Using Low-Interaction Honeypots to Study the Abuse of Open Proxies to Send Spam
Main Article Content
Abstract
One of the main problems in creating effective mechanisms to mitigate the spam problem is the lack of more precise data on it. This paper describes the design and implementation of a honeypotbased architecture to study the abuse of open proxies to send spam. The sensors were installed in Brazilian broadband networks and they captured more than 500 million emails over a period of 15 months. In this paper we present the analysis of these data and describe some contributions to the spam capture field that were implemented.
Article Details
How to Cite
Steding-Jessen, K., Vijaykumar, N. L., & Montes, A. (2008). Using Low-Interaction Honeypots to Study the Abuse of Open Proxies to Send Spam. INFOCOMP Journal of Computer Science, 7(1), 44–52. Retrieved from https://infocomp.dcc.ufla.br/index.php/infocomp/article/view/205
Section
Articles
Upon receipt of accepted manuscripts, authors will be invited to complete a copyright license to publish the paper. At least the corresponding author must send the copyright form signed for publication. It is a condition of publication that authors grant an exclusive licence to the the INFOCOMP Journal of Computer Science. This ensures that requests from third parties to reproduce articles are handled efficiently and consistently and will also allow the article to be as widely disseminated as possible. In assigning the copyright license, authors may use their own material in other publications and ensure that the INFOCOMP Journal of Computer Science is acknowledged as the original publication place.