Using Low-Interaction Honeypots to Study the Abuse of Open Proxies to Send Spam

@inproceedings{ANDAMUDI2007UsingLH,
  title={Using Low-Interaction Honeypots to Study the Abuse of Open Proxies to Send Spam},
  author={ANDAMUDI and L. V. and IJAYKUMAR},
  year={2007}
}
  • ANDAMUDI, V. L., IJAYKUMAR
  • Published 2007
One of the main problems in creating effective mechanisms to mitigate the spam problem is the lack of more precise data on it. This paper describes the design and implementation of a honeypotbased architecture to study the abuse of open proxies to send spam. The sensors were installed in Brazilian broadband networks and they captured more than 500 million emails over a period of 15 months. In this paper we present the analysis of these data and describe some contributions to the spam capture… CONTINUE READING
8 Citations
19 References
Similar Papers

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-10 of 19 references

Spam, spam, spam, lovely spam

  • B. Hayes
  • American Scientist,
  • 2003
Highly Influential
4 Excerpts

Technical trends in phishing attacks. http://www.cert.org/archive/ pdf/Phishing_trends.pdf

  • J. Milletary
  • 2005
Highly Influential
3 Excerpts

Botnets as a vehicle for online crime

  • N. Ianelli, A. Hackworth
  • http://www.cert.org/ archive/pdf/Botnets.pdf,
  • 2005
1 Excerpt

Spam zombies and inbound flows to compromised customer systems

  • J. S. Sauver
  • In Procedings of the MAAWG General Meeting,
  • 2005
1 Excerpt

Similar Papers

Loading similar papers…