Fighting spam using social GateKeepers

We introduce LENS (LEveraging social Networking and trust to prevent Spam transmission), a novel spam protection system which leverages the recipient’s social network to allow correspondence within the social network to directly pass to the mailbox of the recipient. To enable new senders to send emails, legitimate and authentic users, called GateKeepers (GKs), are selected from outside the recipient’s social circle and within predefined social distances. Our evaluations show that LENS provides each recipient reliable email delivery from a large fraction (up to 55% of entire userbase) of the social network; it is also effective and lightweight in accepting all the legitimate inbound emails in the real email traces. LENS imposes zero overhead for the common case of frequent and familiar senders, and remains lightweight for the general case. Our prototype implementation of LENS in Postfix/MailAvenger shows that LENS consumes up to 75% less CPU and 9% less memory as traditional solutions like SpamAssassin.

[1]  He Liu,et al.  Click Trajectories: End-to-End Analysis of the Spam Value Chain , 2011, 2011 IEEE Symposium on Security and Privacy.

[2]  Bülent Yener,et al.  Graph Theoretic and Spectral Analysis of Enron Email Data , 2005, Comput. Math. Organ. Theory.

[3]  Wolfgang Nejdl,et al.  MailRank: using ranking for spam detection , 2005, CIKM '05.

[4]  John C. Klensin,et al.  Simple Mail Transfer Protocol , 2001, RFC.

[5]  S. Bornholdt,et al.  Scale-free topology of e-mail networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[6]  Chris Kanich,et al.  Spamalytics: an empirical analysis of spam marketing conversion , 2008, CCS.

[7]  Ben Y. Zhao,et al.  User interactions in social networks and their implications , 2009, EuroSys '09.

[8]  Xiaoming Fu,et al.  Identity based email sender authentication for spam mitigation , 2013, Eighth International Conference on Digital Information Management (ICDIM 2013).

[9]  Krishna P. Gummadi,et al.  Measurement and analysis of online social networks , 2007, IMC '07.

[10]  Luis Enrique Sánchez,et al.  Information and Knowledge Management , 2012 .

[11]  Xiaoming Fu,et al.  iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation , 2012, SECRYPT.

[12]  Moni Naor,et al.  Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.

[13]  Stanley Milgram,et al.  An Experimental Study of the Small World Problem , 1969 .

[14]  Adam Back,et al.  Hashcash - A Denial of Service Counter-Measure , 2002 .

[15]  Michael Sirivianos,et al.  SocialFilter: Introducing social trust to collaborative spam mitigation , 2010, 2011 Proceedings IEEE INFOCOM.

[16]  Jafar Adibi,et al.  The Enron Email Dataset Database Schema and Brief Statistical Report , 2004 .

[17]  David Mazières,et al.  RE: Reliable Email , 2006, NSDI.

[18]  Brian D. Davison,et al.  Identifying link farm spam pages , 2005, WWW '05.

[19]  Krishna P. Gummadi,et al.  Ostra: Leveraging Trust to Thwart Unwanted Communication , 2008, NSDI.

[20]  Haiying Shen,et al.  SOAP: A Social network Aided Personalized and effective spam filter to clean your e-mail box , 2011, 2011 Proceedings IEEE INFOCOM.

[21]  Leyla Bilge,et al.  All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.

[22]  P. Oscar Boykin,et al.  Personal Email Networks: An Effective Anti-Spam Tool , 2004, ArXiv.

[23]  P. Oscar Boykin,et al.  Leveraging social networks to fight spam , 2005, Computer.

[24]  Xiaoming Fu,et al.  LENS: Leveraging social networking and trust to prevent spam transmission , 2011, 2011 19th IEEE International Conference on Network Protocols.

[25]  John C. Klensin,et al.  Simple Mail Transfer Protocol , 2001, RFC.