Filtering spam with behavioral blacklisting
Title | Filtering spam with behavioral blacklisting |
Publication Type | Conference Papers |
Year of Publication | 2007 |
Authors | Ramachandran A, Feamster N, Vempala S |
Conference Name | Proceedings of the 14th ACM conference on Computer and communications security |
Date Published | 2007/// |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-59593-703-2 |
Keywords | blacklists, botnets, clustering, Security, spam |
Abstract | Spam filters often use the reputation of an IP address (or IP address range) to classify email senders. This approach worked well when most spam originated from senders with fixed IP addresses, but spam today is also sent from IP addresses for which blacklist maintainers have outdated or inaccurate information (or no information at all). Spam campaigns also involve many senders, reducing the amount of spam any particular IP address sends to a single domain; this method allows spammers to stay "under the radar". The dynamism of any particular IP address begs for blacklisting techniques that automatically adapt as the senders of spam change. This paper presents SpamTracker, a spam filtering system that uses a new technique called behavioral blacklisting to classify email senders based on their sending behavior rather than their identity. Spammers cannot evade SpamTracker merely by using "fresh" IP addresses because blacklisting decisions are based on sending patterns, which tend to remain more invariant. SpamTracker uses fast clustering algorithms that react quickly to changes in sending patterns. We evaluate SpamTracker's ability to classify spammers using email logs for over 115 email domains; we find that SpamTracker can correctly classify many spammers missed by current filtering techniques. Although our current datasets prevent us from confirming SpamTracker's ability to completely distinguish spammers from legitimate senders, our evaluation shows that SpamTracker can identify a significant fraction of spammers that current IP-based blacklists miss. SpamTracker's ability to identify spammers before existing blacklists suggests that it can be used in conjunction with existing techniques (e.g., as an input to greylisting). SpamTracker is inherently distributed and can be easily replicated; incorporating it into existing email filtering infrastructures requires only small modifications to mail server configurations. |
URL | http://doi.acm.org/10.1145/1315245.1315288 |
DOI | 10.1145/1315245.1315288 |