PR3 Email Honeypot

作者: Patroklos Argyroudis

DOI:

关键词: SpamtrapComputer sciencePrivacy policyEmail bombPrivate information retrievalEmail addressSpammingEmail address harvestingInternet privacyHoneypotComputer security

摘要: Although there are different tools and technologies available to prevent attacks on privacy when online applications used, few for detection of actions that violate agreements. The loss third parties obtain email addresses users without their consent can be followed by unsolicited emails – known as spam sent the open communication channel. In this case, is aggravated cost spent people having go through all these messages. However, also used detect Websites default policy giving away private information, such addresses. If received an address has only been given a single Website, we may conclude Website either spammer or very poor security. registration with should avoided. paper, present tool exchange subscribers’ between providers check whether have respected advertised policies.

参考文章(16)
M. Gittler, Pete Bramhall, Marco Casassa Mont, Joe Pato, M. Casassa Mont, Owen Rees, Mickey Gittler, P. Bramhall, Identity Management: a Key e-Business Enabler ,(2002)
Oliver Berthold, Heinrich Langos, Dummy traffic against long term intersection attacks privacy enhancing technologies. pp. 110- 128 ,(2002) , 10.1007/3-540-36467-6_9
L. Spitzner, Honeypots: Tracking Hackers ,(2002)
Lawrence Lessig, Lillian R. Berkman, Ching-Yi Liu, The Architecture of Privacy ,(1998)
James A. Landay, Jason I. Hong, Xiaodong Jiang, Approximate Information Flows: Socially-Based Modeling of Privacy in Ubiquitous Computing ubiquitous computing. pp. 176- 193 ,(2002) , 10.5555/647988.741485
Massimo Marchiori, Lorrie Cranor, Marc Langheinrich, Martin Presler-Marshall, Joseph Reagle, The platform for privacy preferences 1.0 (p3p1.0) specification W3C Recommendation. ,(2002)
Luis von Ahn, Manuel Blum, Nicholas J. Hopper, John Langford, CAPTCHA: using hard AI problems for security theory and application of cryptographic techniques. pp. 294- 311 ,(2003) , 10.1007/3-540-39200-9_18