Please use this identifier to cite or link to this item: http://hdl.handle.net/1843/ESBF-AE8R2C
Full metadata record
DC FieldValueLanguage
dc.contributor.advisor1Wagner Meira Juniorpt_BR
dc.contributor.advisor-co1Italo Fernando Scota Cunhapt_BR
dc.contributor.referee1Italo Fernando Scota Cunhapt_BR
dc.contributor.referee2Cristine Hoeperspt_BR
dc.contributor.referee3Dorgival Olavo Guedes Netopt_BR
dc.contributor.referee4Klaus Steding-jessenpt_BR
dc.creatorOsvaldo Luis Henriques de Morais Fonsecapt_BR
dc.date.accessioned2019-08-11T03:14:38Z-
dc.date.available2019-08-11T03:14:38Z-
dc.date.issued2016-03-28pt_BR
dc.identifier.urihttp://hdl.handle.net/1843/ESBF-AE8R2C-
dc.description.abstractSpam messages are often used to propagate malware, to disseminate phishing exploits, and to advertise illegal products. Those messages generate costs for users and network operators, but it is hard to measure how much of their costs are associated with spam traffic, and who actually pays for it. In this work, we provide a method to quantify the transit costs of spam traffic. We issue traceroutes from RIPE Atlas vantage points to estimate the routes traversed by spam messages collected at five honeypots. These collectors simulate vulnerable machines and lead spammers to believe they are interacting with legitimate open relays and proxies. Then we map IP-level traceroute measurements to AS-level paths and use the database of inter-network business relationships to infer the spam traffic costs. Our results show that stub networks are systematically subject to high spam traffic costs and that large ASes can receive twice with the spam traffic of the same message. Furthermore, we show that some networks profit from spam traffic and might not be interested in filtering spam; other networks, even paying for spam traffic, when they can foward these messages to their customers may not be interested in filtering them. Finally, we present a simple but effective algorithm to identify the networks that would benefit in cooperating to filter spam traffic at the origin to reduce transit costs.pt_BR
dc.description.resumoMensagens de spam são utilizadas na propagação de malware, disseminação de phishing e na divulgação de produtos ilegais. Essas mensagens geram custos para usuários e operadores de rede, porém é difícil mensurar quanto desse custo está associado ao tráfego de spam e quem paga por esse tráfego. Neste trabalho, propusemos uma metodologia para quantificar o custo do tráfego de spam para os operadores de rede. Identificamos as rotas percorridas pelas mensagens de spam capturadas por cinco coletores. Combinando o volume do tráfego de spam, as rotas inferidas e a base de dados de relações entre ASes, mostramos que redes de borda são sistematicamente oneradas. Além disso, mostramos que algumas redes lucram com o tráfego de spam e provavelmente não estão interessadas em filtrar esse tráfego. Finalmente, apresentamos um algoritmo simples mas eficiente para identificar redes que se beneficiariam em cooperar na filtragem de spam para reduzir os custos associados ao tráfego de spam.pt_BR
dc.languagePortuguêspt_BR
dc.publisherUniversidade Federal de Minas Geraispt_BR
dc.publisher.initialsUFMGpt_BR
dc.rightsAcesso Abertopt_BR
dc.subjectSpampt_BR
dc.subjectTécnicas de mediçãopt_BR
dc.subjectTopologia de redept_BR
dc.subject.otherTelecomunicações Tráfego Custospt_BR
dc.subject.otherSpam (Mensagens eletrônicas)pt_BR
dc.subject.otherComputaçãopt_BR
dc.subject.otherRedes de computadorespt_BR
dc.titleMedição, caracterização e redução dos custos associados ao tráfego de spampt_BR
dc.typeDissertação de Mestradopt_BR
Appears in Collections:Dissertações de Mestrado

Files in This Item:
File Description SizeFormat 
osvaldoluishenriquesfonseca.pdf4.08 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.