Cryptographic Protocols to Prevent Spam
نویسنده
چکیده
Email's main (and initial) use is professional and personal communication. Email is very efficient, convenient and low-cost, especially when automatically sent by programs to many recipients ('bulk email'). Therefore, email is also used to distribute other messages: from unsolicited offerings and ads, to malicious content such as viruses and scams. Users are rarely interested in these messages; the result it that the vast majority of email messages are undesirable and discarded. These unwanted messages are often referred to as spam. Spam is very annoying to users, and wastes considerable time and resources of email users and service providers. There are few conventions for content labels, used to identify advertising or other potentially undesired messages. For example, some anti-spam legislation requires advertisers to use special prefixes such as 'ADV:' in the subject line [42, 43]. Messages that present correct content labels are not problematic, since they can be efficiently discarded by (most) users, who are not interested in them; therefore, we will exclude them from our definition of spam. Unfortunately, most messages containing potentially-undesired content do not contain appropriate content label, i.e. are spam. We therefore prefer to use the term spam to refer to undesirable messages without appropriate content label. Spam senders (spammers) not only avoid putting correct 'warning labels' on their messages, but in fact often use different evasive techniques to make it hard to distinguish between their spam messages and desirable professional/personal communication. For example, spammers may add spaces or other special characters between letters, or inject intentional, minor spelling errors (Viiagrra). Spamming wastes considerable machine and human resources-most notably, the recipient's time. Indeed, spamming is reducing the usefulness of email as a communication mechanism these days. Many users reduce or avoid the use of email, most users limit the distribution of their email address, and many desirable messages are lost by aggressive (human and automated) filtering. As a result, there are many proposals and mechanisms trying to control and prevent spam. Spam can be a problem in any open, efficient, low-cost messaging system, and indeed spam is used e.g. in instant messaging; most of our discussion is relevant to spam on any messaging technology. However, the problem is most acute, at least so far, for email, and therefore we will discuss also some email specific issues. We begin this manuscript by discussing the basic architecture and relevant properties of the email system, in Section 1, and the …
منابع مشابه
Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method
Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...
متن کاملControlling Spam by Secure Internet Content Selection
Unsolicited and undesirable e-mail (spam) is a growing problem for Internet users and service providers. We present the Secure Internet Content Selection (SICS) protocol, an efficient cryptographic mechanism for spam-control, based on allocation of responsibility (liability). With SICS, e-mail is sent with a content label, and a cryptographic protocol ensures labels are authentic and penalizes ...
متن کاملA Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors
Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...
متن کامل“Proof-of-Work” Proves Not to Work version 0.2
A frequently proposed method of reducing unsolicited bulk email (“spam”) is for senders to pay for each email they send. Proof-ofwork schemes avoid charging real money by requiring senders to demonstrate that they have expended processing time in solving a cryptographic puzzle. We consider how difficult that puzzle should be so as to be effective in preventing spam. We analyse this both from an...
متن کاملProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2005 شماره
صفحات -
تاریخ انتشار 2005