메뉴 건너뛰기




Volumn , Issue , 2010, Pages 207-222

Investigation of triangular spamming: A stealthy and efficient spamming technique

Author keywords

[No Author keywords available]

Indexed keywords

AS CONTENT; HIGH BANDWIDTH; IP PACKETS; NETWORK BEHAVIORS; NETWORK OPERATOR; PLANETLAB; PREVENTION METHODS; PROBING TECHNIQUES; SIGNIFICANT IMPACTS; SPAM SOURCES; SPAMMERS; TRAFFIC BLOCKING; WIDE AREA;

EID: 77955187093     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2010.42     Document Type: Conference Paper
Times cited : (15)

References (43)
  • 1
    • 84870704453 scopus 로고    scopus 로고
    • Adobe flash player. http://www.adobe.com/products/flashplayer/.
    • Adobe Flash Player
  • 4
    • 77955193186 scopus 로고    scopus 로고
    • version 6.3
    • Cisco pix 515e firewall quick start guide, version 6.3. http://www.ciscosystems.org.ro/en/US/docs/security/pix/pi x63/quick/guide/63- 515qk.html.
    • Cisco Pix 515e Firewall Quick Start Guide
  • 6
    • 77955206941 scopus 로고    scopus 로고
    • Hacking the interwebs. http://www.gnucitizen.org/blog/hacking- the- interwebs/.
    • Hacking the Interwebs
  • 11
    • 77955198231 scopus 로고    scopus 로고
    • 09-06
    • The new pOf 2.0.8 (2006-09-06). http://lcamtuf.coredump. cx/p0f.shtml.
    • (2006) The New POf 2.0.8
  • 13
    • 77955181537 scopus 로고    scopus 로고
    • Port 25 blocking. http://www.postcastserver.com/help/Port-25-Blocking. aspx.
  • 14
    • 77955190567 scopus 로고    scopus 로고
    • Port 25 (sonic.net). http://sonic.net/ support/faq/advanced/port-25. shtml.
  • 16
  • 17
    • 77955215725 scopus 로고    scopus 로고
    • Sorbs. http://www.au.sorbs.net/.
  • 18
    • 77955212742 scopus 로고    scopus 로고
    • Spamcop. http://www.spamcop.net/.
  • 19
    • 77955195028 scopus 로고    scopus 로고
    • Spamhaus. http://www.spamhaus.org/.
  • 22
    • 77955203366 scopus 로고    scopus 로고
    • Universal plug and play. http://en.wikipedia.org/wiki/Universal-Plug-and- Play/.
  • 26
    • 33750953387 scopus 로고    scopus 로고
    • Ingress filtering for multihomed networks
    • F. Baker and P. Savola. Ingress filtering for multihomed networks. In RFC 3704, 2004.
    • (2004) RFC , vol.3704
    • Baker, F.1    Savola, P.2
  • 27
    • 84877726988 scopus 로고    scopus 로고
    • Understanding the efficacy of deployed internet source address validation filtering
    • R. Beverly, A. Berger, Y. Hyun, and k claffy. Understanding the efficacy of deployed internet source address validation filtering. In In Proc. of IMC, 2009.
    • (2009) Proc. of IMC
    • Beverly, R.1    Berger, A.2    Hyun, Y.3    Claffy, K.4
  • 28
    • 0003334329 scopus 로고    scopus 로고
    • Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing
    • P. Ferguson and D. Senie. Network ingress filtering: Defeating denial of service attacks which employ ip source address spoofing. In RFC 2827, 2000.
    • (2000) RFC , pp. 2827
    • Ferguson, P.1    Senie, D.2
  • 30
    • 84904801371 scopus 로고    scopus 로고
    • An empirical study of clustering behavior of spammers and group-based anti-spam strategies
    • F. Li and M.-H. Hsieh. An empirical study of clustering behavior of spammers and group-based anti-spam strategies. In In Proc. of CEAS, 2006.
    • (2006) Proc. of CEAS
    • Li, F.1    Hsieh, M.-H.2
  • 32
    • 84904804565 scopus 로고    scopus 로고
    • An adaptive, semi-structured language model approach to spam filtering on a new corpus
    • July 2006
    • B. Medlock. An adaptive, semi-structured language model approach to spam filtering on a new corpus. In CEAS 2006 - Third Conference on Email and Anti-Spam, July 2006.
    • CEAS 2006 - Third Conference on Email and Anti-Spam
    • Medlock, B.1
  • 33
    • 85089726744 scopus 로고    scopus 로고
    • On network-level clusters for spam detection
    • Z. Qian, Z. M. Mao, Y. Xie, and F. Yu. On network-level clusters for spam detection. In In Proc. of NDSS, 2010.
    • (2010) Proc. of NDSS
    • Qian, Z.1    Mao, Z.M.2    Xie, Y.3    Yu, F.4
  • 36
    • 58149096147 scopus 로고    scopus 로고
    • Shades of grey: On the effectiveness of reputation-based blacklists
    • S. Sinha, M. Bailey, and F. Jahanian. Shades of Grey: On the Effectiveness of Reputation-based "Blacklists". In Malware 2008, 2008.
    • (2008) Malware 2008
    • Sinha, S.1    Bailey, M.2    Jahanian, F.3
  • 40
    • 42149099904 scopus 로고    scopus 로고
    • Towards network triangle inequality violation aware distributed systems
    • G. Wang, B. Zhang, and T. S. E. Ng. Towards network triangle inequality violation aware distributed systems. In In Proc. of IMC, 2007.
    • (2007) Proc. of IMC
    • Wang, G.1    Zhang, B.2    Ng, T.S.E.3
  • 41
    • 33947503628 scopus 로고    scopus 로고
    • Defense against spoofed ip traffic using hop-count filtering
    • H. Wang, C. Jin, and K. G. Shin. Defense against spoofed ip traffic using hop-count filtering. IEEE/ACM Trans. Netw., 2007.
    • (2007) IEEE/ACM Trans. Netw
    • Wang, H.1    Jin, C.2    Shin, K.G.3
  • 42
    • 47649085264 scopus 로고    scopus 로고
    • A multi-layer framework for puzzle-based denial-of-service defense
    • X. Wang and M. K. Reiter. A multi-layer framework for puzzle-based denial-of-service defense. Int. J. Inf. Secur., 2008.
    • (2008) Int. J. Inf. Secur.
    • Wang, X.1    Reiter, M.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.