Marsono, Muhammad Nadzir (2008) Spam control on middleboxes: Hardware architectural requirements and challenges. In: Advances In Embedded Systems. Penerbit UTM, Johor, pp. 97-116. ISBN 978-983-52-0653-5
Full text not available from this repository.
Spam constitutes approximately two-thirds of the e-mail traffic over the Internet (Goodman et al., 2005), and is continuously evolving and becoming much more sophisticated (Hayes, 2003). Spam results in more problems that mere annoyance of delayed and lost of non-spam e-mails (Twining et al., 2004). The association of spammers with hackers and virus writers pose a very real threat to the Internet availability and security (Newman et al., 2002; Levy, 2003). Approximately half or more of spam is now sent from compromised (zombie) systems distributed over the Internet (Levy, 2003). Spammers also extensively abuse E-mail service providers (ESPs) as if spam e-mails sent are sent from trusted ESPs. Middleboxes e.g. (Moscola et al., 2003) over the time have become an integral parts of the Internet architectures managing network operations. An example is firewalls that are widely deployed to secure enterprise networks, and block attacks to nodes or keep nodes from sending malicious traffic. Similarly, spam could be detected by classifying e-mails based on previously observed examples. Moreover, the author has shown that spam could be detected at the packet level (Marsono et al., 2009b). If spam detection capability could be incorporated on middleboxes, spam could be detected and contained more aggressively, and possibly closer to their sources.
|Item Type:||Book Section|
|Uncontrolled Keywords:||spam, hardware|
|Subjects:||Q Science > QA Mathematics > QA76 Computer software|
T Technology > T Technology (General)
|Deposited By:||Fazli Masari|
|Deposited On:||30 Jul 2012 04:11|
|Last Modified:||05 Feb 2017 01:13|
Repository Staff Only: item control page