Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Fighting spam using social GateKeepers

  • Research Article
  • Published:
Networking Science

Abstract

We introduce LENS (LEveraging social Networking and trust to prevent Spam transmission), a novel spam protection system which leverages the recipient’s social network to allow correspondence within the social network to directly pass to the mailbox of the recipient. To enable new senders to send emails, legitimate and authentic users, called GateKeepers (GKs), are selected from outside the recipient’s social circle and within predefined social distances. Our evaluations show that LENS provides each recipient reliable email delivery from a large fraction (up to 55% of entire userbase) of the social network; it is also effective and lightweight in accepting all the legitimate inbound emails in the real email traces. LENS imposes zero overhead for the common case of frequent and familiar senders, and remains lightweight for the general case. Our prototype implementation of LENS in Postfix/MailAvenger shows that LENS consumes up to 75% less CPU and 9% less memory as traditional solutions like SpamAssassin.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Digital Software Development. Email address limit in webmail by providers [Online]. Available: http://www.emailaddressmanager.com/tips/email-address-limit.html.

  2. Pingdom. Internet 2010 in numbers [Online]. Available: http://royal.pingdom.com/2011/01/12/internet-2010-in-numbers/.

  3. SpamAssassin. Available: http://spamassassin.apache.org/.

  4. Red Condor Inc. Tracking the high cost of spam [Online]. Available: http://www.redcondor.com/company/.

  5. MessageLabs. (2005, Jul). MessageLabs intelligence report: Spam intercepts timeline [Online]. Available: http://www.messagelabs.co.uk/.

  6. A. Back. (2002, Aug). Hashcash-A denial of service counter-measure [Online]. Avaible: http://www.hashcash.org/papers/hashcash.pdf.

    Google Scholar 

  7. L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, “All your contacts are belong to us: Automated identity theft attacks on social networks,” in Proc. 18th Int. Conf. World Wide Web. New York: ACM, 2009, pp. 551–560.

    Chapter  Google Scholar 

  8. P. O. Boykin and V. Roychowdhury, “Personal email networks: An effective anti-spam tool,” IEEE Computer, vol. 38, no. 4, pp. 61–68, Apr. 2005.

    Article  MathSciNet  Google Scholar 

  9. A. Chapanond, M. S. Krishnamoorthy, and B. Yener, “Graph theoretic and spectral analysis of Enron email data,” Comput. Math. Organ. Theory, vol. 11, no. 3, pp. 265–281, Oct. 2005.

    Article  MATH  Google Scholar 

  10. P. A. Chirita, J. Diederich, and W. Nejdl, “Mailrank: Using ranking for spam detection,” in Proc. 14th ACM Int. Conf. Information and Knowledge Management (CIKM). New York: ACM, 2005, pp. 373–380.

    Google Scholar 

  11. D. Danchev. (2008). Inside India’s CAPTCHA solving economy [Online]. Available: http://blogs.zdnet.com/security/?p=1835.

    Google Scholar 

  12. C. Dwork and M. Naor, “Pricing via processing or combatting junk mail,” in Proc. 12th Annu. Int. Cryptology Conf Advances in Cryptology (CRYPTO). London: Springer, 1993, pp. 139–147.

    Google Scholar 

  13. H. Ebel, L.-I. Mielsch, and S. Bornholdt, “Scale-free topology of e-mail networks,” Phys. Rev. E, vol. 66, no. 3, pp. 035103(R), Sept. 2002.

    Article  Google Scholar 

  14. S. Garriss, M. Kaminsky, M. J. Freedman, B. Karp, D. Mazières, and H. Yu, “Re: Reliable Email,” in Proc. 3rd Conf. Networked Systems Design & Implementation (NSDI), Berkeley, USA: USENIX Association, 2006, vol. 3, pp. 297–310.

    Google Scholar 

  15. S. Hameed, X. Fu, P. Hui, and N. Sastry, “LENS: Leveraging social networking and trust to prevent spam transmission,” in Proc. 19th IEEE Int. Conf. Network Protocols (ICNP), Vancouver, Canada, 2011, pp. 13–18.

  16. S. Hameed, T. Kloht, and X. Fu, “iSATS: Leveraging identity based sender authentication for spam mitigation,” in Proc. Int. Conf. Security and Cryptography (SECRYPT), Rome, Italy, 2012, pp. 408–411.

  17. S. Hao, N. A. Syed, N. Feamster, A. G. Gray, and S. Krasser, “Detecting spammers with SNARE: Spatiotemporal network-level automatic reputation engine,” in Proc. 18th Conf. USENIX Security Symposium (SSYM). Berkeley, USA: USENIX Association, 2009, pp.101–118.

    Google Scholar 

  18. C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage, “Spamalytics: An empirical analysis of spam marketing conversion,” In Proc. 15th ACM Conf. Computer and Communications Security. New York: ACM, 2008, pp.3–14.

    Chapter  Google Scholar 

  19. J. Klensin, “RFC 5321: Simple mail transfer protocol,” IETF, Oct. 2008.

    Google Scholar 

  20. K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Félegyházi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, et al. “Click trajectories: End-to-end analysis of the spam value chain,” in Proc. IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 2011. pp. 431–446.

    Google Scholar 

  21. Z. Li and H. Shen, “SOAP: A social network aided personalized and effective spam filter to clean your e-mail box,” in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 1835–1843.

  22. A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. “Measurement and analysis of online social networks,” in Proc. 7th ACM SIGCOMM Conf. Internet Masurement (IMC). New York: ACM, 2007, pp.29–42.

    Chapter  Google Scholar 

  23. A. Mislove, A. Post, P. Druschel, and KP Gummadi, “Ostra: Leveraging trust to thwart unwanted communication,” in Proc. 5th USENIX Symposium Networked Systems Design and Implementation (NSDI), Berkeley, USA: USENIX Association, 2008, pp. 15–30.

    Google Scholar 

  24. J. Shetty and J. Adibi, “The Enron email dataset: Database schema and brief statistical report,” Technical report, Information Sciences Institute, University of Southern California, 2004.

    Google Scholar 

  25. M. Sirivianos, K. Kim, and X. Yang, “SocialFilter: Introducing social trust to collaborative spam mitigation,” in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 2300–2308.

  26. J. Travers and S. Milgram, “An experimental study of the small world problem,” Sociometry, vol. 32, no. 4, pp. 425–433, Dec. 1969.

    Article  Google Scholar 

  27. C. Wilson, B. Boe, A. Sala, K. P. N. Puttaswamy, and B. Y. Zhao, “User interactions in social networks and their implications,” in Proc. 4th ACM European Conf. Computer Systems (EuroSys), 2009. New York: ACM, pp. 205–218.

  28. M. W. Wong. (2005, Jul.). Sender authentication: What to do [Online]. Available: http://spf.pobox.com/whitepaper.pdf.

    Google Scholar 

  29. B. Wu and B. D. Davison, “Identifying link farm spam pages,” in Proc. Special Interest Tracks and Posters of 14th Int. Conf. World Wide Web. New York: ACM, 2005, pp. 820–829.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sufian Hameed.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hameed, S., Fu, X., Sastry, N. et al. Fighting spam using social GateKeepers. Netw.Sci. 2, 28–41 (2013). https://doi.org/10.1007/s13119-013-0014-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13119-013-0014-6

Keywords

Navigation