메뉴 건너뛰기




Volumn , Issue , 2011, Pages 2300-2308

SocialFilter: Introducing social trust to collaborative spam mitigation

Author keywords

[No Author keywords available]

Indexed keywords

EMAIL CLASSIFICATION; FALSE POSITIVE; INFERENCE MECHANISM; MITIGATION SYSTEMS; SOCIAL NETWORKS; SPAMMERS; UNWANTED TRAFFIC;

EID: 79960882233     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2011.5935047     Document Type: Conference Paper
Times cited : (45)

References (45)
  • 1
    • 79960864279 scopus 로고    scopus 로고
    • Cloudmark. www.cloudmark.com/en/home.html.
  • 2
    • 79960863865 scopus 로고    scopus 로고
    • Cooperative Network Security Community
    • Cooperative Network Security Community. http://www.dshield.org/.
  • 4
    • 84887232333 scopus 로고    scopus 로고
    • developers.facebook.com/connect.php
    • Facebook connect. developers.facebook.com/connect.php.
    • Facebook Connect
  • 8
    • 79960856291 scopus 로고    scopus 로고
    • The SpamHaus Project. www.spamhaus.org/.
  • 11
    • 0038589165 scopus 로고    scopus 로고
    • The anatomy of a large-scale hypertextual web search engine
    • S. Brin and L. Page. The Anatomy of a Large-scale Hypertextual Web Search Engine. In Computer Networks and ISDN Systems, 1998.
    • (1998) Computer Networks and ISDN Systems
    • Brin, S.1    Page, L.2
  • 12
    • 84885797269 scopus 로고    scopus 로고
    • Sybilproof reputation mechanisms
    • A. Cheng and E. Friedman. Sybilproof Reputation Mechanisms. In P2PEcon, 2005.
    • (2005) P2PEcon
    • Cheng, A.1    Friedman, E.2
  • 13
    • 70349455970 scopus 로고    scopus 로고
    • Manipulability of pagerank under sybil strategies
    • A. Cheng and E. Friedman. Manipulability of PageRank under Sybil Strategies. In NetEcon, 2006.
    • (2006) NetEcon
    • Cheng, A.1    Friedman, E.2
  • 14
    • 85180633166 scopus 로고    scopus 로고
    • SybilInfer: Detecting sybil nodes using social networks
    • G. Danezis and P. Mittal. SybilInfer: Detecting Sybil Nodes using Social Networks. In NDSS, 2009.
    • (2009) NDSS
    • Danezis, G.1    Mittal, P.2
  • 15
    • 4544304744 scopus 로고    scopus 로고
    • The sybil attack
    • March
    • J. R. Douceur. The Sybil Attack. In IPTPS, March 2002.
    • (2002) IPTPS
    • Douceur, J.R.1
  • 16
    • 74549171828 scopus 로고    scopus 로고
    • Shibboleth architecture DRAFT v05
    • May
    • M. Erdos and S. Cantor. Shibboleth Architecture DRAFT v05. Internet2/MACE, May, 2, 2002.
    • (2002) Internet2/MACE , vol.2
    • Erdos, M.1    Cantor, S.2
  • 17
    • 78650115969 scopus 로고    scopus 로고
    • A walk in facebook: Uniform sampling of users in online social networks
    • M. Gjoka, M. Kurant, C. T. Butts, and A. Markopoulou. A Walk in Facebook: Uniform Sampling of Users in Online Social Networks. In IEEE INFOCOM, 2010.
    • (2010) IEEE INFOCOM
    • Gjoka, M.1    Kurant, M.2    Butts, C.T.3    Markopoulou, A.4
  • 18
    • 35248830148 scopus 로고    scopus 로고
    • Trust propagation in small worlds
    • Springer
    • E. Gray, J.-M. Seigneur, Y. Chen, and C. Jensen. Trust Propagation in Small Worlds. In LNCS, pages 239-254. Springer, 2003.
    • (2003) LNCS , pp. 239-254
    • Gray, E.1    Seigneur, J.-M.2    Chen, Y.3    Jensen, C.4
  • 21
    • 71649094416 scopus 로고    scopus 로고
    • A survey of attack and defense techniques for reputation systems
    • K. Hoffman, D. Zage, and C. Nita-Rotaru. A Survey of Attack and Defense Techniques for Reputation Systems. In ACM Computing Surveys, 2008.
    • (2008) ACM Computing Surveys
    • Hoffman, K.1    Zage, D.2    Nita-Rotaru, C.3
  • 22
    • 84880467894 scopus 로고    scopus 로고
    • The eigentrust algorithm for reputation management in P2P networks
    • S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The EigenTrust Algorithm for Reputation Management in P2P Networks. In WWW, 2003.
    • (2003) WWW
    • Kamvar, S.D.1    Schlosser, M.T.2    Garcia-Molina, H.3
  • 26
    • 29244436370 scopus 로고    scopus 로고
    • Taxonomy of trust: Categorizing P2P reputation systems
    • S. Marti and H. Garcia-Molina. Taxonomy of Trust: Categorizing P2P Reputation Systems. In Computer Networks, 2006.
    • (2006) Computer Networks
    • Marti, S.1    Garcia-Molina, H.2
  • 27
    • 45749135561 scopus 로고    scopus 로고
    • Ostra: Leveraging social networks to thwart unwanted traffic
    • A. Mislove, A. Post, P. Druschel, and K. P. Gummadi. Ostra: Leveraging Social Networks to Thwart Unwanted Traffic. In NSDI, 2008.
    • (2008) NSDI
    • Mislove, A.1    Post, A.2    Druschel, P.3    Gummadi, K.P.4
  • 29
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. In Computer Networks, 1999.
    • (1999) Computer Networks
    • Paxson, V.1
  • 30
    • 33750300419 scopus 로고    scopus 로고
    • Understanding the network-level behavior of spammers
    • A. Ramachandran and N. Feamster. Understanding the Network-level Behavior of Spammers. In ACM SIGCOMM, 2006.
    • (2006) ACM SIGCOMM
    • Ramachandran, A.1    Feamster, N.2
  • 32
    • 70449656128 scopus 로고    scopus 로고
    • Repuscore: Collaborative reputation management framework for email infrastructure
    • G. Singaraju and B. B. Kang. RepuScore: Collaborative Reputation Management Framework for Email Infrastructure. In USENIX LISA, 2007.
    • (2007) USENIX LISA
    • Singaraju, G.1    Kang, B.B.2
  • 33
    • 84904799723 scopus 로고    scopus 로고
    • Tracking email reputation for authenticated sender identities
    • G. Singaraju, J. Moss, and B. B. Kang. Tracking Email Reputation for Authenticated Sender Identities. In CEAS, 2008.
    • (2008) CEAS
    • Singaraju, G.1    Moss, J.2    Kang, B.B.3
  • 34
    • 85018515597 scopus 로고    scopus 로고
    • SocialFilter: Introducing social trust to collaborative spam mitigation
    • M. Sirivianos, K. Kim, and X. Yang. SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation. In USENIX CollSec, 2010.
    • (2010) USENIX CollSec
    • Sirivianos, M.1    Kim, K.2    Yang, X.3
  • 36
    • 77953306876 scopus 로고    scopus 로고
    • Predictive blacklisting as an implicit recommendation system
    • F. Soldo, A. Le, and A. Markopoulou. Predictive Blacklisting as an Implicit Recommendation System. In IEEE INFOCOM, 2010.
    • (2010) IEEE INFOCOM
    • Soldo, F.1    Le, A.2    Markopoulou, A.3
  • 37
    • 0001636850 scopus 로고
    • Kerberos: An authentication service for open network systems
    • J. G. Steiner, C. Neuman, and J. I. Schiller. Kerberos: An Authentication Service for Open Network Systems. In USENIX Winter, 1988.
    • (1988) USENIX Winter
    • Steiner, J.G.1    Neuman, C.2    Schiller, J.I.3
  • 39
    • 55149090014 scopus 로고    scopus 로고
    • Experience with an object reputation system for peer-to-peer filesharing
    • K. Walsh and E. G. Sirer. Experience with an Object Reputation System for Peer-to-Peer Filesharing. In NSDI, 2006.
    • (2006) NSDI
    • Walsh, K.1    Sirer, E.G.2
  • 40
    • 0032482432 scopus 로고    scopus 로고
    • Collective dynamics of small-world networks
    • D. J. Watts and S. H. Strogatz. Collective Dynamics of Small-World Networks. In Nature, 1998.
    • (1998) Nature
    • Watts, D.J.1    Strogatz, S.H.2
  • 42
    • 70449694823 scopus 로고    scopus 로고
    • A near-optimal social network defense against sybil attacks
    • H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao. A Near-Optimal Social Network Defense Against Sybil Attacks. In IEEE S&P, 2008.
    • (2008) IEEE S&P
    • Yu, H.1    Gibbons, P.2    Kaminsky, M.3    Xiao, F.4
  • 44
    • 51349149626 scopus 로고    scopus 로고
    • ALPACAS: A large-scale privacy-aware collaborative anti-spam system
    • Z. Zhong, L. Ramaswamy, and K. Li. ALPACAS: A Large-scale Privacy-Aware Collaborative Anti-spam System. In IEEE INFOCOM, 2008.
    • (2008) IEEE INFOCOM
    • Zhong, Z.1    Ramaswamy, L.2    Li, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.