Abstract
We introduce LENS (LEveraging social Networking and trust to prevent Spam transmission), a novel spam protection system which leverages the recipient’s social network to allow correspondence within the social network to directly pass to the mailbox of the recipient. To enable new senders to send emails, legitimate and authentic users, called GateKeepers (GKs), are selected from outside the recipient’s social circle and within predefined social distances. Our evaluations show that LENS provides each recipient reliable email delivery from a large fraction (up to 55% of entire userbase) of the social network; it is also effective and lightweight in accepting all the legitimate inbound emails in the real email traces. LENS imposes zero overhead for the common case of frequent and familiar senders, and remains lightweight for the general case. Our prototype implementation of LENS in Postfix/MailAvenger shows that LENS consumes up to 75% less CPU and 9% less memory as traditional solutions like SpamAssassin.
Similar content being viewed by others
References
Digital Software Development. Email address limit in webmail by providers [Online]. Available: http://www.emailaddressmanager.com/tips/email-address-limit.html.
Pingdom. Internet 2010 in numbers [Online]. Available: http://royal.pingdom.com/2011/01/12/internet-2010-in-numbers/.
SpamAssassin. Available: http://spamassassin.apache.org/.
Red Condor Inc. Tracking the high cost of spam [Online]. Available: http://www.redcondor.com/company/.
MessageLabs. (2005, Jul). MessageLabs intelligence report: Spam intercepts timeline [Online]. Available: http://www.messagelabs.co.uk/.
A. Back. (2002, Aug). Hashcash-A denial of service counter-measure [Online]. Avaible: http://www.hashcash.org/papers/hashcash.pdf.
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, “All your contacts are belong to us: Automated identity theft attacks on social networks,” in Proc. 18th Int. Conf. World Wide Web. New York: ACM, 2009, pp. 551–560.
P. O. Boykin and V. Roychowdhury, “Personal email networks: An effective anti-spam tool,” IEEE Computer, vol. 38, no. 4, pp. 61–68, Apr. 2005.
A. Chapanond, M. S. Krishnamoorthy, and B. Yener, “Graph theoretic and spectral analysis of Enron email data,” Comput. Math. Organ. Theory, vol. 11, no. 3, pp. 265–281, Oct. 2005.
P. A. Chirita, J. Diederich, and W. Nejdl, “Mailrank: Using ranking for spam detection,” in Proc. 14th ACM Int. Conf. Information and Knowledge Management (CIKM). New York: ACM, 2005, pp. 373–380.
D. Danchev. (2008). Inside India’s CAPTCHA solving economy [Online]. Available: http://blogs.zdnet.com/security/?p=1835.
C. Dwork and M. Naor, “Pricing via processing or combatting junk mail,” in Proc. 12th Annu. Int. Cryptology Conf Advances in Cryptology (CRYPTO). London: Springer, 1993, pp. 139–147.
H. Ebel, L.-I. Mielsch, and S. Bornholdt, “Scale-free topology of e-mail networks,” Phys. Rev. E, vol. 66, no. 3, pp. 035103(R), Sept. 2002.
S. Garriss, M. Kaminsky, M. J. Freedman, B. Karp, D. Mazières, and H. Yu, “Re: Reliable Email,” in Proc. 3rd Conf. Networked Systems Design & Implementation (NSDI), Berkeley, USA: USENIX Association, 2006, vol. 3, pp. 297–310.
S. Hameed, X. Fu, P. Hui, and N. Sastry, “LENS: Leveraging social networking and trust to prevent spam transmission,” in Proc. 19th IEEE Int. Conf. Network Protocols (ICNP), Vancouver, Canada, 2011, pp. 13–18.
S. Hameed, T. Kloht, and X. Fu, “iSATS: Leveraging identity based sender authentication for spam mitigation,” in Proc. Int. Conf. Security and Cryptography (SECRYPT), Rome, Italy, 2012, pp. 408–411.
S. Hao, N. A. Syed, N. Feamster, A. G. Gray, and S. Krasser, “Detecting spammers with SNARE: Spatiotemporal network-level automatic reputation engine,” in Proc. 18th Conf. USENIX Security Symposium (SSYM). Berkeley, USA: USENIX Association, 2009, pp.101–118.
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage, “Spamalytics: An empirical analysis of spam marketing conversion,” In Proc. 15th ACM Conf. Computer and Communications Security. New York: ACM, 2008, pp.3–14.
J. Klensin, “RFC 5321: Simple mail transfer protocol,” IETF, Oct. 2008.
K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Félegyházi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, et al. “Click trajectories: End-to-end analysis of the spam value chain,” in Proc. IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 2011. pp. 431–446.
Z. Li and H. Shen, “SOAP: A social network aided personalized and effective spam filter to clean your e-mail box,” in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 1835–1843.
A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. “Measurement and analysis of online social networks,” in Proc. 7th ACM SIGCOMM Conf. Internet Masurement (IMC). New York: ACM, 2007, pp.29–42.
A. Mislove, A. Post, P. Druschel, and KP Gummadi, “Ostra: Leveraging trust to thwart unwanted communication,” in Proc. 5th USENIX Symposium Networked Systems Design and Implementation (NSDI), Berkeley, USA: USENIX Association, 2008, pp. 15–30.
J. Shetty and J. Adibi, “The Enron email dataset: Database schema and brief statistical report,” Technical report, Information Sciences Institute, University of Southern California, 2004.
M. Sirivianos, K. Kim, and X. Yang, “SocialFilter: Introducing social trust to collaborative spam mitigation,” in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 2300–2308.
J. Travers and S. Milgram, “An experimental study of the small world problem,” Sociometry, vol. 32, no. 4, pp. 425–433, Dec. 1969.
C. Wilson, B. Boe, A. Sala, K. P. N. Puttaswamy, and B. Y. Zhao, “User interactions in social networks and their implications,” in Proc. 4th ACM European Conf. Computer Systems (EuroSys), 2009. New York: ACM, pp. 205–218.
M. W. Wong. (2005, Jul.). Sender authentication: What to do [Online]. Available: http://spf.pobox.com/whitepaper.pdf.
B. Wu and B. D. Davison, “Identifying link farm spam pages,” in Proc. Special Interest Tracks and Posters of 14th Int. Conf. World Wide Web. New York: ACM, 2005, pp. 820–829.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hameed, S., Fu, X., Sastry, N. et al. Fighting spam using social GateKeepers. Netw.Sci. 2, 28–41 (2013). https://doi.org/10.1007/s13119-013-0014-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13119-013-0014-6