  13. Ouyang, T., Ray, S., Allman, M., Rabinovich, M.: A Large-Scale Empirical Analysis of Email Spam Detection Through Transport-Level Characteristics. Technical Report 10-001, International Computer Science Institute (January 2010)

    Google Scholar 

  14. Paxson, V.: Bro: A System for Detecting Network Intruders in Real-Time. In: Proceedings of the 7th USENIX Security Symposium (January 1998)

    Google Scholar 

  15. Provost, F., Fawcett, T., Kohavi, R.: The case against accuracy estimation for comparing induction algorithms. In: 15th Int. Conf. on Machine Learning, pp. 445–453 (1998)

    Google Scholar 

  16. Quinlan, J.: C4.5: Programs for Machine Learning. Morgan Kaufmann, San Francisco (1993)

    Google Scholar 

  17. Ramachandran, A., Feamster, N.: Understanding the Network-Level Behavior of Spammers. In: ACM SIGCOMM (2006)

    Google Scholar 

  18. Witten, I.H., Frank, E.: Data Mining: Practical machine learning tools and techniques, 2nd edn. Morgan Kaufmann, San Francisco (2005)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ouyang, T., Ray, S., Rabinovich, M., Allman, M. (2011). Can Network Characteristics Detect Spam Effectively in a Stand-Alone Enterprise?. In: Spring, N., Riley, G.F. (eds) Passive and Active Measurement. PAM 2011. Lecture Notes in Computer Science, vol 6579. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19260-9_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19260-9_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19259-3

  • Online ISBN: 978-3-642-19260-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics