首页 > 最新文献

ACM Crossroads最新文献

英文 中文
Overcoming misbehavior in mobile ad hoc networks: an overview 在移动自组织网络中克服不当行为:概述
Pub Date : 2005-08-01 DOI: 10.1145/1144389.1144394
G. Athanasiou, L. Tassiulas, G. Yovanof
In the recent years, wireless networks have experienced an enormous growth which has given rise to new research challenges. Ad hoc networks are composed of autonomous nodes that are independent of any fixed infrastructure. Mobile ad hoc networks have a fully decentralized topology and they are dynamically changing. Besides these challenges, the wireless transmission medium introduces limitations in communication. For these reasons, providing security guarantees is particularly difficult. In a mobile ad hoc network every node acts as a router for its neighbors. The routing protocols that have been proposed assume that the nodes will fully participate. Unfortunately, node misbehavior is a common phenomenon. Misbehavior is due to selfish or malicious reasons. Another reason, which is rarer, is a faulty link due to the wireless medium. Misbehavior can take place at all layers. At the Physical layer a misbehaving node can increase its transmitting power, adversely affecting the network performance. At the MAC (Medium Access Control) layer a node may choose to avoid waiting for its turn to access the medium, taking an unfair advantage of the shared medium. The basic threat at the Network layer is the non-cooperative behavior as far as packet forwarding is concerned. The proper execution of a routing protocol demands that the intermediate nodes in a path forward the packets correctly to the intended receivers. Misbehaving nodes do not forward these packets. A routing protocol for MANETs should give incentives for cooperative action or at least it should be able to detect misbehaving nodes and correct them.
近年来,无线网络经历了巨大的发展,这给研究带来了新的挑战。自组织网络由独立于任何固定基础设施的自治节点组成。移动自组织网络具有完全分散的拓扑结构,并且它们是动态变化的。除了这些挑战之外,无线传输介质还在通信方面引入了限制。由于这些原因,提供安全保障特别困难。在移动自组织网络中,每个节点都充当其邻居的路由器。已经提出的路由协议假设节点将完全参与。不幸的是,节点行为不当是一种常见现象。不当行为是由于自私或恶意的原因。另一个比较少见的原因是由于无线介质导致的链路故障。行为不端可能发生在各个层面。在物理层,行为不当的节点会增加其传输功率,从而对网络性能产生不利影响。在MAC(媒体访问控制)层,节点可以选择避免等待轮到它访问媒体,从而获得共享媒体的不公平优势。网络层的基本威胁是数据包转发的非合作行为。路由协议的正确执行要求路径中的中间节点将数据包正确地转发给预期的接收者。行为不端的节点不转发这些数据包。用于manet的路由协议应该为合作行为提供激励,或者至少应该能够检测行为不端的节点并纠正它们。
{"title":"Overcoming misbehavior in mobile ad hoc networks: an overview","authors":"G. Athanasiou, L. Tassiulas, G. Yovanof","doi":"10.1145/1144389.1144394","DOIUrl":"https://doi.org/10.1145/1144389.1144394","url":null,"abstract":"In the recent years, wireless networks have experienced an enormous growth which has given rise to new research challenges. Ad hoc networks are composed of autonomous nodes that are independent of any fixed infrastructure. Mobile ad hoc networks have a fully decentralized topology and they are dynamically changing. Besides these challenges, the wireless transmission medium introduces limitations in communication. For these reasons, providing security guarantees is particularly difficult. In a mobile ad hoc network every node acts as a router for its neighbors. The routing protocols that have been proposed assume that the nodes will fully participate. Unfortunately, node misbehavior is a common phenomenon. Misbehavior is due to selfish or malicious reasons. Another reason, which is rarer, is a faulty link due to the wireless medium. Misbehavior can take place at all layers. At the Physical layer a misbehaving node can increase its transmitting power, adversely affecting the network performance. At the MAC (Medium Access Control) layer a node may choose to avoid waiting for its turn to access the medium, taking an unfair advantage of the shared medium. The basic threat at the Network layer is the non-cooperative behavior as far as packet forwarding is concerned. The proper execution of a routing protocol demands that the intermediate nodes in a path forward the packets correctly to the intended receivers. Misbehaving nodes do not forward these packets. A routing protocol for MANETs should give incentives for cooperative action or at least it should be able to detect misbehaving nodes and correct them.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121251206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Introduction to automatic design of wireless networks 无线网络自动设计简介
Pub Date : 2005-08-01 DOI: 10.1145/1144389.1144393
K. E. Oliver
{"title":"Introduction to automatic design of wireless networks","authors":"K. E. Oliver","doi":"10.1145/1144389.1144393","DOIUrl":"https://doi.org/10.1145/1144389.1144393","url":null,"abstract":"","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114366532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Obfuscation of the standard XOR Encryption algorithm 标准异或加密算法的混淆
Pub Date : 2005-05-01 DOI: 10.1145/1144396.1144402
Zachary A. Kissel
XOR Encryption is a popular encryption algorithm that is used in many browsers and it is blatantly simpleand fairly secure. The XOR Encryption algorithm is an example of a Symmetric Encryption algorithm. This means that the same key is used for both encryption and decryption [7]. In the case of XOR Encryption, this is true because XOR is a two-way function which means that the function can easily be undone [6]. In the following paper the standard XOR Encryption algorithm will be introduced along with a modification. The modification comes in the form of creating random permutations of the key.
异或加密是一种流行的加密算法,在许多浏览器中使用,它非常简单而且相当安全。异或加密算法是对称加密算法的一个示例。这意味着加密和解密都使用相同的密钥[7]。在异或加密的情况下,这是正确的,因为异或是一个双向函数,这意味着该函数很容易被撤消[6]。在下面的文章中,将介绍标准的异或加密算法,并对其进行修改。修改的形式是创建密钥的随机排列。
{"title":"Obfuscation of the standard XOR Encryption algorithm","authors":"Zachary A. Kissel","doi":"10.1145/1144396.1144402","DOIUrl":"https://doi.org/10.1145/1144396.1144402","url":null,"abstract":"XOR Encryption is a popular encryption algorithm that is used in many browsers and it is blatantly simpleand fairly secure. The XOR Encryption algorithm is an example of a Symmetric Encryption algorithm. This means that the same key is used for both encryption and decryption [7]. In the case of XOR Encryption, this is true because XOR is a two-way function which means that the function can easily be undone [6]. In the following paper the standard XOR Encryption algorithm will be introduced along with a modification. The modification comes in the form of creating random permutations of the key.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120899416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An introduction to quantum cryptography 量子密码学简介
Pub Date : 2005-05-01 DOI: 10.1145/1144396.1144399
N. Papanikolaou
It is widely believed that devising an "unbreakable" cryptographic method is an impossible task. We are still on an age-old quest to find such a method, because virtually all previous attempts have failed. Cryptography was the art of outsmarting a human enemy; today it is concerned more with resisting attack by very powerful computers. Cryptosystems in common use today (e.g., DES, RSA, AES; see [20] for details) are designed to withstand attacks from current generation computers as much as possible. However, the constant increase in available computational power will make these systems more vulnerable to attack.
人们普遍认为,设计一种“牢不可破”的密码方法是一项不可能完成的任务。我们仍在寻找这样一种方法,这是一项由来已久的探索,因为之前几乎所有的尝试都失败了。密码学是一门智胜人类敌人的艺术;今天,它更关心的是抵抗非常强大的计算机的攻击。目前常用的密码系统(如DES, RSA, AES;参见[20]了解详细信息)的设计是为了尽可能地抵御来自当代计算机的攻击。然而,可用计算能力的不断增加将使这些系统更容易受到攻击。
{"title":"An introduction to quantum cryptography","authors":"N. Papanikolaou","doi":"10.1145/1144396.1144399","DOIUrl":"https://doi.org/10.1145/1144396.1144399","url":null,"abstract":"It is widely believed that devising an \"unbreakable\" cryptographic method is an impossible task. We are still on an age-old quest to find such a method, because virtually all previous attempts have failed. Cryptography was the art of outsmarting a human enemy; today it is concerned more with resisting attack by very powerful computers. Cryptosystems in common use today (e.g., DES, RSA, AES; see [20] for details) are designed to withstand attacks from current generation computers as much as possible. However, the constant increase in available computational power will make these systems more vulnerable to attack.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122208682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
An introduction to side channel cryptanalysis of RSA 介绍了RSA的边信道密码分析
Pub Date : 2005-05-01 DOI: 10.1145/1144396.1144400
A. Voyiatzis
Cryptology is the art and science of designing (cryptography) and breaking (cryptanalysis) ciphers based on mathematical tools and researcher creativity. In the middle of the 1990's a new cryptanalysis technique emerged: implementation cryptanalysis or sidechannel cryptanalysis. This technique does not directly attack the strong mathematical constructs of cryptographic algorithms, but rather focuses on implementation details of an algorithm on a physical system. Cryptographic algorithms that withstood years of mathematical cryptanalysis were proven by various researchers to be vulnerable to such attacks, especially in resource-constrained physical systems, such as embedded systems. This article provides an introduction to side-channel cryptanalysis and focuses on sidechannel attacks on two implementation variants of the RSA encryption algorithm.
密码学是基于数学工具和研究人员的创造力设计(密码学)和破解(密码分析)密码的艺术和科学。20世纪90年代中期出现了一种新的密码分析技术:实现密码分析或侧信道密码分析。这种技术并不直接攻击加密算法的强数学结构,而是关注算法在物理系统上的实现细节。经过多年数学密码分析的加密算法被各种研究人员证明容易受到此类攻击,特别是在资源受限的物理系统中,例如嵌入式系统。本文介绍了侧信道密码分析,并重点介绍了对RSA加密算法的两个实现变体的侧信道攻击。
{"title":"An introduction to side channel cryptanalysis of RSA","authors":"A. Voyiatzis","doi":"10.1145/1144396.1144400","DOIUrl":"https://doi.org/10.1145/1144396.1144400","url":null,"abstract":"Cryptology is the art and science of designing (cryptography) and breaking (cryptanalysis) ciphers based on mathematical tools and researcher creativity. In the middle of the 1990's a new cryptanalysis technique emerged: implementation cryptanalysis or sidechannel cryptanalysis. This technique does not directly attack the strong mathematical constructs of cryptographic algorithms, but rather focuses on implementation details of an algorithm on a physical system. Cryptographic algorithms that withstood years of mathematical cryptanalysis were proven by various researchers to be vulnerable to such attacks, especially in resource-constrained physical systems, such as embedded systems. This article provides an introduction to side-channel cryptanalysis and focuses on sidechannel attacks on two implementation variants of the RSA encryption algorithm.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126968265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Timing attacks on RSA: revealing your secrets through the fourth dimension 对RSA的定时攻击:通过第四维揭示你的秘密
Pub Date : 2005-05-01 DOI: 10.1145/1144396.1144401
W. H. Wong
Do you think your computer system is secure because you use strong cryptography? Do you think your system is impenetrable because you use a long secret value in the cryptographic computation that attackers cannot guess by brute force? If so, you should know that attackers may be able to exploit your system in an unexpected manner by surreptitiously invading it rather than by directly attempting to break the cryptography.
你是否认为你的计算机系统是安全的,因为你使用了强加密技术?您是否认为您的系统是不可破解的,因为您在加密计算中使用了攻击者无法通过暴力破解猜出的长秘密值?如果是这样,您应该知道,攻击者可能能够以一种意想不到的方式利用您的系统,即秘密入侵系统,而不是直接尝试破解密码。
{"title":"Timing attacks on RSA: revealing your secrets through the fourth dimension","authors":"W. H. Wong","doi":"10.1145/1144396.1144401","DOIUrl":"https://doi.org/10.1145/1144396.1144401","url":null,"abstract":"Do you think your computer system is secure because you use strong cryptography? Do you think your system is impenetrable because you use a long secret value in the cryptographic computation that attackers cannot guess by brute force? If so, you should know that attackers may be able to exploit your system in an unexpected manner by surreptitiously invading it rather than by directly attempting to break the cryptography.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120961443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Security, anonymity and trust in electronic auctions 电子拍卖的安全性、匿名性和可信度
Pub Date : 2005-05-01 DOI: 10.1145/1144396.1144398
Jarrod Trevathan
Auctioning items over the Internet is a popular and lucrative industry.There are now many companies that conduct auctions online such as eBay [5] and onSale [10]. Online auctions have geographical advantages over traditional auctions as buyers and sellers are not required to be physically present at a central location (such as a hall or open air venue). This allows online auctions to be much larger and more elaborate than traditional auctions.However, it also provides opportunities for the auction participants to cheat. A bidder can cheat by repudiating bids, failing to pay, or colluding with other bidders to affect the settlement price.Likewise, the seller of the item might fail to deliver the goods, or could be in collusion with some of the bidders.Someone could also forge a bid in an attempt to frame a bidder, or introduce fake bids in order to influence the auction proceedings. Furthermore, bidders are required to trust the auctioneer with their identity and bid information.A corrupt auctioneer could award the auction to someone other than the legitimate winner.A bidder's personal information could also be sold to marketing agencies, or used for malicious purposes. Commercial auction sites fail in many of the aforementioned circumstances. These sites only offer basic solutions that are designed to "clean up" after wrongdoing has taken place.However, cryptography can be used to solve some of these problems up-front.An "electronic auction" is a cryptographic scheme designed to securely conduct auctions while protecting the identities of the bidders. In this article we describe two popular types of electronic auctions. We discuss the security issues associated with conducting these auctions and contrast the differing anonymity requirements.We also identify four main strategies for reducing the trust that bidders must place in the auctioneer.Furthermore, we present a basic example of an electronic auction scheme.This is used to illustrate the complexity involved in designing a secure and anonymous auction scheme. Finally, we discuss some of our research with regard to using group signature schemes to constructelectronic auctions.
在互联网上拍卖物品是一个受欢迎且利润丰厚的行业。现在有很多公司在网上进行拍卖,如eBay[5]和onSale[10]。与传统拍卖相比,在线拍卖具有地理优势,因为买家和卖家不需要实际出现在中心位置(如大厅或露天场所)。这使得在线拍卖比传统拍卖规模更大、更精细。然而,这也为拍卖参与者提供了作弊的机会。投标人可以通过拒绝投标、不付款或者与其他投标人串通影响结算价格等方式进行欺诈。同样,物品的卖方可能无法交付货物,或者可能与一些投标人勾结。有人还可能伪造出价,试图陷害竞标者,或引入虚假出价,以影响拍卖程序。此外,竞买人必须信任拍卖人,将其身份和出价信息告知拍卖人。腐败的拍卖商可能会把拍卖权授予合法赢家以外的人。竞标者的个人信息也可能被出售给营销机构,或被用于恶意目的。商业拍卖网站在上述许多情况下都失败了。这些网站只提供基本的解决方案,旨在在不法行为发生后进行“清理”。然而,密码学可以用来预先解决其中的一些问题。“电子拍卖”是一种加密方案,旨在安全地进行拍卖,同时保护投标人的身份。在本文中,我们描述了两种流行的电子拍卖类型。我们将讨论与进行这些拍卖相关的安全问题,并对比不同的匿名要求。我们还确定了四种主要策略,以减少竞标者必须对拍卖师的信任。此外,我们提出了一个电子拍卖方案的基本例子。这是用来说明设计一个安全和匿名的拍卖方案所涉及的复杂性。最后,我们讨论了一些关于使用群签名方案构建电子拍卖的研究。
{"title":"Security, anonymity and trust in electronic auctions","authors":"Jarrod Trevathan","doi":"10.1145/1144396.1144398","DOIUrl":"https://doi.org/10.1145/1144396.1144398","url":null,"abstract":"Auctioning items over the Internet is a popular and lucrative industry.There are now many companies that conduct auctions online such as eBay [5] and onSale [10]. Online auctions have geographical advantages over traditional auctions as buyers and sellers are not required to be physically present at a central location (such as a hall or open air venue). This allows online auctions to be much larger and more elaborate than traditional auctions.However, it also provides opportunities for the auction participants to cheat. \u0000 \u0000A bidder can cheat by repudiating bids, failing to pay, or colluding with other bidders to affect the settlement price.Likewise, the seller of the item might fail to deliver the goods, or could be in collusion with some of the bidders.Someone could also forge a bid in an attempt to frame a bidder, or introduce fake bids in order to influence the auction proceedings. \u0000 \u0000Furthermore, bidders are required to trust the auctioneer with their identity and bid information.A corrupt auctioneer could award the auction to someone other than the legitimate winner.A bidder's personal information could also be sold to marketing agencies, or used for malicious purposes. \u0000 \u0000Commercial auction sites fail in many of the aforementioned circumstances. These sites only offer basic solutions that are designed to \"clean up\" after wrongdoing has taken place.However, cryptography can be used to solve some of these problems up-front.An \"electronic auction\" is a cryptographic scheme designed to securely conduct auctions while protecting the identities of the bidders. \u0000 \u0000In this article we describe two popular types of electronic auctions. We discuss the security issues associated with conducting these auctions and contrast the differing anonymity requirements.We also identify four main strategies for reducing the trust that bidders must place in the auctioneer.Furthermore, we present a basic example of an electronic auction scheme.This is used to illustrate the complexity involved in designing a secure and anonymous auction scheme. Finally, we discuss some of our research with regard to using group signature schemes to constructelectronic auctions.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114330268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Identifying spam without peeking at the contents 识别垃圾邮件而不偷看内容
Pub Date : 2004-12-01 DOI: 10.1145/1144403.1144406
Shlomo Hershkop, S. Stolfo
Currently available solutions attempt to filter out spam based on analyzing the contents of the message and calculating a score to indicate the 'spami-ness' of the message. However, users can typically identify their junk email without having to open and read the contents of the specific message. In this article, we outline the general problem, review current options, and propose a new user-level behavior model to identify spam messages. We show the performance of this approach and discuss some applications and future directions.
目前可用的解决方案试图通过分析消息内容并计算分数来表示消息的“垃圾邮件性”,从而过滤掉垃圾邮件。然而,用户通常可以识别他们的垃圾邮件,而不必打开和阅读特定邮件的内容。在本文中,我们概述了一般问题,回顾了当前的选项,并提出了一个新的用户级行为模型来识别垃圾邮件。我们展示了这种方法的性能,并讨论了一些应用和未来的发展方向。
{"title":"Identifying spam without peeking at the contents","authors":"Shlomo Hershkop, S. Stolfo","doi":"10.1145/1144403.1144406","DOIUrl":"https://doi.org/10.1145/1144403.1144406","url":null,"abstract":"Currently available solutions attempt to filter out spam based on analyzing the contents of the message and calculating a score to indicate the 'spami-ness' of the message. However, users can typically identify their junk email without having to open and read the contents of the specific message. In this article, we outline the general problem, review current options, and propose a new user-level behavior model to identify spam messages. We show the performance of this approach and discuss some applications and future directions.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132495607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Peer-to-peer collaborative spam detection 点对点协作垃圾邮件检测
Pub Date : 2004-12-01 DOI: 10.1145/1144403.1144407
N. Dimmock, I. Maddison
Although there are many potential solutions to spam, it oftenappears that filtering and blocking are the best. Unfortunately these techniques are inadequate, as evidencedby the continuing proliferation of spam. Here we describe a student project thatevolved collaborative filtering, previouslyimplemented using a centralized repository of spam information, intoa distributed, collaborative, peer-to-peer-based spam detection system.
虽然有许多潜在的解决垃圾邮件的方案,但过滤和阻止通常是最好的。不幸的是,这些技术是不够的,正如垃圾邮件的持续扩散所证明的那样。在这里,我们描述了一个学生项目,该项目将以前使用垃圾邮件信息的集中式存储库实现的协同过滤演变为分布式、协作的、基于点对点的垃圾邮件检测系统。
{"title":"Peer-to-peer collaborative spam detection","authors":"N. Dimmock, I. Maddison","doi":"10.1145/1144403.1144407","DOIUrl":"https://doi.org/10.1145/1144403.1144407","url":null,"abstract":"Although there are many potential solutions to spam, it oftenappears that filtering and blocking are the best. Unfortunately these techniques are inadequate, as evidencedby the continuing proliferation of spam. Here we describe a student project thatevolved collaborative filtering, previouslyimplemented using a centralized repository of spam information, intoa distributed, collaborative, peer-to-peer-based spam detection system.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115817986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Learning how to tell ham from spam 学习如何分辨火腿和垃圾邮件
Pub Date : 2004-12-01 DOI: 10.1145/1144403.1144405
George Sakkis
Unsolicited Commercial Email (UCE), commonly known as spam, has evolved from a mere nuisance to a multi-billion dollar problem. The near zero cost of acquiring huge lists of email addresses and flooding them with advertising messages has affected individual users, small companies, and large institutions alike. Spam is forcing users to wade through their mailbox to find the relatively few emails specifically addressed to them, colloquially referred to as "ham." Spam also wastes bandwidth, intermediate storage space, CPU time of Internet Service Providers (ISPs), and is often insulting and unsuitable (e.g. having pornographic content), especially to minors. Indicative of spam's extent is the first Conference on Email and Anti-Spam (CEAS) that recently took place in Mountain View, CA, following several industrial conferences on the topic. The conference attracted over two hundred academics and practitioners, most of them actively working on the problem from different perspectives, such as machine learning, security, and law.
未经请求的商业电子邮件(UCE),通常被称为垃圾邮件,已经从一个简单的麻烦演变成一个数十亿美元的问题。获取庞大的电子邮件地址列表并在其中大量投放广告信息的成本几乎为零,这对个人用户、小公司和大型机构都产生了影响。垃圾邮件迫使用户在他们的邮箱中寻找相对较少的专门针对他们的电子邮件,通俗地称为“ham”。垃圾邮件还会浪费互联网服务提供商的带宽、中间存储空间和CPU时间,并且通常是侮辱性的和不合适的(例如含有色情内容),特别是对未成年人。最近在加州山景城举行的第一届电子邮件和反垃圾邮件会议(CEAS)表明了垃圾邮件的严重程度,此前曾举行过几次有关该主题的工业会议。会议吸引了200多名学者和实践者,他们中的大多数人积极地从不同的角度研究这个问题,比如机器学习、安全和法律。
{"title":"Learning how to tell ham from spam","authors":"George Sakkis","doi":"10.1145/1144403.1144405","DOIUrl":"https://doi.org/10.1145/1144403.1144405","url":null,"abstract":"Unsolicited Commercial Email (UCE), commonly known as spam, has evolved from a mere nuisance to a multi-billion dollar problem. The near zero cost of acquiring huge lists of email addresses and flooding them with advertising messages has affected individual users, small companies, and large institutions alike. Spam is forcing users to wade through their mailbox to find the relatively few emails specifically addressed to them, colloquially referred to as \"ham.\" Spam also wastes bandwidth, intermediate storage space, CPU time of Internet Service Providers (ISPs), and is often insulting and unsuitable (e.g. having pornographic content), especially to minors. Indicative of spam's extent is the first Conference on Email and Anti-Spam (CEAS) that recently took place in Mountain View, CA, following several industrial conferences on the topic. The conference attracted over two hundred academics and practitioners, most of them actively working on the problem from different perspectives, such as machine learning, security, and law.","PeriodicalId":429016,"journal":{"name":"ACM Crossroads","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123280865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
ACM Crossroads
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1