Abstract
Current anti-spam tools focus on filtering incoming e-mails. The scope of these tools is limited to local administrative domains. With such limited information, it is difficult to make accurate spam control decisions. We observe that sending servers process more information on their outgoing e-mail traffic than receiving servers do on their incoming traffic. Better spam control can be achieved if e-mail servers collaborate with one another by checking both outgoing and incoming traffic. However, the control of outgoing traffic provides little direct benefit to the sending server. Servers in different administrative domains presently have little incentive to improve spam control on other receiving servers, which hampers a move toward cross-domain collaboration. We propose a collaborative framework in which spam control decisions are drawn from the data aggregated within a group of e-mail servers across different administrative domains. The collaboration provides incentive for outgoing spam control. The servers that contribute to the control of outgoing spam are rewarded, while traffic restriction is imposed on the irresponsible servers. A Federated Security Context (FSC) is established to enable transparent negotiation of multilateral decisions among the group of collaborators without common trust. Information from trusted collaborators counts more for one’s final decision compared to information from untrustworthy servers. The FSC mitigates potential threats of fake information from malicious servers. The collaborative approach to spam control is more efficient than a decision in isolation, providing dynamic identification and adaptive restriction to spam generators.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
RFC 2554 – SMTP Service Extension for Authentication
RFC 3207 – SMTP Service Extension for Secure SMTP over Transport Layer Security
Zhou, L., Neuman, C.: Negotiation of Multilateral Security Decisions for Grid Computing. Technical Report TR 2004-15 (October 8, 2004)
Nash, J.F.: Non-Cooperative Games. The Annals of Mathematics 54(2), 286–295 (1951)
Poundstone, W.: Prisoner’s Dilemma: John von Neumann, Game Theory, and the Puzzle of the Bomb. Oxford University Press, Oxford (1993)
SpamAssassin, http://spamassassin.apache.org
Mirkovic, J., Robinson, M., Reiher, P.: Alliance Formation for DDoS Defense. In: Proceedings of the 2003 Workshop on New Security Paradigms, Ascona, Switzerland (2003)
Papadopoulos, C., Lindell, R., Mhreinger, J., Hussain, A., Govindan, R.: COSSACK, Coordinated Suppression of Simultaneous Attacks. In: DARPA Information Survivability Conference and Exposition, Washington, DC, USA (2003)
Kaushik, S., Ammann, P., Wijesekera, D., Winsborough, W., Ritchtey, R.: A Policy Driven Approach for E-mail Services. In: Fifth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), New York, USA (2004)
Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: A P2P-Based Collaborative Spam Detection and Filtering. In: The Fourth IEEE International Conference on P2P Computing, Zurich, Switzerland, August 24-27 (2004)
Distributed Checksum Clearinghouse: http://www.rhyolite.com/anti-spam/dcc/
SmartScreen, Microsoft Adds New Spam Filtering Technology Across E-Mail Platforms (November 17, 2003), http://www.microsoft.com/presspass/press/
Cloudmark: http://www.cloudmark.com/
Distributed Sender Blackhole List, http://www.dsbl.org
Postel, J.: Simple Mail Transfer Protocol. RFC 821 Internet Engineering Task Force (1982)
Jacob, P.: The Spam Problem: Moving Beyond RBLs (January 3, 2003), http://theory.whirlycott.com/~phil/antispam/rbl-bad/rbl-bad.html
Goodman, J., Rounthwaite, R.: Stopping Outgoing Spam. In: ACM Conference on Electronic Commerce, New York (2004)
Naor, M.: Verification of a Human in the Loop or Identification via the Turing Test (manuscript 1996), http://www.wisdom.weizmann.ac.il/~naor/
Jung, J., Sit, E.: An Empirical Study of Spam traffic and the Use of DNS Black Lists. In: Internet Measurement Conference, Taormina, Italy (2004)
Zhou, L., Neuman, C.: Establishing Agreements in Dynamic Virtual Organizations. In: IEEE SECOVAL Workshop of SECURECOMM 2005, Athens, Greece, September 5-9 (2005)
Nowostawski, M., Purvis, M., Cranefield, S.: OPAL A Multi-level Infrastructure for Agent-Oriented Development. In: Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2002), pp. 88–89. ACM Press, New York (2002)
FIPA. Foundation For Intelligent Physical Agents (FIPA): FIPA, Specifications (2000), http://www.fipa.org/specifications/index.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Foukia, N., Zhou, L., Neuman, C. (2006). Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds) Trust Management. iTrust 2006. Lecture Notes in Computer Science, vol 3986. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11755593_7
Download citation
DOI: https://doi.org/10.1007/11755593_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34295-3
Online ISBN: 978-3-540-34297-7
eBook Packages: Computer ScienceComputer Science (R0)