Spam Trapping System: Novel security framework to fight against spam botnets

Derhab,A, Bouras,A, Muhaya,FB, Khan,MK and Xiang,Y 2014, Spam Trapping System: Novel security framework to fight against spam botnets, in ICT 2014 : Cooperation for a United World : Proceedings of the 21st International Conference on Telecommunications, IEEE, Piscataway, N. J., pp. 467-471, doi: 10.1109/ICT.2014.6845160.

Attached Files
Name Description MIMEType Size Downloads

Title Spam Trapping System: Novel security framework to fight against spam botnets
Author(s) Derhab,A
Bouras,A
Muhaya,FB
Khan,MK
Xiang,YORCID iD for Xiang,Y orcid.org/0000-0001-5252-0831
Conference name International Conference on Telecommunications (2014 : Lisbon, Portugal)
Conference location Lisbon, Portugal
Conference dates 2014/5/4 - 2014/5/7
Title of proceedings ICT 2014 : Cooperation for a United World : Proceedings of the 21st International Conference on Telecommunications
Editor(s) [Unknown]
Publication date 2014
Conference series International Conference on Telecommunications
Start page 467
End page 471
Total pages 5
Publisher IEEE
Place of publication Piscataway, N. J.
Summary In this paper, we inspire from two analogies: the warfare kill zone and the airport check-in system, to tackle the issue of spam botnet detection. We add a new line of defense to the defense-in-depth model called the third line. This line is represented by a security framework, named the Spam Trapping System (STS) and adopts the prevent-then-detect approach to fight against spam botnets. The framework exploits the application sandboxing principle to prevent the spam from going out of the host and detect the corresponding malware bot. We show that the proposed framework can ensure better security against malware bots. In addition, an analytical study demonstrates that the framework offers optimal performance in terms of detection time and computational cost in comparison to intrusion detection systems based on static and dynamic analysis. © 2014 IEEE.
ISBN 9781479951413
Language eng
DOI 10.1109/ICT.2014.6845160
Field of Research 080303 Computer System Security
Socio Economic Objective 890202 Application Tools and System Utilities
HERDC Research category E1 Full written paper - refereed
ERA Research output type E Conference publication
Copyright notice ©2014, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30072053

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 2 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 282 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Thu, 23 Apr 2015, 09:47:42 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.