메뉴 건너뛰기




Volumn , Issue , 2011, Pages 431-446

Click trajectories: End-to-end analysis of the spam value chain

Author keywords

[No Author keywords available]

Indexed keywords

ADVERTIZING; ANTI-SPAM; END-TO-END ANALYSIS; HOLISTIC ANALYSIS; MEASUREMENTS OF; PHARMACEUTICAL PRODUCTS; SOFTWARE PRODUCTS; SPAM E-MAILS; SPAM FILTERING; VALUE CHAINS;

EID: 80051960199     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2011.24     Document Type: Conference Paper
Times cited : (196)

References (59)
  • 5
    • 84877759806 scopus 로고    scopus 로고
    • Geolocalization of proxied services and its application to fast-flux hidden servers
    • C. Castelluccia, M. A. Kaafar, P. Manils, and D. Perito. Geolocalization of Proxied Services and its Application to Fast-Flux Hidden Servers. In Proc. of 9th IMC, 2009.
    • (2009) Proc. of 9th IMC
    • Castelluccia, C.1    Kaafar, M.A.2    Manils, P.3    Perito, D.4
  • 6
    • 84904817958 scopus 로고    scopus 로고
    • How much did shutting down McColo help?
    • R. Clayton. How much did shutting down McColo help? In Proc. of 6th CEAS, 2009.
    • (2009) Proc. of 6th CEAS
    • Clayton, R.1
  • 7
    • 85177654650 scopus 로고    scopus 로고
    • Dancho Danchev's Blog - Mind Streams of Information Security Knowledge. The Avalanche Botnet and the TROYAK-AS Connection. http://ddanchev.blogspot.com/ 2010/05/avalanche-botnet-and-troyak-as.html, 2010.
    • (2010) The Avalanche Botnet and the TROYAK-AS Connection
  • 9
    • 84904807205 scopus 로고    scopus 로고
    • KaPoW webmail: Effective disincentives against spam
    • W. Feng and E. Kaiser. kaPoW Webmail: Effective Disincentives Against Spam. In Proc. of 7th CEAS, 2010.
    • (2010) Proc. of 7th CEAS
    • Feng, W.1    Kaiser, E.2
  • 10
    • 77952415099 scopus 로고    scopus 로고
    • An inquiry into the nature and causes of the wealth of internet miscreants
    • J. Franklin, V. Paxson, A. Perrig, and S. Savage. An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. In Proc. of 14th ACM CCS, 2007.
    • (2007) Proc. of 14th ACM CCS
    • Franklin, J.1    Paxson, V.2    Perrig, A.3    Savage, S.4
  • 11
    • 85177659579 scopus 로고    scopus 로고
    • Gamblingplanet.org
    • Gamblingplanet.org. Visa blocks gaming transactions for US players. http://www.gamblingplanet.org/news/Visa-blocks-gaming-transactions-for-US- players/022310, 2010.
    • (2010) Visa Blocks Gaming Transactions for US Players
  • 13
    • 85175133385 scopus 로고    scopus 로고
    • BotSniffer: Detecting botnet command and control channels in network traffic
    • G. Gu, J. Zhang, and W. Lee. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. In Proc. of 15th NDSS, 2008.
    • (2008) Proc. of 15th NDSS
    • Gu, G.1    Zhang, J.2    Lee, W.3
  • 15
    • 81255149250 scopus 로고    scopus 로고
    • Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy
    • C. Herley and D. Florencio. Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy. In Proc. of 8th WEIS, 2009.
    • (2009) Proc. of 8th WEIS
    • Herley, C.1    Florencio, D.2
  • 16
    • 78649809598 scopus 로고    scopus 로고
    • Learning more about the underground economy: A case-study of keyloggers and dropzones
    • T. Holz, M. Engelberth, and F. Freiling. Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones. In Proc. of 15th ESORICS, 2009.
    • (2009) Proc. of 15th ESORICS
    • Holz, T.1    Engelberth, M.2    Freiling, F.3
  • 18
    • 84908346958 scopus 로고    scopus 로고
    • RB-seeker: Auto-detection of redirection botnets
    • X. Hu, M. Knysz, and K. G. Shin. RB-Seeker: Auto-detection of Redirection Botnets. In Proc. of 16th NDSS, 2009.
    • (2009) Proc. of 16th NDSS
    • Hu, X.1    Knysz, M.2    Shin, K.G.3
  • 23
    • 85177681505 scopus 로고    scopus 로고
    • Krebs on Security. Body Armor for Bad Web Sites. http://krebsonsecurity. com/2010/11/body-armor-for-bad-web-sites/, 2010.
    • (2010) Body Armor for Bad Web Sites
  • 31
    • 80051956263 scopus 로고    scopus 로고
    • M86 Security Labs. Top Spam Affiliate Programs. http://www.m86security. com/labs/traceitem.asp?article=1070, 2009.
    • (2009) Top Spam Affiliate Programs
  • 32
    • 71149108237 scopus 로고    scopus 로고
    • Identifying suspicious URLs: An application of large-scale online learning
    • J. Ma, L. K. Saul, S. Savage, and G. M. Voelker. Identifying Suspicious URLs: An Application of Large-Scale Online Learning. In Proc. of 26th ICML, 2009.
    • (2009) Proc. of 26th ICML
    • Ma, J.1    Saul, L.K.2    Savage, S.3    Voelker, G.M.4
  • 34
    • 78751501312 scopus 로고    scopus 로고
    • This is your data on drugs: Lessons computer security can learn from the drug war
    • D. Molnar, S. Egelman, and N. Christin. This Is Your Data on Drugs: Lessons Computer Security Can Learn From The Drug War. In Proc. of 13th NSPW, 2010.
    • (2010) Proc. of 13th NSPW
    • Molnar, D.1    Egelman, S.2    Christin, N.3
  • 35
    • 45949085773 scopus 로고    scopus 로고
    • The impact of incentives on notice and take-down
    • T. Moore and R. Clayton. The Impact of Incentives on Notice and Take-down. In Proc. of 7th WEIS, 2008.
    • (2008) Proc. of 7th WEIS
    • Moore, T.1    Clayton, R.2
  • 38
    • 85177681328 scopus 로고    scopus 로고
    • A. Mutton. Screengrab! http://www.screengrab.org/, 2010.
    • (2010)
    • Mutton, A.1
  • 39
    • 84893520306 scopus 로고    scopus 로고
    • A quantitative study of forum spamming using context-based analysis
    • Y. Niu, Y.-M. Wang, H. Chen, M. Ma, and F. Hsu. A Quantitative Study of Forum Spamming Using Context-based Analysis. In Proc. of 14th NDSS, 2007.
    • (2007) Proc. of 14th NDSS
    • Niu, Y.1    Wang, Y.-M.2    Chen, H.3    Ma, M.4    Hsu, F.5
  • 40
    • 85084096629 scopus 로고    scopus 로고
    • Tumbling down the rabbit hole: Exploring the idiosyncrasies of botmaster systems in a multi-tier botnet infrastructure
    • C. Nunnery, G. Sinclair, and B. B. Kang. Tumbling Down the Rabbit Hole: Exploring the Idiosyncrasies of Botmaster Systems in a Multi-Tier Botnet Infrastructure. In Proc. of 3rd USENIX LEET, 2010.
    • (2010) Proc. of 3rd USENIX LEET
    • Nunnery, C.1    Sinclair, G.2    Kang, B.B.3
  • 42
    • 77950795817 scopus 로고    scopus 로고
    • Detecting malicious flux service networks through passive analysis of recursive DNS traces
    • R. Perdisci, I. Corona, D. Dagon, and W. Lee. Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces. In Proc. of 25th ACSAC, 2009.
    • (2009) Proc. of 25th ACSAC
    • Perdisci, R.1    Corona, I.2    Dagon, D.3    Lee, W.4
  • 47
    • 58149096147 scopus 로고    scopus 로고
    • Shades of grey: On the effectiveness of reputation-based "blacklists,"
    • S. Sinha, M. Bailey, and F. Jahanian. Shades of Grey: On the effectiveness of reputation-based "blacklists". In Proc. of 3rd MALWARE, 2008.
    • (2008) Proc. of 3rd MALWARE
    • Sinha, S.1    Bailey, M.2    Jahanian, F.3
  • 48
    • 84968706754 scopus 로고    scopus 로고
    • Improving SPAM blacklisting through dynamic thresholding and speculative aggregation
    • S. Sinha, M. Bailey, and F. Jahanian. Improving SPAM Blacklisting through Dynamic Thresholding and Speculative Aggregation. In Proc. of 17th NDSS, 2010.
    • (2010) Proc. of 17th NDSS
    • Sinha, S.1    Bailey, M.2    Jahanian, F.3
  • 53
    • 35348904515 scopus 로고    scopus 로고
    • Spam double-funnel: Connecting web spammers with advertisers
    • Y.-M. Wang, M. Ma, Y. Niu, and H. Chen. Spam Double-Funnel: Connecting Web Spammers with Advertisers. In Proc. of 16th WWW, 2007.
    • (2007) Proc. of 16th WWW
    • Wang, Y.-M.1    Ma, M.2    Niu, Y.3    Chen, H.4
  • 55
    • 85006397404 scopus 로고    scopus 로고
    • Large-scale automatic classification of phishing pages
    • C. Whittaker, B. Ryner, and M. Nazif. Large-Scale Automatic Classification of Phishing Pages. In Proc. of 17th NDSS, 2010.
    • (2010) Proc. of 17th NDSS
    • Whittaker, C.1    Ryner, B.2    Nazif, M.3
  • 57
    • 12744250266 scopus 로고    scopus 로고
    • An evaluation of statistical spam filtering techniques
    • L. Zhang, J. Zhu, and T. Yao. An Evaluation of Statistical Spam Filtering Techniques. ACM Trans. on ALIP, 3(4), 2004.
    • (2004) ACM Trans. on ALIP , vol.3 , Issue.4
    • Zhang, L.1    Zhu, J.2    Yao, T.3
  • 59
    • 77950621688 scopus 로고    scopus 로고
    • Studying malicious websites and the underground economy on the Chinese web
    • J. Zhuge, T. Holz, C. Song, J. Guo, X. Han, and W. Zou. Studying Malicious Websites and the Underground Economy on the Chinese Web. In Proc. of 7th WEIS, 2008.
    • (2008) Proc. of 7th WEIS
    • Zhuge, J.1    Holz, T.2    Song, C.3    Guo, J.4    Han, X.5    Zou, W.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.