SpamBands: uma metodologia para identificação de fontes de spam agindo de forma orquestrada

NEKAP: Estabelecimento de Chaves Resiliente a Intrusos em RSSF

Elverton FazzionPedro Henrique B. Las-CasasOsvaldo FonsecaDorgival GuedesWagner Meira Jr.Cristine HoepersKlaus Steding-JessenMarcelo H. P. Chaves

Sergio OliveiraHao Chi WongJosé Marcos Nogueira

In 2012, estimates indicated that 68.8% of all e-mail traffic was spam, what suggests this is still a relevant problem. Recently, some works have focused on the analysis of spam's traffic inside the network, analyzing the protocols used and the AS which originate the traffic. However, those works usually do not consider the relationships between the machines used to send spam. Such an analysis could reveal how different machines may be used by a single spammer to spread his messages, helping us to understand their behavior. To that end, this work proposes a methodology to cluster the machines used by spammers based on the concept of spam campaigns. The groups identified were characterized to identify different aspects of the spam dissemination process, which suggest different orchestration strategies being used. Hop-by-hop authentication in Wireless Sensor Networks (WSNs) prevents outside intruders from taking part in the network, and launching various attacks. Due to resource constraints, standard key distribution schemes are inapplicable in this context. Furthermore, the network should be resilient to key compromises by intruders. This paper presents NEKAP - Neighborhood-based Key Agreement Protocol - a key distribution protocol for WSNs. In NEKAP, an intruder that compromises a key has access to the links in a limited neighborhood only, but not those in other regions of the network.

Caso o link acima esteja inválido, faça uma busca pelo texto completo na Web: Buscar na Web

Biblioteca Digital Brasileira de Computação - Contato:
     Mantida por: