iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation
نویسندگان
چکیده
A vast majority of spam emails today are sent from botnets with forged sender addresses. This has attracted researchers over the years to develop email sender authentication mechanism as a promising way to verify identity of the senders. In this paper we introduce iSATS, a new email sender authentication system based on Identity-based public key cryptography. iSATS leverages an identity based signature scheme to provide a reliable and easy way to bind the identity of legitimate sender to an email. Unlike the popular existing solutions like SPF and DKIM, it is hard for the spammer to adopt iSATS.
منابع مشابه
SMS based Advanced Sender Authentication Mechanism for Anti-Spam based on DomainKey
Electronic mail is playing an important role for communication among Internet users. However, the value of electronic mail is being impaired by spam mails including unwanted commercial information, virus mails including malignant codes and many different forms of unnecessary information. Thus, it is urgent to develop a method of blocking spam mails fundamentally. The present study proposes a me...
متن کاملTracking Email Reputation for Authenticated Sender Identities
With the amount of unsolicited emails on the rise, domain authentication schemes have been widely deployed to identify senders. Establishing a sender's identity does not guarantee its adherence to best practices. To maintain a history of sender activity, in our prior work, we had proposed RepuScore: a collaborative sender reputation framework and demonstrated its effectiveness using simulated l...
متن کاملHybrid spam filtering for mobile communication
Spam messages are an increasing threat to mobile communication. Several mitigation techniques have been proposed, including white and black listing, challenge-response and content-based filtering. However, none are perfect and it makes sense to use a combination rather than just one. We propose an anti-spam framework based on the hybrid of contentbased filtering and challenge-response. A messag...
متن کاملMitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles
In this paper, we present a general host identity-based technique for mitigating unsolicited traffic across different domains. We propose to tackle unwanted traffic by using a cross-layer technique based on the Host Identity Protocol (HIP). HIP authenticates traffic between two communicating end-points and its computational puzzle introduces a cost to misbehaving hosts. We present a theoretical...
متن کاملPreventing Spam Disguised as Error Mail
Some methods against spam are based on a principle that a recipient reads only messages from senders who are registered by the recipient (challenge and response). In these schemes, some exceptions are required to show error mail (bounce message) to a sender of an original message. However, spammers can abuse this exception to send spam to users. In this paper, we propose a new method which comb...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012