Advantages and vulnerabilities of pull-based email-delivery

نویسندگان

  • Natascha Chrobok
  • Andrew Trotman
  • Richard A. O'Keefe
چکیده

Over the last decade spam has become a serious problem to email-users all over the world. Most of the daily email-traffic consists of this unwanted spam. There are various methods that have been proposed to fight spam, from IP-based blocking to filtering incoming email-messages. However it seems that it is impossible to overcome this problem as the number of email-messages that are considered spam is increasing. But maybe these techniques target the problem at the wrong side: it is the email-delivery protocol itself that fosters the existence of spam. What once was created to make internet-mail communication as easy and as reliable as possible became abused by modern day spammers. This paper proposes a different approach: instead of accepting all messages unquestioned it introduces a way to empower the receiver by giving him the control to decide if he wants to receive a message or not. By extending SMTP to pull messages instead of receiving them an attempt to stem the flood of spam is made. The pull-based approach works without involvement of the end-users. However this new system does not come without a price: it opens the possibility of a distributed denial of service (DDOS)-attacks against legitimate mail-transfer agents. This vulnerability and possible ways to overcome it are also discussed in this paper.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Push vs. Pull: Implications of Protocol Design on Controlling Unwanted Traffic

In this paper we argue that the difficulties in controlling unwanted Internet traffic, such as Email SPAM, stem from the fact that many Internet applications are fundamentally sender-driven and distinctly lack receiver control over traffic delivery. However, since only receivers know what they want to receive, receiverdriven approaches may often have clear advantages in restraining unwanted tra...

متن کامل

Detecting Denial of Service Message Flooding Attacks in SIP based Services

Increasing the popularity of SIP based services (VoIP, IPTV, IMS infrastructure) lead to concerns about its ‎security. The main signaling protocol of next generation networks and VoIP systems is Session Initiation Protocol ‎‎(SIP). Inherent vulnerabilities of SIP, misconfiguration of its related components and also its implementation ‎deficiencies cause some security concerns in SIP based infra...

متن کامل

The recognition of the necessity of for community-based disaster risk management to reduce the risk of vulnerability to earthquake disaster (case study: YousefAbad neighborhood of Tehran)

Disaster management and current attitudes in this area only focus on this areachr('39')s physical vulnerabilities, raising urban residentschr('39') exposure to these challenges in front of the earthquake. On the other hand, Incidental actions include reducing the vulnerability and the physical strengthening and promotion of poor organization during the disaster; they ignored the capabilities an...

متن کامل

Pull-in behavior of a bio-mass sensor based on an electrostatically actuated cantilevered CNT with consideration of rippling effect

This paper examines the pull-in behavior of a bio-mass sensor with a cantilevered CNT actuated electrostatically by considering rippling deformation. Although this phenomenon can remarkably change the behavior of CNT, its effect on the performance of a CNT-based mass sensor has not been investigated thus far. This investigation is based on modified Euler-Bernoulli beam theory and rippling effec...

متن کامل

Randomized controlled trial comparing four strategies for delivering e-curriculum to health care professionals [ISRCTN88148532]

BACKGROUND Internet education is increasingly provided to health professionals, but little is known about the most effective strategies for delivering the content. The purpose of this study is to compare four strategies for delivering an Internet-based (e-) curriculum on clinicians' knowledge (K), confidence (CONF), and communication (COMM) about herbs and other dietary supplements (HDS). MET...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010