Download now Free registration required
Spam mitigation can be broadly classified into two main approaches: centralized security infrastructures that rely on a limited number of trusted monitors to detect and report malicious traffic; and highly distributed systems that leverage the experiences of multiple nodes within distinct trust domains. The first approach offers limited threat coverage and slow response times, and it is often proprietary. The second approach is not widely adopted, partly due to the lack of guarantees regarding the trustworthiness of nodes that comprise the system.
- Format: PDF
- Size: 250.1 KB