It’s known fact that malicious IP addresses are not evenly distributed over the IP addressing space. In this paper, we frame networks concentrating malicious addresses as bad neighborhoods. We propose a formal definition and show this concentration can be used to predict future attacks (new spamming sources, in our case), and propose an algorithm to aggregate individual IP addresses can bigger neighborhoods. Moreover, we show how bad neighborhoods are specific according to the exploited application (e.g., spam, ssh) and how the performance of different blacklist sources impacts lightweight spam filtering algorithms
It is well known that spam bots mostly utilize compromised machines with certain address characteris...
One of the most annoying problems on the Internet is spam. To fight spam, many approaches have been ...
Nowadays on the Internet, there is a huge and growing expanse of unsought traffic like phishing, spa...
It’s known fact that malicious IP addresses are not evenly distributed over the IP addressing space....
It's known fact that malicious IP addresses are not evenly distributed over the IP addressing space....
Analogous to the real world, sources of malicious activities on the Internet tend to be concentrated...
Analogous to the real world, sources of malicious activities on the Internet tend to be concentrated...
A significant part of current Internet attacks originates from hosts that are distributed all over t...
The distribution of malicious hosts over the IP address space is far from being uniform. In fact, ma...
A significant part of current attacks on the Internet comes from compromised hosts that, usually, ta...
Malicious hosts tend to be concentrated in certain areas of the IP addressing space, forming the so-...
Malicious hosts tend to be concentrated in certain areas of the IP addressing space, forming the so-...
Malicious hosts tend to be concentrated in certain areas of the IP addressing space, forming the so-...
Internet Bad Neighborhoods have proven to be an innovative approach for fighting spam. They have als...
This thesis seeks to use knowledge of Internet addressing to improve Internet security. Its goal is ...
It is well known that spam bots mostly utilize compromised machines with certain address characteris...
One of the most annoying problems on the Internet is spam. To fight spam, many approaches have been ...
Nowadays on the Internet, there is a huge and growing expanse of unsought traffic like phishing, spa...
It’s known fact that malicious IP addresses are not evenly distributed over the IP addressing space....
It's known fact that malicious IP addresses are not evenly distributed over the IP addressing space....
Analogous to the real world, sources of malicious activities on the Internet tend to be concentrated...
Analogous to the real world, sources of malicious activities on the Internet tend to be concentrated...
A significant part of current Internet attacks originates from hosts that are distributed all over t...
The distribution of malicious hosts over the IP address space is far from being uniform. In fact, ma...
A significant part of current attacks on the Internet comes from compromised hosts that, usually, ta...
Malicious hosts tend to be concentrated in certain areas of the IP addressing space, forming the so-...
Malicious hosts tend to be concentrated in certain areas of the IP addressing space, forming the so-...
Malicious hosts tend to be concentrated in certain areas of the IP addressing space, forming the so-...
Internet Bad Neighborhoods have proven to be an innovative approach for fighting spam. They have als...
This thesis seeks to use knowledge of Internet addressing to improve Internet security. Its goal is ...
It is well known that spam bots mostly utilize compromised machines with certain address characteris...
One of the most annoying problems on the Internet is spam. To fight spam, many approaches have been ...
Nowadays on the Internet, there is a huge and growing expanse of unsought traffic like phishing, spa...