Distributed Quota Enforcement for Spam Control
نویسندگان
چکیده
Spam, by overwhelming inboxes, has made email a less reliable medium than it was just a few years ago. Spam filters are undeniably useful but unfortunately can flag non-spam as spam. To restore email’s reliability, a recent spam control approach grants quotas of stamps to senders and has the receiver communicate with a wellknown quota enforcer to verify that the stamp on the email is fresh and to cancel the stamp to prevent reuse. The literature has several proposals based on this general idea but no complete system design and implementation that: scales to today’s email load (which requires the enforcer to be distributed over many hosts and to tolerate faults in them), imposes minimal trust assumptions, resists attack, and upholds today’s email privacy. This paper describes the design, implementation, analysis, and experimental evaluation of DQE, a spam control system that meets these challenges. DQE’s enforcer occupies a point in the design spectrum notable for simplicity: mutually untrusting nodes implement a storage abstraction but avoid neighbor maintenance, replica maintenance, and heavyweight cryptography.
منابع مشابه
Spam-I-am: A Proposal for Spam Control using Distributed Quota Management
Email spam has reached alarming proportions because it costs virtually nothing to send email; even a small number of people responding to a spam message is adequate incentive for a spammer to send as many messages as possible. Since spammers need to send messages at high rates to as many recipients as they can, quotas on email senders could throttle spam. We argue for separating the allocation ...
متن کاملSupplement to " Distributed Quota Enforcement for Spam Control "
This report is a supplement to our paper “Distributed Quota Enforcement for Spam Control” [1]. We assume here that the reader has read the main paper. In this report, we first analyze the enforcer nodes’ key-value maps and then analyze two of the experiments from the main paper. 1 Analysis of Enforcer Nodes’ Key-Value Maps The key-value map used by an enforcer node is described in §4.2 of [1]. ...
متن کاملPreferences for Government Enforcement of a Common Pool Harvest Quota: Theory and Experimental Evidence from Fishing Communities in Colombia
We examine individual harvesters’ preferences for government enforcement of a quota imposed on the exploitation of a common pool resource. We develop a model of Nash behavior by identical risk neutral harvesters to explain individual equilibrium preferences for enforcement of an efficient harvest quota. If the quota is not enforced well, we demonstrate that individual harvesters will always pre...
متن کاملSearching For John Doe: Finding Spammers and Phishers
Microsoft has prosecuted a vigorous civil enforcement campaign against spammers and phishers. When initial investigation into a spam or phishing case fails to reveal the identity of the person(s) responsible, filing a “John Doe” lawsuit and following up with thorough third-party discovery has been an effective strategy to unmask the perpetrator.
متن کاملTowards Improving E-mail Content Classification for Spam Control: Architecture, Abstraction, and Strategies
This dissertation discusses techniques to improve the effectiveness and the efficiency of spam control. Specifically, layer-3 e-mail content classification is proposed to allow e-mail pre-classification (for fast spam detection at receiving e-mail servers) and to allow distributed processing at network nodes for fast spam detection at spam control points, e.g., at e-mail servers. Fast spam dete...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006