Resisting SPAM Delivery by TCP Damping
نویسندگان
چکیده
Spam has become a major problem that is threatening the efficiency of the current email system. Spam is overwhelming the Internet because 1) emails are pushed from senders to receivers without much control from recipients, and 2) the cost for delivering emails is very low. In this paper, we present an anti-spam framework that slows down spammers: by adding delay to email delivery, and by consuming more sender resources. Both delay and resource consumption are controlled based on the likelihood of the source of email messages being a spammer, so that our technique only impact the spammers and has negligible impact on normal email senders. The mechanisms are implemented in the TCP level at the recipient side without requiring any modifications at the sender side. Our evaluations show that selectively delaying connections can effectively slow down a spammer thousands of times when they use a simple setup or use open relays. The mechanism of increasing sender’s resource consumption can significantly slow down spammers even when they are spamming from their own optimized servers.
منابع مشابه
Performance Evaluation of Curved-TADAS Damper on Seismic Response of Moment Resisting Steel Frame
In this study, the performance of triangular added damping and stiffness (TADAS) dampers combined with curved dampers (Curved-TADAS damper) is evaluated in moment resisting steel frame (MRSF). These dampers are passive and install in the beam-column connection region. Variable parameters of this study involve the width of curved damper (50, 75 and 100 mm), the thickness of TADAS damper (5 and 1...
متن کاملEvaluating The Use of Spam-triggered TCP/IP Rate Control To Protect SMTP Servers
This paper examines an approach to spam mitigation that rate limits incoming TCP/IP connections to an SMTP server based on the real-time detection of spam within the SMTP message exchange. Our approach is motivated by a desire to cause increased resource consumption at the spammer end of each SMTP connection, and to avoid the negative impact of falsepositives by eventually allowing all emails t...
متن کاملRouter-Level Spam Filtering Using TCP Fingerprints: Architecture and Measurement-Based Evaluation
Email spam has become costly and difficult to manage in recent years. Many of the mechanisms used for controlling spam are located at local SMTP servers and end-host machines. These mechanisms can place a significant burden on mail servers and end-host machines as the number spam messages received continues to increase. We propose a preliminary architecture that applies spam detection filtering...
متن کاملResisting Tag Spam by Leveraging Implicit User Behaviors
Tagging systems are vulnerable to tag spam attacks. However, defending against tag spam has been challenging in practice, since adversaries can easily launch spam attacks in various ways and scales. To deeply understand users’ tagging behaviors and explore more effective defense, this paper first conducts measurement experiments on public datasets of two representative tagging systems: Del.icio...
متن کاملMitigating Email Spam by Statistical Rejection of TCP Connections Using Recent Sender History
Email spam is a significant problem for ISPs and Internet users. While part of the solution is legislative, there remains many avenues for innovative technological spammitigation techniques. We propose a novel TCP-layer algorithm that statistically accepts or rejects in-bound TCP connection requests based on the recent past history of spam injection from particular source IP addresses. Our sche...
متن کامل