4 research outputs found
Early detection of spam-related activity
Spam, the distribution of unsolicited bulk email, is a big security threat on the Internet. Recent studies show approximately 70-90% of the worldwide email traffic—about 70 billion messages a day—is spam. Spam consumes resources on the network and at mail servers, and it is also used to launch other attacks on users, such as distributing malware or phishing. Spammers have increased their virulence and resilience by sending spam from large collections of compromised machines (“botnets”). Spammers also make heavy use of URLs and domains to direct victims to point-of-sale Web sites, and miscreants register large number of domains to evade blacklisting efforts. To mitigate the threat of spam, users and network administrators need proactive techniques to distinguish spammers from legitimate senders and to take down online spam-advertised sites.
In this dissertation, we focus on characterizing spam-related activities and developing systems to detect them early. Our work builds on the observation that spammers need to acquire attack agility to be profitable, which presents differences in how spammers and legitimate users interact with Internet services and exposes detectable during early period of attack. We examine several important components across the spam life cycle, including spam dissemination that aims to reach users' inboxes, the hosting process during which spammers set DNS servers and Web servers, and the naming process to acquire domain names via registration services.
We first develop a new spam-detection system based on network-level features of spamming bots. These lightweight features allow the system to scale better and to be more robust. Next, we analyze DNS resource records and lookups from top-level domain servers during the initial stage after domain registrations, which provides a global view across the Internet to characterize spam hosting infrastructure. We further examine the domain registration process and present the unique registration behavior of spammers. Finally, we build an early-warning system to identify spammer domains at time-of-registration rather than later at time-of-use.
We have demonstrated that our detection systems are effective by using real-world datasets. Our work has also had practical impact. Some of the network-level features that we identified have since been incorporated into spam filtering products at Yahoo! and McAfee, and our work on detecting spammer domains at time-of-registration has directly influenced new projects at Verisign to investigate domain registrations.Ph.D
Future of the Internet--and how to stop it
vi, 342 p. : ill. ; 25 cmLibro ElectrĂłnicoOn January 9, 2007, Steve Jobs introduced the iPhone to an eager audience
crammed into San Francisco’s Moscone Center.1 A beautiful
and brilliantly engineered device, the iPhone blended three products
into one: an iPod, with the highest-quality screen Apple had ever produced;
a phone, with cleverly integrated functionality, such as voicemail
that came wrapped as separately accessible messages; and a device
to access the Internet, with a smart and elegant browser, and with
built-in map, weather, stock, and e-mail capabilities. It was a technical
and design triumph for Jobs, bringing the company into a market
with an extraordinary potential for growth, and pushing the industry
to a new level of competition in ways to connect us to each other and
to the Web.Includes bibliographical references (p. 249-328) and index
Acceso restringido a miembros del Consorcio de Bibliotecas Universitarias de AndalucĂa
Electronic reproduction. Palo Alto, Calif. : ebrary, 2009
Modo de acceso : World Wide Webpt. 1. The rise and stall of the generative Net --
Battle of the boxes --
Battle of the networks --
Cybersecurity and the generative dilemma --
pt. 2. After the stall --
The generative pattern --
Tethered appliances, software as service, and perfect enforcement --
The lessons of Wikipedia --
pt. 3. Solutions --
Stopping the future of the Internet : stability on a generative Net --
Strategies for a generative future --
Meeting the risks of generativity : Privacy 2.0.
Index32
Recommended from our members
The Future of the Internet and How to Stop It
This extraordinary book explains the engine that has catapulted the Internet from backwater to ubiquity—and reveals that it is sputtering precisely because of its runaway success. With the unwitting help of its users, the generative Internet is on a path to a lockdown, ending its cycle of innovation—and facilitating unsettling new kinds of control.
IPods, iPhones, Xboxes, and TiVos represent the first wave of Internet-centered products that can’t be easily modified by anyone except their vendors or selected partners. These “tethered appliances” have already been used in remarkable but little-known ways: car GPS systems have been reconfigured at the demand of law enforcement to eavesdrop on the occupants at all times, and digital video recorders have been ordered to self-destruct thanks to a lawsuit against the manufacturer thousands of miles away. New Web 2.0 platforms like Google mash-ups and Facebook are rightly touted—but their applications can be similarly monitored and eliminated from a central source. As tethered appliances and applications eclipse the PC, the very nature of the Internet—its “generativity,” or innovative character—is at risk.
The Internet’s current trajectory is one of lost opportunity. Its salvation, Zittrain argues, lies in the hands of its millions of users. Drawing on generative technologies like Wikipedia that have so far survived their own successes, this book shows how to develop new technologies and social structures that allow users to work creatively and collaboratively, participate in solutions, and become true “netizens.” The author has made an online version of this work available under a Creative Commons
Attribution-Noncommercial-Share Alike 3.0 License. It can be accessed through the author’s Web site at http://www.jz.org