Mitigating Spam Using Network-Level Features

Total Page:16

File Type:pdf, Size:1020Kb

Mitigating Spam Using Network-Level Features MITIGATING SPAM USING NETWORK-LEVEL FEATURES A Thesis Presented to The Academic Faculty by Anirudh V. Ramachandran In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in Computer Science School of Computer Science Georgia Institute of Technology August 2011 MITIGATING SPAM USING NETWORK-LEVEL FEATURES Approved by: Professor Nick Feamster, Advisor Professor Patrick Traynor School of Computer Science School of Computer Science Georgia Institute of Technology Georgia Institute of Technology Dr. Anirban Dasgupta Professor Kilian Weinberger Research Scientist Department of Computer Science and Yahoo! Research Engineering Washington University in St. Louis Professor Wenke Lee Date Approved: 20 May 2011 School of Computer Science Georgia Institute of Technology To mom and dad for their love, support, and encouragement. iii ACKNOWLEDGEMENTS Most of the good work that my name appears on is directly due to my advisor, Prof. Nick Feamster. Nick is one of those few professors bold enough to offer funding to a green first-year PhD with no experience in networking or security, solely on the basis of a 7001 mini-project—all before he even started at Tech. I am glad he took that chance. Nick taught me almost everything I know about picking problems, crafting clever solutions, and, just as importantly, presenting it well. I’m also grateful for his suggestions, insights, and much-needed nudges in the right direction, as well as his informal advising style (hurrah for open-ended 3 AM meetings!). Despite his brilliance, Nick is also one of the hardest-working people I know, and I strive to emulate his work ethic. I would also like to thank the rest of my committee. Prof. Wenke Lee’s courses were enlightening, and he has offered precise and constructive suggestions whenever I have had the fortune to bounce my ideas off of him. Prof. Patrick Traynor gave excellent comments on my drafts, and his “Destructive Research” course was one of the most interesting courses I have taken at Tech—his choice of readings showed how and why many crucial real-world security mechanisms are fundamentally broken. My external committee members, Dr. Anirban Dasgupta and Prof. Kilian Weinberger, hosted me at Yahoo! Research during my most enjoyable summer internship. They tolerated my limited knowledge of theory and made that summer a great experience: Kilian provided great Machine Learning advice and first suggested that I try clustering on voting data from Yahoo! Mail (which became the key idea behind Chapter 6). Anirban helped me explore the various nooks and crannies of the behemoth that is Yahoo! Mail, and provided solutions—both theory and code—the many times that I iv got stuck. Several other people have directly influenced my research. I’m grateful to the hosts of my previous internships and have learned a great deal from each: Prof. Scott Shenker of UC Berkeley for hosting me during summer 2006, and Dr. Balachander Krishnamurthy, Dr. Kobus van der Merwe, and Dr. Oliver Spatscheck of AT&T Re- search for summer 2007. I’m also lucky to have worked with Prof. Santosh Vempala; Santosh’s keen intellect and unquenchable enthusiasm for applying theoretical ideas to practical problems were awe-inspiring. I also thank my other collaborators over the years for all the discussions and insights—Kaushik Bhandankar, Atish Das Sarma, David Dagon, Shuang Hao, Hitesh Khandelwal, Yogesh Mundada, Srini Seetharaman, and Mukarram Tariq; though not everything resulted in publications, their ideas and thoughts have shaped my research. The research in this dissertation would not have been interesting without the underlying data itself being interesting; I thank David Mazi`eres for his spam trap data, Suresh Ramasubramanian for mail data from Out- blaze, David Dagon for traces of botnet activity and DNSBL lookups, and Xiaopeng Xi and Jay Pujara of the Yahoo! anti-spam team for their mail logs. My years at Tech would have been a lot less fun had it not been for the company of several people outside work. Thanks to my roommates over the years—Atish, Murtaza, Srikanth, and Yogesh—for the company and for putting up with me. I owe my sanity to labmates and local friends: Ahmed, Amogh, Atish, Bilal, Ilias, Manish, Millo, Mukarram, Partha, Ravi & Yarong, Ruomei, Saamer, Sai, and Srini. Amogh dutifully listened to my music recommendations though he probably hated most of them. Atish and I had some great conversations and I really enjoyed swapping crazy theories and startup ideas with him. Srini is generally awesome and has saved my skin so many times. Mukarram is one of the smartest people I have met and has been a constant source of inspiration. Of late, Ilias has provided excellent company, both for playing music and as a concert buddy. Thanks are also due to my mates from v Narmada Hostel and the 6th wing for all the good times and memories. My parents have been pillars of support all through my PhD, providing constant encouragement, advice, news from home, and a clearer view of my own priorities. I dedicate this dissertation to them. My sister Inku and brother-in-law Pramu have provided encouragement and advice from not-too-far-away, and have helped me un- wind after stressful periods so many times these past 6 years. Grandma has always been supportive and loving though I forget to call her for months on end. I am indebted to all of them. vi BIBLIOGRAPHIC NOTES Chapter 3 extends work from our paper “Understanding the Network-level Behav- ior of Spammers” [103] by adding newer longitudinal analyses. Chapter 4 contains material from the paper “Revealing Botnet Membership Using DNSBL Counter- Intelligence” [107]. Chapter 5 contains material from the paper “Filtering Spam with Behavioral Blacklisting” [108]. Chapter 6 contains material from the paper “Spam or Ham? Characterizing and Detecting Fraudulent Not Spam Reports in Webmail Systems” [102] that is under submission. Chapter 7 contains some material from the unpublished work “Spotting Spammers with a Dynamic Reputation System” [109] as well as new material. vii TABLE OF CONTENTS DEDICATION .................................. iii ACKNOWLEDGEMENTS .......................... iv PREFACE ..................................... vii LIST OF TABLES ............................... xiii LIST OF FIGURES .............................. xiv SUMMARY .................................... xvi 1 INTRODUCTION ............................. 1 1.1 Spam Filtering: Techniques and Challenges . 2 1.1.1 TypesofSpamFilters...................... 2 1.1.2 Problems with Spam Filtering . 4 1.2 ThesisStatement ............................ 8 1.3 Contributions .............................. 8 1.4 Roadmap................................. 10 2 BACKGROUND AND RELATED WORK ............. 14 2.1 SpammingMethods ........................... 14 2.1.1 DirectSpamming ........................ 14 2.1.2 OpenRelaysandProxies . .. .. 15 2.1.3 Spam Using Unorthodox BGP Route Announcements . 16 2.2 SpamfromBotnets ........................... 18 2.2.1 Direct Spamming to the Recipient . 19 2.2.2 Spamming via Webmail Services . 21 2.3 Mitigationtechniques .......................... 21 2.3.1 Content-based Filtering . 22 2.3.2 IP Blacklists . 23 2.3.3 Other Filtering Methods . 24 viii 2.3.4 Analysis of the Economics of Spam . 25 2.4 Related Work in Network-level Spam Filtering . 25 2.4.1 Characterization of Network-level Properties . 25 2.4.2 Network-level Spam Mitigation Techniques . 27 2.5 Where This Dissertation Fits in . 30 3 CHARACTERIZING THE NETWORK-LEVEL BEHAVIOR OF SPAMMERS ................................. 32 3.1 Introduction ............................... 32 3.2 DataCollection ............................. 36 3.2.1 SpamEmailTraces ....................... 37 3.2.2 Legitimate Email Traces . 40 3.2.3 BotnetCommandandControlData . 40 3.2.4 BGPRoutingMeasurements . 41 3.3 Network-level Characteristics of Spammers . 43 3.3.1 DistributionAcrossNetworks. 43 3.3.2 Distribution Across ASes and Countries . 49 3.3.3 SendingPatternsofSpammers . 52 3.3.4 The Effectiveness of Blacklists . 55 3.3.5 Message Size Distribution of Spam . 59 3.4 SpamfromBotnets ........................... 60 3.4.1 BobaxTopology ......................... 61 3.4.2 OperatingSystemsofSpammingHosts . 62 3.4.3 Spamming Bot Activity Profile . 63 3.5 Spam from Short-lived BGP Announcements . 69 3.5.1 BGP Spectrum Agility . 70 3.5.2 Prevalence of BGP Spectrum Agility . 74 3.5.3 How Much Spam from Spectrum Agility? . 75 3.6 LessonsforBetterSpamMitigation . 76 3.7 Summary................................. 78 ix 4 IDENTIFYING BOTNETS THAT PERFORM IP BLACKLIST RECONNAISSANCE ........................... 80 4.1 Introduction ............................... 80 4.2 Model of Reconnaiassance Techniques . 83 4.2.1 PropertiesofReconnaissanceQueries . 84 4.2.2 Reconnaissance Techniques . 86 4.3 DataandAnalysis............................ 88 4.3.1 Data Collection and Processing . 88 4.3.2 Analysis and Detection . 88 4.4 Preliminary Results . 90 4.5 Countermeasures............................. 92 4.6 Summary................................. 94 5 FILTERING SPAM USING BEHAVIORAL BLACKLISTING . 95 5.1 Introduction ............................... 95 5.2 Motivation ................................ 98 5.2.1 The Behavior of Spamming IP Addresses . 99 5.2.2 ThePerformanceofIP-BasedBlacklists . 102 5.2.3 The Case for Behavioral Blacklisting . 106 5.3 ClusteringAlgorithm .......................... 107 5.3.1 SpectralClustering . .. .. 107 5.3.2 SpamTracker: Clustering Email Senders . 108 5.4 Design .................................. 111 5.4.1
Recommended publications
  • Prospects, Leads, and Subscribers
    PAGE 2 YOU SHOULD READ THIS eBOOK IF: You are looking for ideas on finding leads. Spider Trainers can help You are looking for ideas on converting leads to Marketing automation has been shown to increase subscribers. qualified leads for businesses by as much as 451%. As You want to improve your deliverability. experts in drip and nurture marketing, Spider Trainers You want to better maintain your lists. is chosen by companies to amplify lead and demand generation while setting standards for design, You want to minimize your list attrition. development, and deployment. Our publications are designed to help you get started, and while we may be guilty of giving too much information, we know that the empowered and informed client is the successful client. We hope this white paper does that for you. We look forward to learning more about your needs. Please contact us at 651 702 3793 or [email protected] . ©2013 SPIDER TRAINERS PAGE 3 TAble Of cOnTenTS HOW TO cAPTure SubScriberS ...............................2 HOW TO uSe PAiD PrOGrAMS TO GAin Tipping point ..................................................................2 SubScriberS ...........................................................29 create e mail lists ...........................................................3 buy lists .........................................................................29 Pop-up forms .........................................................4 rent lists ........................................................................31 negative consent
    [Show full text]
  • Presentations Made by Senders
    SES ���� ��� � �� � � � � � � � ������������� DomainKeys ��������� SPF ��������������������� ���������� ����������������� ������������������������������������������������ Contents Introduction 3 Deployment: For Email Receivers 6 Audience 3 Two Sides of the Coin 6 How to Read this White Paper 3 Recording Trusted Senders Who Passed Authentication 6 A Vision for Spam-Free Email 4 Whitelisting Incoming Forwarders 6 The Problem of Abuse 4 What To Do About Forgeries 6 The Underlying Concept 4 Deployment: For ISPs and Enterprises 7 Drivers; or, Who’s Buying It 4 Complementary considerations for ISPs 7 Vision Walkthrough 5 Deployment: For MTA vendors 8 About Sender Authentication 8 Which specification? 8 An Example 8 Conformance testing 8 History 8 Perform SRS and prepend headers when forwarding 8 How IP-based Authentication Works 9 Add ESMTP support for Submitter 8 The SPF record 9 Record authentication and policy results in the headers 8 How SPF Classic Works 9 Join the developers mailing list 8 How Sender ID works 9 Deployment: For MUA vendors 9 How Cryptographic Techniques Work 0 Displaying Authentication-Results 9 Using Multiple Approaches Automatic switching to port 587 9 Reputation Systems Deployment: For ESPs 20 Deployment: For Email Senders 2 Don’t look like a phisher! 20 First, prepare. 2 Delegation 20 Audit Your Outbound Mailstreams 2 Publish Appropriately 20 Construct the record 2 Deployment: For Spammers 2 Think briefly about PRA and Mail-From contexts. 3 Two Types of Spammers 2 Test the record, part 3 Publish SPF and sign with DomainKeys. 2 Put the record in DNS 3 Stop forging random domains. 2 Test the record, part 2 4 Buy your own domains. 2 Keep Track of Violations 4 Reuse an expired domain.
    [Show full text]
  • Asian Anti-Spam Guide 1
    Asian Anti-Spam Guide 1 © MediaBUZZ Pte Ltd January 2009 Asian Anti-SpamHighlights Guide 2 • Combating the latest inbound threat: Spam and dark traffic, Pg. 13 • Secure Email Policy Best Practices, Pg. 17 • The Continuous Hurdle of Spam, Pg. 29 • Asian Anti Spam Acts, Pg. 42 Contents: • Email Spam: A Rising Tide 4 • What everyone should know about spam and privacy 7 • Scary Email Issues of 2008 12 • Combating the latest inbound threat: Spam and dark 13 • Proofpoint survey viewed spam as an increasing threat 16 • Secure Email Policy Best Practices 17 • Filtering Out Spam and Scams 24 • The Resurgence of Spam 26 • 2008 Q1 Security Threat landscape 27 • The Continuous Hurdle of Spam 29 • Spam Filters are Adaptive 30 • Liberating the inbox: How to make email safe and pro- 31 ductive again • Guarantee a clear opportunity to opt out 33 • The Great Balancing Act: Juggling Collaboration and 34 Authentication in Government IT Networks • The Not So Secret Cost of Spam 35 • How to Avoid Spam 36 • How to ensure your e-mails are not classified as spam 37 • Blue Coat’s Top Security Trends for 2008 38 • The Underground Economy 40 • Losing Email is No Longer Inevitable 42 • Localized malware gains ground 44 • Cyber-crime shows no signs of abating 45 MEDIABUZZ PTE LTD • Asian Anti-Spam Acts 47 ASIAN ANTI-SPAM GUIDE © MediaBUZZ Pte Ltd January 2009 Asian Anti-SpamHighlights Guide 3 • Frost & Sullivan: Do not underestimate spam, Pg. 65 • Unifying email security is key, Pg. 71 • The many threats of network security, Pg. 76 • The UTM story, Pg.
    [Show full text]
  • Taxonomy of Email Reputation Systems (Invited Paper)
    Taxonomy of Email Reputation Systems (Invited Paper) Dmitri Alperovitch, Paul Judge, and Sven Krasser Secure Computing Corporation 4800 North Point Pkwy Suite 400 Alpharetta, GA 30022 678-969-9399 {dalperovitch, pjudge, skrasser}@securecomputing.com Abstract strong incentive for people to act maliciously without paying reputational consequences [1]. While this Today a common goal in the area of email security problem can be solved by disallowing anonymity on is to provide protection from a wide variety of threats the Internet, email reputation systems are able to by being more predictive instead of reactive and to address this problem in a much more practical fashion. identify legitimate messages in addition to illegitimate By assigning a reputation to every email entity, messages. There has been previous work in the area of reputation systems can influence agents to operate email reputation systems that can accomplish these responsibly for fear of getting a bad reputation and broader goals by collecting, analyzing, and being unable to correspond with others [2]. distributing email entities' past behavior The goal of an email reputation system is to monitor characteristics. In this paper, we provide taxonomy activity and assign a reputation to an entity based on its that examines the required properties of email past behavior. The reputation value should be able to reputation systems, identifies the range of approaches, denote different levels of trustworthiness on the and surveys previous work. spectrum from good to bad. In 2000, Resnick et al. described Internet reputation system as having three 1. Introduction required properties [3]: • Entities are long lived, As spam volumes have continued to increase with • feedback about current interactions is high rates, comprising 90% of all email by the end of captured and distributed, and 2006 as determined by Secure Computing Research, • past feedback guides buyer decisions.
    [Show full text]
  • WHITE PAPER Email Deliverability Review
    WHITE PAPER Email DELIVeraBility REView dmawe are the White Paper Email Deliverability Review Published by Deliverability Hub of the Email Marketing Council Sponsored by 1 COPYRIGHT: THE DIRECT MARKETING ASSOCIATION (UK) LTD 2012 WHITE PAPER Email DELIVeraBility REView Contents About this document ...............................................................................................................................3 About the authors ...................................................................................................................................4 Sponsor’s perspective .............................................................................................................................5 Executive summary .................................................................................................................................6 1. Major factors that impact on deliverability ..............................................................................................7 1.1 Sender reputation .............................................................................................................................7 1.2 Spam filtering ...................................................................................................................................7 1.3 Blacklist operators ............................................................................................................................8 1.4 Smart Inboxes ..................................................................................................................................9
    [Show full text]
  • 84. Blog Spam Detection Using Intelligent Bayesian Approach
    International Journal of Engineering Research and General Science Volume 2, Issue 5, August-September, 2014 ISSN 2091-2730 Blog-Spam Detection Using intelligent Bayesian Approach - Krushna Pandit, Savyasaachi Pandit Assistant Professor, GCET, VVNagar, E-mail- [email protected] , M - 9426759947 Abstract Blog-spam is one of the major problems of the Internet nowadays. Since the history of the internet the spam are considered a huge threat to the security and reliability of web content. The spam is the unsolicited messages sent for the fulfillment of the sender’s purpose and to harm the privacy of user, site owner and/or to steal available resource over the internet (may be or may not be allocated to).For dealing with spam there are so many methodologies available. Nowadays the blog spamming is a rising threat to safety, reliability, & purity of the published internet content. Since the search engines are using certain specific algorithms for creating the searching page-index/rank for the websites (i.e. google-analytics), it has attracted so many attention to spam the SMS(Social Media Sites) for gaining rank in order to increase the company’s popularity. The available solutions to malicious content detection are quite a more to be used very frequently in order to fulfill the requirement of analyzing all the web content in certain time with least possible ―false positives‖. For this purpose a site level algorithm is needed so that it can be easy, cheap & understandable (for site modifiers) to filter and monitor the content being published. Now for that we use a ―Bayes Theorem‖ of the ―Statistical approach‖.
    [Show full text]
  • Studienbriefe-Spam.Pdf
    Spam [Spam] Autoren: Dr. Christopher Wolf Sebastian Uellenbeck Ruhr-Universität Bochum Modul Spam [Spam] Studienbrief 1: Grundlagen Studienbrief 2: Spam-Techniken Studienbrief 3: Anti-Spam-Techniken Autoren: Dr. Christopher Wolf Sebastian Uellenbeck 1. Auflage Ruhr-Universität Bochum © 2017 Ruhr-Universität Bochum Universitätsstraße 150 44801 Bochum 1. Auflage (30. Mai 2017) Didaktische und redaktionelle Bearbeitung: Bärbel Wolf-Gellatly Das Werk einschließlich seiner Teile ist urheberrechtlich geschützt. Jede Ver- wendung außerhalb der engen Grenzen des Urheberrechtsgesetzes ist ohne Zustimmung der Verfasser unzulässig und strafbar. Das gilt insbesondere für Vervielfältigungen, Übersetzungen, Mikroverfilmungen und die Einspei- cherung und Verarbeitung in elektronischen Systemen. Um die Lesbarkeit zu vereinfachen, wird auf die zusätzliche Formulierung der weiblichen Form bei Personenbezeichnungen verzichtet. Wir weisen des- halb darauf hin, dass die Verwendung der männlichen Form explizit als geschlechtsunabhängig verstanden werden soll. Das diesem Bericht zugrundeliegende Vorhaben wurde mit Mitteln des Bun- desministeriums für Bildung, und Forschung unter dem Förderkennzeichen 16OH12026 gefördert. Die Verantwortung für den Inhalt dieser Veröffentli- chung liegt beim Autor. Inhaltsverzeichnis Seite3 Inhaltsverzeichnis Einleitung zu den Studienbriefen5 I. Abkürzungen der Randsymbole und Farbkodierungen......... 5 II. Zu den Autoren.............................. 6 III. Modullehrziele.............................. 7 Studienbrief 1 Grundlagen9
    [Show full text]
  • CPA's Guide to Understanding and Controlling Spam Roman H
    University of Mississippi eGrove American Institute of Certified Public Accountants Guides, Handbooks and Manuals (AICPA) Historical Collection 1-1-2004 CPA's guide to understanding and controlling spam Roman H. Kepczyk American Institute of Certified Public Accountants. Information Technology Section Follow this and additional works at: https://egrove.olemiss.edu/aicpa_guides Part of the Accounting Commons, and the Taxation Commons Recommended Citation Kepczyk, Roman H. and American Institute of Certified Public Accountants. Information Technology Section, "CPA's guide to understanding and controlling spam" (2004). Guides, Handbooks and Manuals. 199. https://egrove.olemiss.edu/aicpa_guides/199 This Article is brought to you for free and open access by the American Institute of Certified Public Accountants (AICPA) Historical Collection at eGrove. It has been accepted for inclusion in Guides, Handbooks and Manuals by an authorized administrator of eGrove. For more information, please contact [email protected]. ISO Certified 091015 AMERICAN INSTITUTE OF CERTIFIED P UBLIC ACCOUNTANTS Information Spam and Controlling to Understanding A CPA’sGuide Technology Section Roman H . Kepczyk, CPA, CITP CPA, . Kepczyk, AMERICAN INSTITUTE OF CERTIFIED P UBLIC ACCOUNTANTS Information Spam and Controlling to Understanding A CPA’sGuide Technology Section Roman H . Kepczyk, CPA, CITP CPA, . Kepczyk, Controlling Spam.qxd 8/24/2004 9:41 AM Page ii Notice to Readers A CPA’s Guide to Understanding and Controlling Spam does not represent an official position of the American Institute of Certi- fied Public Accountants, and it is distributed with the under- standing that the author and the publisher are not rendering accounting or other professional services in the publication.
    [Show full text]
  • White & Black Listing: Other Uses Of
    White & Black Listing Other uses of DNS Join FIRST/TF-CSIRT Jan 20th 2009 RIGA Index • SMTP Blacklist • problems • White list implementation • Build your own reputation system • Blocking malicious domains About Red IRIS • Spanish Academic & Research Network • Interconnect 250 Universities & Research centers • Part of government company, red.es • IRIS-CERT, CSIRT inside RedIRIS E-mail working group at RedIRIS • Working group with Universities & Research center since 1993 http://www.rediris.es/mail • Trusted community developing different tools & usage guides. Quality metrics for email services . Evaluation of new technologies .etc. • Information also used by people outside Universities Black List • Old initiative to block incoming SMTP at: . TCP connection handshake . Initial SMTP dialogue . Firewall , before establishing the connection • Usually a list of “supposed” bad email senders • Almost all the SMTP solutions used some kind of black list • DNSBL • Most of the Blacklist used DNS for query protocol: . Easy to query ,similar to reverse IP address resolution” . Provides “caching” of the information in DNS servers. Easy to implement in the server code . All of the SMTP servers implements this feature. How to build a black List ? • From users: (spamcop, …): • Users denounce spam email received. • After some hits the sender IP is listed in the blacklist. • Problems: • Some user subscribed to mailing list and forgot about their subscriptions: Easier to say “this is spam” that try to be removed from some mailer servers. • Users usually fills any web based forms providing their email How to build a black list ? • Gathering information: . Block IP blocks from IP addresses that are residential / end users space Dynamic allocated users Static allocates users.
    [Show full text]
  • Rede Automatizada De Spamtraps
    Universidade do Minho Escola de Engenharia Pedro Jorge Barros Vasconcelos Guimarães Rede automatizada de spamtraps Outubro de 2011 Universidade do Minho Escola de Engenharia Pedro Jorge Barros Vasconcelos Guimarães Rede automatizada de spamtraps Dissertação de Mestrado Mestrado em Engenharia Informática Trabalho efectuado sob a orientação de Prof. Doutor António Luís Sousa Outubro de 2011 ii Declara¸c~ao Nome: Pedro Jorge Barros Vasconcelos Guimar~aes Endere¸coElectr´onico: [email protected] Telefone: 914486608 Bilhete de identidade: 13261663 T´ıtuloda Tese: Rede automatizada de spamtraps Orientador: Professor Doutor Ant´onioLu´ısSousa Ano de conclus~ao: 2011 Designa¸c~aodo Mestrado: Mestrado em Engenharia Inform´atica E´ AUTORIZADA A REPRODUC¸ AO~ INTEGRAL DESTA TESE APE- NAS PARA EFEITOS DE INVESTIGAC¸ AO,~ MEDIANTE DECLARAC¸ AO~ ESCRITA DO INTERESSADO, QUE A TAL SE COMPROMETE; Universidade do Minho, Maio de 2011 Assinatura: Who has time to manually spam web sites? That can't be very cost effective. Eric Cheng iv Agradecimentos Em primeiro lugar devo agradecer pelos preciosos conhecimentos t´ecnicosque me foram transmitidos pelo Nuno Pais Fernandes ao longo da fase de con- cep¸c~aoe desenvolvimento. As suas ideias e sugest~oesforam de um inestim´avel valor. Bastar´areal¸carque o projecto n~aoo seria sem a sua participa¸c~ao. Ao Professor Ant´onioLu´ısSousa que sempre me apontou o caminho indi- cado em termos acad´emicos,contribuindo com ideias valiosas para o projecto. A` equipa de suporte t´ecnico da Eurotux, em especial ao Duarte Rocha, Paulo Silva e Fernando Gomes, pelo tempo que dedicaram a elucidar-me sobre as mais variadas quest~oest´ecnicasrelacionadas com este projecto.
    [Show full text]
  • A Spam-Detecting Artificial Immune System By
    A Spam-Detecting Artificial Im m une System by Terri Oda A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfillment of the requirements for the degree of Master of Computer Science Ottawa-Carleton Institute for Computer Science School of Computer Science Carleton University Ottawa, Canada January, 2005 Copyright © 2005 Terri Oda Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. Library and Bibliotheque et 1*1 Archives Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A 0N4 Ottawa ON K1A 0N4 Canada Canada Your file Votre reference ISBN: 0-494-00764-8 Our file Notre reference ISBN: 0-494-00764-8 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library permettant a la Bibliotheque et Archives and Archives Canada to reproduce, Canada de reproduire, publier, archiver, publish, archive, preserve, conserve,sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par I'lnternet, preter, telecommunication or on the Internet,distribuer et vendre des theses partout dans loan, distribute and sell theses le monde, a des fins commerciales ou autres, worldwide, for commercial or non­ sur support microforme, papier, electronique commercial purposes, in microform, et/ou autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in et des droits moraux qui protege cette these. this thesis. Neither the thesis Ni la these ni des extraits substantiels de nor substantial extracts from it celle-ci ne doivent etre imprimes ou autrement may be printed or otherwise reproduits sans son autorisation.
    [Show full text]
  • What Are Spam Traps? And, How to Avoid Them?
    [Complete Guide] WHAT ARE SPAM TRAPS? AND, HOW TO AVOID THEM? netcorecloud.com What are Spam Traps? And, How to Avoid Them? Spam traps are everywhere, floating around the internet waiting for a small misstep or a set of bad behaviors ready to be triggered and make the email marketing even more difficult than it already is for you. With each passing day, spam traps are being used more prominently than ever to detect spammers. So it has become vital for the email marketers or any other organization sending emails in bulk, to know about the Spam Traps. This article covers most of the prominently asked questions about email Spam Traps and some tips on how to deal with them. Here is a list of set questions we will be going through: What are spam traps? Who creates and maintains spam traps? How many different kinds of email spam traps are there? How would spam traps affect me? How to identify spam traps? How does a spam trap end up in my email list? Being a valid email sender am I vulnerable to spam traps? Is there an online list of spam trap emails? How do I prevent myself from falling into spam traps?- What are Spam Traps? And, How to Avoid Them? What are Spam Traps? A Spamtrap is usually a bot email address, also known as email honeypot used to collect spam. These email addresses are not meant for regular communication but are instead used to catch hold of spammers. Spam trap email addresses are never directly visible or published on any website to ensure that legitimate users and email senders never get into this trap.
    [Show full text]