ISATS: Leveraging Identity Based Sender Authentication and Trust for Spam Mitigation: Difference between revisions

From NET Wiki
Jump to navigation Jump to search
No edit summary
 
(4 intermediate revisions by the same user not shown)
Line 3: Line 3:
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
|supervisor=[http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
|duration= 6 months
|duration= 6 months
|type= Bachelor Thesis
|type= Bachelor/Master/Student Thesis
|status= In progress (Tobias Kloht)
|status= Open
}}
}}


== Description ==
== Description ==
The explosive growth in the unsolicited email (spam) in the past decade [1] has made it impossible for email communications to function without spam protection/filtering. Currently, spam emails have largely outnumbered legitimate ones, increasing from 65% in 2005 to 89% (262 billion spam messages daily) in 2010. Despite that researchers and practitioners have developed and deployed a broad variety of systems intended to prevent spam; it remains a pressing problem of large scale.
The explosive growth in the unsolicited email (spam) in the past decade has made it impossible for email communications to function without spam protection/filtering. Currently, spam emails have largely outnumbered legitimate ones, increasing from 65% in 2005 to 89% (262 billion spam messages daily) in 2010. Despite that researchers and practitioners have developed and deployed a broad variety of systems intended to prevent spam; it remains a pressing problem of large scale.
The spam protection systems used today only filter spam from the user’s inbox (i.e. recipient’s edge), but the spam already travels the network, and provokes non-negligible cost to network operators in terms of bandwidth and infrastructure. On the other hand, content-based filtering [3, 4], one of the most widely adopted defense mechanism, has turned spam problem into false positive and negative one. In consequence, this makes email delivery unreliable.
The spam protection systems used today only filter spam from the user’s inbox (i.e. recipient’s edge), but the spam already travels the network, and provokes non-negligible cost to network operators in terms of bandwidth and infrastructure. On the other hand, content-based filtering, one of the most widely adopted defense mechanism, has turned spam problem into false positive and negative one. In consequence, this makes email delivery unreliable.


In recent years several techniques [5, 6 and 7] have been presented using social networks to fight spam. Unfortunately their services are only limited within the social network of an email user. At Computer Netwoks groups, in collaboration with Deutsche Telekom labs, we are actively working on LENS, a new spam protection system, which leverages anti-social networking paradigm based on an underlying trust infrastructure to both extend spam protection beyond a user’s social circle and fundamentally prevent the transmission of spam across the network at the first place.  . The key idea of this paradigm in LENS is to select email users called Gatekeepers (GKs), from outside the user’s social circle and within pre-defined social distances. Unless a GK vouches for the emails of potential senders from outside the social circle of a particular recipient, those e-mails are prevented from transmission.
In '''iSATS''' we will leverage the Identity of the email sender to authenticate the source. Further we will maintain a Trust Infrastructure to verify the legitimacy of email along with the sender. Following are the design requirements of iSATS.


The single most important question in the whole design is how to ensure that the GKs are non-malicious (and not spammers themselves). Obviously, we cannot simply assume they are non-malicious simply based on the fact that they are in the social network. Otherwise we can simply whitelist the whole social network.  
* Bind sender‘s identity to the domains, making the misbehaving sender visible.
 
* Mail Server (MS) take ownership of the messages they transmit (sender authentication).
The goal of this thesis is to design and implement a protocol for authenticating that the selected GKs (to vouch for spam free communication outside a user’s social circle) are legitimate and non-malicious GKs.  
* Each email user on the MS are assigned Trust Ratings (TR) to differentiate between legitimate and illegitimate users.
* MS at the receiver maintains local reputation of the sending MS.
* iSATS remains transparent to end users and operated at the SMTP time.


== Required Skills==
== Required Skills==

Latest revision as of 02:36, 16 January 2012

Details

Supervisor: Sufian Hameed
Duration: 6 months
Type: Bachelor/Master/Student Thesis
Status: Open


Description

The explosive growth in the unsolicited email (spam) in the past decade has made it impossible for email communications to function without spam protection/filtering. Currently, spam emails have largely outnumbered legitimate ones, increasing from 65% in 2005 to 89% (262 billion spam messages daily) in 2010. Despite that researchers and practitioners have developed and deployed a broad variety of systems intended to prevent spam; it remains a pressing problem of large scale. The spam protection systems used today only filter spam from the user’s inbox (i.e. recipient’s edge), but the spam already travels the network, and provokes non-negligible cost to network operators in terms of bandwidth and infrastructure. On the other hand, content-based filtering, one of the most widely adopted defense mechanism, has turned spam problem into false positive and negative one. In consequence, this makes email delivery unreliable.

In iSATS we will leverage the Identity of the email sender to authenticate the source. Further we will maintain a Trust Infrastructure to verify the legitimacy of email along with the sender. Following are the design requirements of iSATS.

  • Bind sender‘s identity to the domains, making the misbehaving sender visible.
  • Mail Server (MS) take ownership of the messages they transmit (sender authentication).
  • Each email user on the MS are assigned Trust Ratings (TR) to differentiate between legitimate and illegitimate users.
  • MS at the receiver maintains local reputation of the sending MS.
  • iSATS remains transparent to end users and operated at the SMTP time.

Required Skills

  • High motivation and ability to work independently and capability to learn quickly new concepts.
  • Basic understanding of computer networking
  • Good programming skills