Skip to main content

Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail

  • Conference paper
Book cover Trust Management (iTrust 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3986))

Included in the following conference series:

Abstract

Current anti-spam tools focus on filtering incoming e-mails. The scope of these tools is limited to local administrative domains. With such limited information, it is difficult to make accurate spam control decisions. We observe that sending servers process more information on their outgoing e-mail traffic than receiving servers do on their incoming traffic. Better spam control can be achieved if e-mail servers collaborate with one another by checking both outgoing and incoming traffic. However, the control of outgoing traffic provides little direct benefit to the sending server. Servers in different administrative domains presently have little incentive to improve spam control on other receiving servers, which hampers a move toward cross-domain collaboration. We propose a collaborative framework in which spam control decisions are drawn from the data aggregated within a group of e-mail servers across different administrative domains. The collaboration provides incentive for outgoing spam control. The servers that contribute to the control of outgoing spam are rewarded, while traffic restriction is imposed on the irresponsible servers. A Federated Security Context (FSC) is established to enable transparent negotiation of multilateral decisions among the group of collaborators without common trust. Information from trusted collaborators counts more for one’s final decision compared to information from untrustworthy servers. The FSC mitigates potential threats of fake information from malicious servers. The collaborative approach to spam control is more efficient than a decision in isolation, providing dynamic identification and adaptive restriction to spam generators.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. RFC 2554 – SMTP Service Extension for Authentication

    Google Scholar 

  2. RFC 3207 – SMTP Service Extension for Secure SMTP over Transport Layer Security

    Google Scholar 

  3. Zhou, L., Neuman, C.: Negotiation of Multilateral Security Decisions for Grid Computing. Technical Report TR 2004-15 (October 8, 2004)

    Google Scholar 

  4. Nash, J.F.: Non-Cooperative Games. The Annals of Mathematics 54(2), 286–295 (1951)

    Article  MathSciNet  MATH  Google Scholar 

  5. Poundstone, W.: Prisoner’s Dilemma: John von Neumann, Game Theory, and the Puzzle of the Bomb. Oxford University Press, Oxford (1993)

    Google Scholar 

  6. SpamAssassin, http://spamassassin.apache.org

  7. Mirkovic, J., Robinson, M., Reiher, P.: Alliance Formation for DDoS Defense. In: Proceedings of the 2003 Workshop on New Security Paradigms, Ascona, Switzerland (2003)

    Google Scholar 

  8. Papadopoulos, C., Lindell, R., Mhreinger, J., Hussain, A., Govindan, R.: COSSACK, Coordinated Suppression of Simultaneous Attacks. In: DARPA Information Survivability Conference and Exposition, Washington, DC, USA (2003)

    Google Scholar 

  9. Kaushik, S., Ammann, P., Wijesekera, D., Winsborough, W., Ritchtey, R.: A Policy Driven Approach for E-mail Services. In: Fifth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), New York, USA (2004)

    Google Scholar 

  10. Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: A P2P-Based Collaborative Spam Detection and Filtering. In: The Fourth IEEE International Conference on P2P Computing, Zurich, Switzerland, August 24-27 (2004)

    Google Scholar 

  11. Razor: http://razor.sourceforge.net/

  12. Distributed Checksum Clearinghouse: http://www.rhyolite.com/anti-spam/dcc/

  13. SmartScreen, Microsoft Adds New Spam Filtering Technology Across E-Mail Platforms (November 17, 2003), http://www.microsoft.com/presspass/press/

  14. Cloudmark: http://www.cloudmark.com/

  15. Distributed Sender Blackhole List, http://www.dsbl.org

  16. Postel, J.: Simple Mail Transfer Protocol. RFC 821 Internet Engineering Task Force (1982)

    Google Scholar 

  17. Jacob, P.: The Spam Problem: Moving Beyond RBLs (January 3, 2003), http://theory.whirlycott.com/~phil/antispam/rbl-bad/rbl-bad.html

  18. Goodman, J., Rounthwaite, R.: Stopping Outgoing Spam. In: ACM Conference on Electronic Commerce, New York (2004)

    Google Scholar 

  19. Naor, M.: Verification of a Human in the Loop or Identification via the Turing Test (manuscript 1996), http://www.wisdom.weizmann.ac.il/~naor/

  20. Jung, J., Sit, E.: An Empirical Study of Spam traffic and the Use of DNS Black Lists. In: Internet Measurement Conference, Taormina, Italy (2004)

    Google Scholar 

  21. Zhou, L., Neuman, C.: Establishing Agreements in Dynamic Virtual Organizations. In: IEEE SECOVAL Workshop of SECURECOMM 2005, Athens, Greece, September 5-9 (2005)

    Google Scholar 

  22. Nowostawski, M., Purvis, M., Cranefield, S.: OPAL A Multi-level Infrastructure for Agent-Oriented Development. In: Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2002), pp. 88–89. ACM Press, New York (2002)

    Google Scholar 

  23. FIPA. Foundation For Intelligent Physical Agents (FIPA): FIPA, Specifications (2000), http://www.fipa.org/specifications/index.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Foukia, N., Zhou, L., Neuman, C. (2006). Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds) Trust Management. iTrust 2006. Lecture Notes in Computer Science, vol 3986. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11755593_7

Download citation

  • DOI: https://doi.org/10.1007/11755593_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34295-3

  • Online ISBN: 978-3-540-34297-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics