This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persistent (in time) each spamming host is, botnet spamming characteristics, and techniques for harvesting email addresses. This paper studies these questions by analyzing an 18-month trace of over 10 million spam messages collected at one Internet "spam sinkhole", and by correlating these messages with the results of IP-based blacklist lookups, passive TCP fingerprinting information, routing information, and botnet "command and control" traces. We find that a small, yet non-negligible, amount of spam is received from IP addresses that correspond to short-li...
A spammer needs three elements to run a spam operation: a list of victim email addresses, content to...
The increasing impact of the Internet in the global economy has transformed Botnets into one of the ...
Spam filters often use the reputation of an IP address (or IP address range) to classify email sende...
This paper studies the network-level behavior of spammers, including: IP address ranges that send th...
This paper studies the network-level behavior of spammers, including: IP address ranges that send th...
Abstract—Has the behavior of spammers changed over the last few years? To answer this question, we c...
Has the behavior of spammers changed over the last few years? To answer this question, we conduct a ...
Spam, the distribution of unsolicited bulk email, is a big security threat on the Internet. Recent s...
Abstract—It is well known that spam bots mostly utilize com-promised machines with certain address c...
Compromised computers, known as bots, are the major source of spamming. Detecting them can help grea...
It is well known that spam bots mostly utilize compromised machines with certain address characteris...
Spam is an increasing menace in email: 90% of email is spam, and over 90% of spam is sent by botnets...
Spam is an increasing menace in email: 90% of email is spam, and over 90% of spam is sent by botnets...
Compromised computers, known as bots, are the major source of spamming and their detection helps gre...
A spammer needs three elements to run a spam operation: a list of victim email addresses, content to...
A spammer needs three elements to run a spam operation: a list of victim email addresses, content to...
The increasing impact of the Internet in the global economy has transformed Botnets into one of the ...
Spam filters often use the reputation of an IP address (or IP address range) to classify email sende...
This paper studies the network-level behavior of spammers, including: IP address ranges that send th...
This paper studies the network-level behavior of spammers, including: IP address ranges that send th...
Abstract—Has the behavior of spammers changed over the last few years? To answer this question, we c...
Has the behavior of spammers changed over the last few years? To answer this question, we conduct a ...
Spam, the distribution of unsolicited bulk email, is a big security threat on the Internet. Recent s...
Abstract—It is well known that spam bots mostly utilize com-promised machines with certain address c...
Compromised computers, known as bots, are the major source of spamming. Detecting them can help grea...
It is well known that spam bots mostly utilize compromised machines with certain address characteris...
Spam is an increasing menace in email: 90% of email is spam, and over 90% of spam is sent by botnets...
Spam is an increasing menace in email: 90% of email is spam, and over 90% of spam is sent by botnets...
Compromised computers, known as bots, are the major source of spamming and their detection helps gre...
A spammer needs three elements to run a spam operation: a list of victim email addresses, content to...
A spammer needs three elements to run a spam operation: a list of victim email addresses, content to...
The increasing impact of the Internet in the global economy has transformed Botnets into one of the ...
Spam filters often use the reputation of an IP address (or IP address range) to classify email sende...