iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation

نویسندگان

  • Sufian Hameed
  • Tobias Kloht
  • Xiaoming Fu
چکیده

A vast majority of spam emails today are sent from botnets with forged sender addresses. This has attracted researchers over the years to develop email sender authentication mechanism as a promising way to verify identity of the senders. In this paper we introduce iSATS, a new email sender authentication system based on Identity-based public key cryptography. iSATS leverages an identity based signature scheme to provide a reliable and easy way to bind the identity of legitimate sender to an email. Unlike the popular existing solutions like SPF and DKIM, it is hard for the spammer to adopt iSATS.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

SMS based Advanced Sender Authentication Mechanism for Anti-Spam based on DomainKey

Electronic mail is playing an important role for communication among Internet users. However, the value of electronic mail is being impaired by spam mails including unwanted commercial information, virus mails including malignant codes and many different forms of unnecessary information. Thus, it is urgent to develop a method of blocking spam mails fundamentally. The present study proposes a me...

متن کامل

Tracking Email Reputation for Authenticated Sender Identities

With the amount of unsolicited emails on the rise, domain authentication schemes have been widely deployed to identify senders. Establishing a sender's identity does not guarantee its adherence to best practices. To maintain a history of sender activity, in our prior work, we had proposed RepuScore: a collaborative sender reputation framework and demonstrated its effectiveness using simulated l...

متن کامل

Hybrid spam filtering for mobile communication

Spam messages are an increasing threat to mobile communication. Several mitigation techniques have been proposed, including white and black listing, challenge-response and content-based filtering. However, none are perfect and it makes sense to use a combination rather than just one. We propose an anti-spam framework based on the hybrid of contentbased filtering and challenge-response. A messag...

متن کامل

Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles

In this paper, we present a general host identity-based technique for mitigating unsolicited traffic across different domains. We propose to tackle unwanted traffic by using a cross-layer technique based on the Host Identity Protocol (HIP). HIP authenticates traffic between two communicating end-points and its computational puzzle introduces a cost to misbehaving hosts. We present a theoretical...

متن کامل

Preventing Spam Disguised as Error Mail

Some methods against spam are based on a principle that a recipient reads only messages from senders who are registered by the recipient (challenge and response). In these schemes, some exceptions are required to show error mail (bounce message) to a sender of an original message. However, spammers can abuse this exception to send spam to users. In this paper, we propose a new method which comb...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012