Pedro Henrique B. Las-Casas

  • Citations Per Year
Learn More
Even as the web 2.0 grows, e-mail continues to be one of the most used forms of communication in the Internet, being responsible for the generation of huge amounts of data. Spam traffic, for example, accounts for terabytes of data daily. It becomes necessary to create tools that are able to process these data efficiently, in large volumes, in order to(More)
Spam messages propagate malware, disseminate phishing exploits, and advertise illegal products. Those messages generate costs for users and network operators, but it's difficult to measure the costs associated with spam traffic and determine who actually pays for it. Here, the authors provide a method to quantify the transit costs of spam traffic,(More)
As the Internet grows, cybersecurity problems also arise. Different types of malicious activities have been explored by attackers. However, the existent defense mechanisms are not able to completely end the malicious threats, perpetuating this continuous arms race. The development of applications to mitigate those threats presents some complicating factors(More)
Despite the continuous efforts to mitigate spam, the volume of such messages continues to grow and identifying spammers is still a challenge. Spam traffic analysis is an important tool in this context, allowing network administrators to understand the behavior of spammers, both as they obfuscate messages and try to hide inside the network. This work adds to(More)
Spam messages are used to disseminate malware, make phishing attacks, and advertise illegal products. Spam generates costs to users, e.g., victims of phishing, and to network administrators, e.g., who provision and pay for the traffic. Recent proposals aim to identify and filter spam messages at the origin, restraining message propagation and reducing(More)
Despite the continuous efforts to mitigate spam, the volume of messages is huge and identifying spammers is still a challenge. Spam traffic analysis has been performed to determine the behavior of spammers, who are employing techniques more and more sophisticated to disseminate messages. This work analyzes the sources of spam towards understanding to what(More)
The large volume of unwanted email (spam) traffic wastes network resources. We have previously proposed SpaDeS, a method for spammer detection at the source network, which uses only network-layer metrics. We here present an extension of SpaDeS, focusing on its diversity and adaptability to new behavior patterns of spammers. To that end, we propose the use(More)
  • 1