Abstract
Spam is a significant problem in the day-to-day operations of large networks and information systems, as well as a common conduit for malicious software. The problem of detecting and eliminating spam remains of great interest, both commercially and in a research context. In this paper we present TRAP, a reputation-based open, decentralized and distributed system to aid in detecting unwanted e-mail. In TRAP, all participants are equal, all participants can see how the system works, and there is no reliance on any member or subset of members. This paper outlines the TRAP system itself and shows, through simulation, that the fundamental component of TRAP, a distributed low-overhead trust management system, is efficient and robust under the normal conditions present on the Internet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Distributed checksum clearinghouses, http://www.rhyolite.com/dcc
Chirita, P., Diederich, J., Nejdl, W.: MailRank: Using Ranking for Spam Detection. In: 14th ACM International Conference on Information and Knowledge Management, pp. 373–380. ACM, Bremen (2005)
Damiani, E., Vimercati, S.D.C.D., Paraboschi, S., Samarati, P.: P2P-Based Collaborative Spam Detection and Filtering. Peer-to-Peer Computing, pp. 176–183 (2004)
Douceur, J.R.: In: Druschel, P., Kaashoek, M.F., Rowstron, A.I.T. (eds.) The Sybil Attack: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp. 251–260. Springer, London (2002)
Duma, C., Karresand, M., Shahmehri, N., Caronni, G.: A Trust-Aware, P2P-Based Overlay for Intrusion Detection. In: 17th International Workshop on Database and Expert Systems Applications, pp. 692–697. Krakow, Poland (2006)
Duma, C., Shahmehri, N., Caronni, G.: Dynamic Trust Metrics for Peer-to-Peer Systems. In: Sixteenth International Workshop on Database and Expert Systems Applications, Copenhagen, Denmark, pp. 776–781 (2005)
Foukia, N., Zhou, L., Neuman, C.: Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail: Trust Management. In: Stølen, K., Winsborough, W., Martinelli, F., et al. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 77–92. Springer, Heidelberg (2006)
FreePastry, http://www.freepastry.org
Gong, Y., Chen, Q.: Research of Spam Filtering Based on Bayesian Algorithm. In: International Conference on Computer Application and System Modeling (ICCASM), Taiyuan, China, PP. V4-678–V4-680 (2010)
Gray, A., Haahr, M.: Personalised, Collaborative Spam Filtering. In: First Conference on Email and Anti-Spam, CA, USA (2004)
Hoffman, K., Zage, D., Nita-Rotaru, C.: A Survey of Attack and Defense Techniques for Reputation Systems. ACM Computing Surveys, 1:1–1:31 (2009)
Internet Traffic Report, http://www.internettrafficreport.com
Kong, J.S., Rezaei, B.A., Sarshar, N., Roychowdhury, V.P., Boykin, P.O.: Collaborative Spam Filtering using E-Mail Networks. Computer 39, 67–73 (2006)
Lee, Y., Kim, J.: Characterization of Large-Scale SMTP Traffic: The Coexistence of the Poisson Process and Self-Similarity. In: 2008 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS (2008)
Li, K., Zhong, Z., Ramaswamy, L.: Privacy-Aware Collaborative Spam Filtering. IEEE Transactions on Parallel and Distributed Systems 20, 725–739 (2009)
Measuring the popularity of SMTP server implementations on the Internet, http://www.stillhq.com/research/smtpsurveys_feb2010.html
McGibney, J., Botvich, D.: A Trust Based System for Enhanced Spam Filtering. Journal of Software 3, 55–64 (2008)
MAAWG: Messaging Anti-Abuse Working Group, http://www.maawg.org
Mills, D.: Network Time Protocol Version 4 Reference and Implementation Guide. Technical report (2006)
Milter.org, https://www.milter.org
Mo, G., Zhao, W., Cao, H., Dong, J.: Multi-Agent Interaction Based Collaborative P2P System for Fighting Spam. In: 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, Washington, DC, USA, pp. 428–431 (2007)
Postfix, http://www.postfix.org
Vipul’s Razor, http://razor.sourceforge.net
Rowstron, A.I.T., Druschel, P.: Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems. In: IFIP/ACM International Conference on Distributed Systems Platforms, pp. 329–350. Springer, Heidelberg (2001)
The Apache SpamAssassin Project, http://spamassassin.apache.org
A Reputation-Based Approach for Efficient Filtration of Spam, http://www.cloudmark.com
Wallach, D.S.: A survey of peer-to-peer security issues. In: Okada, M., Babu, C. S., Scedrov, A., Tokuda, H. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 42–57. Springer, Heidelberg (2003)
Xiong, L., Liu, L.: Peertrust: Supporting Reputation-Based Trust For Peer-To-Peer Electronic Communities. IEEE Transactions on Knowledge and Data Engineering 16, 843–857 (2004)
Zhou, F., Zhuang, L., Zhao, B.Y., Huang, L., Joseph, A.D., Kubiatowicz, J.: Approximate Object Location and Spam Filtering on Peer-to-Peer Systems. In: Endler, M., Schmidt, D.C. (eds.) Middleware 2003. LNCS, vol. 2672, pp. 1–20. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shahmehri, N., Byers, D., Hiran, R. (2011). TRAP: Open Decentralized Distributed Spam Filtering. In: Furnell, S., Lambrinoudakis, C., Pernul, G. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2011. Lecture Notes in Computer Science, vol 6863. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22890-2_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-22890-2_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22889-6
Online ISBN: 978-3-642-22890-2
eBook Packages: Computer ScienceComputer Science (R0)