ISATS: Leveraging Identity Based Sender Authentication and Trust for Spam Mitigation: Difference between revisions

no edit summary
No edit summary
No edit summary
Line 11: Line 11:
The spam protection systems used today only filter spam from the user’s inbox (i.e. recipient’s edge), but the spam already travels the network, and provokes non-negligible cost to network operators in terms of bandwidth and infrastructure. On the other hand, content-based filtering, one of the most widely adopted defense mechanism, has turned spam problem into false positive and negative one. In consequence, this makes email delivery unreliable.
The spam protection systems used today only filter spam from the user’s inbox (i.e. recipient’s edge), but the spam already travels the network, and provokes non-negligible cost to network operators in terms of bandwidth and infrastructure. On the other hand, content-based filtering, one of the most widely adopted defense mechanism, has turned spam problem into false positive and negative one. In consequence, this makes email delivery unreliable.


In recent years several techniques [5, 6 and 7] have been presented using social networks to fight spam. Unfortunately their services are only limited within the social network of an email user. At Computer Netwoks groups, in collaboration with Deutsche Telekom labs, we are actively working on LENS, a new spam protection system, which leverages anti-social networking paradigm based on an underlying trust infrastructure to both extend spam protection beyond a user’s social circle and fundamentally prevent the transmission of spam across the network at the first place.  . The key idea of this paradigm in LENS is to select email users called Gatekeepers (GKs), from outside the user’s social circle and within pre-defined social distances. Unless a GK vouches for the emails of potential senders from outside the social circle of a particular recipient, those e-mails are prevented from transmission.
In iSATS we will leverage the Identity of the email sender to authenticate the source. Further we will maintain a Trust Infrastructure to verify the legitimacy of email along with the sender. Following are the design requirements of iSATS


The goal of this thesis is to design and implement a protocol for authenticating that the selected GKs (to vouch for spam free communication outside a user’s social circle) are legitimate and non-malicious GKs.
* Bind sender‘s identity to the domains, making the misbehaving sender visible
* Mail Server (MS) take ownership of the messages they transmit (sender authentication)
* Each email user on the MS are assigned Trust Ratings (TR) to differentiate between legitimate and illegitimate users
* MS at the receiver maintains local reputation of the sending MS
* iSATS remains transparent to end users and operated at the SMTP time


== Required Skills==
== Required Skills==
55

edits