{"id":"https://openalex.org/W2094462980","doi":"https://doi.org/10.1145/1455518.1455525","title":"Thwarting E-mail Spam Laundering","display_name":"Thwarting E-mail Spam Laundering","publication_year":2008,"publication_date":"2008-12-01","ids":{"openalex":"https://openalex.org/W2094462980","doi":"https://doi.org/10.1145/1455518.1455525","mag":"2094462980"},"language":"en","primary_location":{"id":"doi:10.1145/1455518.1455525","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1455518.1455525","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048083201","display_name":"Mengjun Xie","orcid":"https://orcid.org/0000-0001-5089-9614"},"institutions":[{"id":"https://openalex.org/I16285277","display_name":"William & Mary","ror":"https://ror.org/03hsf0573","country_code":"US","type":"education","lineage":["https://openalex.org/I16285277"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mengjun Xie","raw_affiliation_strings":["College of William and Mary","college of william and mary"],"affiliations":[{"raw_affiliation_string":"College of William and Mary","institution_ids":["https://openalex.org/I16285277"]},{"raw_affiliation_string":"college of william and mary","institution_ids":["https://openalex.org/I16285277"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073376805","display_name":"Heng Yin","orcid":"https://orcid.org/0000-0002-8942-7742"},"institutions":[{"id":"https://openalex.org/I16285277","display_name":"William & Mary","ror":"https://ror.org/03hsf0573","country_code":"US","type":"education","lineage":["https://openalex.org/I16285277"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Heng Yin","raw_affiliation_strings":["College of William and Mary","college of william and mary"],"affiliations":[{"raw_affiliation_string":"College of William and Mary","institution_ids":["https://openalex.org/I16285277"]},{"raw_affiliation_string":"college of william and mary","institution_ids":["https://openalex.org/I16285277"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100664241","display_name":"Haining Wang","orcid":"https://orcid.org/0000-0002-9665-7511"},"institutions":[{"id":"https://openalex.org/I16285277","display_name":"William & Mary","ror":"https://ror.org/03hsf0573","country_code":"US","type":"education","lineage":["https://openalex.org/I16285277"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Haining Wang","raw_affiliation_strings":["College of William and Mary","college of william and mary"],"affiliations":[{"raw_affiliation_string":"College of William and Mary","institution_ids":["https://openalex.org/I16285277"]},{"raw_affiliation_string":"college of william and mary","institution_ids":["https://openalex.org/I16285277"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5048083201"],"corresponding_institution_ids":["https://openalex.org/I16285277"],"apc_list":null,"apc_paid":null,"fwci":3.4991,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.93524492,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"12","issue":"2","first_page":"1","last_page":"32"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spamming","display_name":"Spamming","score":0.9000375866889954},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8025547862052917},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5801499485969543},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5130166411399841},{"id":"https://openalex.org/keywords/spambot","display_name":"Spambot","score":0.4759395122528076},{"id":"https://openalex.org/keywords/forum-spam","display_name":"Forum spam","score":0.4419538378715515},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4255870580673218},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1434614360332489}],"concepts":[{"id":"https://openalex.org/C158955206","wikidata":"https://www.wikidata.org/wiki/Q83058","display_name":"Spamming","level":3,"score":0.9000375866889954},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8025547862052917},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5801499485969543},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5130166411399841},{"id":"https://openalex.org/C127735637","wikidata":"https://www.wikidata.org/wiki/Q2306702","display_name":"Spambot","level":4,"score":0.4759395122528076},{"id":"https://openalex.org/C157310412","wikidata":"https://www.wikidata.org/wiki/Q3140915","display_name":"Forum spam","level":5,"score":0.4419538378715515},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4255870580673218},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1434614360332489}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1455518.1455525","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1455518.1455525","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.129.691","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.129.691","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.wm.edu/~hnw/paper/tissec.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.145.9241","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.145.9241","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.wm.edu/~hnw/paper/tissec.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7300000190734863,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W19438344","https://openalex.org/W43373501","https://openalex.org/W49427630","https://openalex.org/W76311454","https://openalex.org/W127688506","https://openalex.org/W176245828","https://openalex.org/W177515589","https://openalex.org/W190328623","https://openalex.org/W1514368868","https://openalex.org/W1521505907","https://openalex.org/W1553435762","https://openalex.org/W1579427489","https://openalex.org/W1674877186","https://openalex.org/W1682505673","https://openalex.org/W1721316154","https://openalex.org/W1744212210","https://openalex.org/W1794837131","https://openalex.org/W1836378862","https://openalex.org/W1837066194","https://openalex.org/W2062187478","https://openalex.org/W2063875363","https://openalex.org/W2080557752","https://openalex.org/W2096007208","https://openalex.org/W2099886759","https://openalex.org/W2113344319","https://openalex.org/W2121320294","https://openalex.org/W2150973844","https://openalex.org/W2154004623","https://openalex.org/W2166748118","https://openalex.org/W2240246332","https://openalex.org/W2911666045","https://openalex.org/W4212768396","https://openalex.org/W4233802931","https://openalex.org/W4250261234","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2018000323","https://openalex.org/W2095720311","https://openalex.org/W2403960249","https://openalex.org/W2898345088","https://openalex.org/W2080521416","https://openalex.org/W1937320931","https://openalex.org/W1502194589","https://openalex.org/W1965586806","https://openalex.org/W4293384513","https://openalex.org/W2247971863"],"abstract_inverted_index":{"Laundering":[0],"e-mail":[1,24,60],"spam":[2,15,25,38,44,102,117,148,183,189,206],"through":[3,129,210],"open-proxies":[4],"or":[5],"compromised":[6],"PCs":[7],"is":[8,66],"a":[9,34,106,121,130,135,151,164,193],"widely-used":[10],"trick":[11],"to":[12,51,112,143,186],"conceal":[13],"real":[14],"sources":[16],"and":[17,46,92,108,115,160,201,208,214],"reduce":[18],"spamming":[19,48,83],"cost":[20],"in":[21,67,101,150,167],"the":[22,30,97,125,145,156,171,188],"underground":[23],"industry.":[26],"Spammers":[27],"have":[28],"plagued":[29],"Internet":[31],"by":[32,88],"exploiting":[33],"large":[35],"number":[36],"of":[37,42,81,147,158,195],"proxies.":[39],"The":[40],"facility":[41],"breaking":[43],"laundering":[45,118,149,172],"deterring":[47],"activities":[49,119],"close":[50],"their":[52],"sources,":[53],"which":[54,170],"would":[55],"greatly":[56],"benefit":[57],"not":[58],"only":[59],"users":[61],"but":[62,70],"also":[63],"victim":[64],"ISPs,":[65],"great":[68],"demand":[69],"still":[71],"missing.":[72],"In":[73],"this":[74],"article,":[75],"we":[76,104,162],"reveal":[77],"one":[78],"salient":[79],"characteristic":[80],"proxy-based":[82],"activities,":[84],"namely":[85],"packet":[86,98],"symmetry,":[87],"analyzing":[89],"protocol":[90],"semantics":[91],"timing":[93],"causality.":[94],"Based":[95],"on":[96,198,205],"symmetry":[99],"exhibited":[100],"laundering,":[103],"propose":[105],"simple":[107,136],"effective":[109],"technique,":[110],"DBSpam,":[111,168],"online":[113],"detect":[114,144],"break":[116,187],"inside":[120],"customer":[122],"network.":[123],"Monitoring":[124],"bidirectional":[126],"traffic":[127],"passing":[128],"network":[131],"gateway,":[132],"DBSpam":[133,180,196],"utilizes":[134],"statistical":[137],"method,":[138],"Sequential":[139],"Probability":[140],"Ratio":[141],"Test,":[142],"occurrence":[146],"timely":[152],"manner.":[153],"To":[154],"balance":[155],"goals":[157],"promptness":[159],"accuracy,":[161],"introduce":[163],"noise-reduction":[165],"technique":[166],"after":[169],"path":[173],"can":[174],"be":[175],"identified":[176],"more":[177],"accurately.":[178],"Then":[179],"activates":[181],"its":[182,203],"suppressing":[184],"mechanism":[185],"laundering.":[190],"We":[191],"implement":[192],"prototype":[194],"based":[197],"libpcap":[199],",":[200],"validate":[202],"efficacy":[204],"detection":[207],"suppression":[209],"both":[211],"theoretical":[212],"analyses":[213],"trace-based":[215],"experiments.":[216]},"counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
