; --------------------------------------------------------------------- ; To submit, log into grace.umd.edu and use the following command: ; /submit 2017 fall ENEE 657 0101 21 spam.bib ; --------------------------------------------------------------------- ; Required Readings @ARTICLE{ Kanich2008, title = {{Spamalytics: an empirical analysis of spam marketing conversion}}, author = {Kanich, Chris and Kreibich, Christian and Levchenko, Kirill and Enright, Brandon and Voelker, Geoffrey M and Paxson, Vern and Savage, Stefan}, journal = {ACM Conference on Computer and Communications Security}, year = {2008}, pages = {3--14}, issn = {00010782}, abstract = {The conversion rate of spam--the probability that an unsolicited e-mail will ultimately elicit a sale--underlies the entire spam value proposition. However, our understanding of this critical behavior is quite limited, and the literature lacks any quantitative study concerning its true value. In this paper we present a methodology for measuring the conversion rate of spam. Using a parasitic infiltration of an existing botnet's infrastructure, we analyze two spam campaigns: one designed to propagate a malware Trojan, the other marketing on-line pharmaceuticals. For nearly a half billion spam e-mails we identify the number that are successfully delivered, the number that pass through popular anti-spam filters, the number that elicit user visits to the advertised sites, and the number of sales and infections produced.}, isbn = {9781595938107}, doi = {10.1145/1562164.1562190}, studentfirstname ={}, studentlastname ={}, summary = {}, contribution1 ={}, contribution2 ={}, contribution3 ={}, contribution4 ={}, contribution5 ={}, weakness1 = {}, weakness2 = {}, weakness3 = {}, weakness4 = {}, weakness5 = {}, interesting = {high/med/low}, opinions = {}, } @INPROCEEDINGS{ Levchenko2011, title = {{Click trajectories: End-to-end analysis of the spam value chain}}, author = {Levchenko, Kirill and Pitsillidis, Andreas and Chachra, Neha and Enright, Brandon and F{\'{e}}legyh{\'{a}}zi, M{\'{a}}rk and Grier, Chris and Halvorson, Tristan and Kanich, Chris and Kreibich, Christian and Liu, He and McCoy, Damon and Weaver, Nicholas and Paxson, Vern and Voelker, Geoffrey M and Savage, Stefan}, booktitle = {Proceedings - IEEE Symposium on Security and Privacy}, pages = {431--446}, year = {2011}, issn = {10816011}, abstract = {Spam-based advertising is a business. While it has engendered both widespread antipathy and a multi-billion dollar anti-spam industry, it continues to exist because it fuels a profitable enterprise. We lack, however, a solid understanding of this enterprise's full structure, and thus most anti-spam interventions focus on only one facet of the overall spam value chain (e.g., spam filtering, URL blacklisting, site takedown). In this paper we present a holistic analysis that quantifies the full set of resources employed to monetize spam email— including naming, hosting, payment and fulfillment—using extensive measurements of three months of diverse spam data, broad crawling of naming and hosting infrastructures, and over 100 purchases from spam-advertised sites. We relate these resources to the organizations who administer them and then use this data to characterize the relative prospects for defensive interventions at each link in the spam value chain. In particular, we provide the first strong evidence of payment bottlenecks in the spam value chain; 95{\%} of spam-advertised pharmaceutical, replica and software products are monetized using merchant services from just a handful of banks.}, isbn = {9780769544021}, doi = {10.1109/SP.2011.24}, studentfirstname ={}, studentlastname ={}, summary = {}, contribution1 ={}, contribution2 ={}, contribution3 ={}, contribution4 ={}, contribution5 ={}, weakness1 = {}, weakness2 = {}, weakness3 = {}, weakness4 = {}, weakness5 = {}, interesting = {high/med/low}, opinions = {}, } ; BibTex cross-references (don't add anything here)