Open Access Open Access  Restricted Access Subscription or Fee Access

Spam Weeding, Detection and Filtering On P2P System

M. Packiavathy, K. Saruladha

Abstract


Domain Keys Identified Mail (DKIM) defines a mechanism for using digital signatures on E-Mail at the domain level,allowing the receiving domain to confirm that E-Mail came from the domain it claims to. Erasure codes introduce pollution attack, an attack in which the adversary injects packets to disrupt the erasure decoding procedure and consequently denies the authentication service to the receiver. This paper modifies the DKIM by encrypting the content of the E-Mail and proposes a new lightweight, pollution-attack resistant multicast authentication scheme (PARM), which generates evidence that receivers can validate on a fast, per-packet basis.


Keywords


DKIM, Pollution attack, Evidence, PARM.

Full Text:

PDF

References


Tu Ouyang and Michael Rabinovich, “Weeding Spammers at the Root : A Precise Approach to Spam Reduction,” IEEE Transactions on EECS Department, 2008.

Barry Leiba, Jim Fenton, “DomainKeys Identified Mail (DKIM)UsingDigital Signatures for Domain Verification,” CEAS 2007 – Fourth Conference on Email and Anti-Spam, 2007.

Ya-Jeng Lin, Shiuhpyng Shieh, Warren W. Lin, “Lightweight, Pollution - Attack Resistant Multicast Authentication Scheme,” ASIACCS’06,March 21–24, 2006.

Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi,Pierangela Samarati, “P2P-Based Collaborative Spam Detection and Filtering, ” Fifth International Conference on Information Security, page(s):163 – 169, October 2006.

Erkut Sinan Ayla Havelsan,Ankara,Attila Ozgit, “An Architecture for End-to-End and Inter-Domain Trusted Mail Delivery Service,” IEEE International Symposium on Computer Networks, 2006.

Haixia Cao, Jianshe Dong, “Multi-Agent Interaction Based Collaborative P2P System for Fighting Spam,” IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006.

Brian Neil Levine, Clay Shields, N. Boris Margolin, “A Survey of Solutions to the Sybil Attack,” International Symposium on Communications and Information Technologies, page(s):1213 – 1218, October 2007.

Julian Jang, Surya Nepal, John Zic, “Trusted Email Protocol: Dealing with Privacy Concerns from Malicious Email Intermediaries,” 8th IEEE International Conference on Computer and Information Technology, July 2008.

Prithula Dhungel, Xiaojun Hei, Keith W. Ross, and Nitesh Saxena, “ThePollution Attack in P2P Live Video Streaming: Measurement Results and Defenses,” Proceedings of the workshop on Peer-to-peer streaming,page(s): 323-328, 2007.

Jian Liang, Rakesh Kumar, Yongjian Xi and Keith W. Ross, “Pollution in P2P File Sharing Systems,” 24th Annual Joint Conference of the IEEE Computer and Communications Societies, March 2005.

http://www.wikipedia.com

http://www.ieeexplore.ieee.org

http://www.bb-warez.com

http://msdn.microsoft.com/msdnmag/issues/01/02/net

peers/print.asp

http://www.microsoft.com/technet/prodtechnol/winxppro/deploy/p2pintro.mspx?pf=true

http://citeseer.nj.nec.com/pujol02extracting.html


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.