DocumentCode :
3322890
Title :
Controlling spam and spear phishing via peered network overlays and non-repudiable traceback
Author :
Neville, Stephen W. ; Horie, Michael
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Victoria, Victoria, BC, Canada
fYear :
2011
fDate :
7-9 Nov. 2011
Firstpage :
1
Lastpage :
13
Abstract :
Despite 30 years of on-going effort, spam remains a significant problem. While technology has abated the deluge of spam invading the average user´s email inbox, spam still facilitates the sale of counterfeited products, distribution of malware, and other criminal activities - as well as the more insidious use of spear phishing to leverage attacks into corporate and government networks. The value of email arises directly from its anyone-to-anyone message-passing capability. Hence, anti-spam techniques based on end-point encryption have met with limited success. Furthermore, due to geopolitical concerns, most traceback techniques only work effectively within - and not across - geopolitical boundaries; and while targeted removal of spam-friendly ISPs and botnets has had significant impacts on spam rates, these gains have tended to be short lived. This work proposes a novel approach to control spam and spear phishing through combining peer-level quality-of-service (QoS) agreements with a ProVerif verified, non-repudiable traceback protocol to enact spam resistant overlays that are: i) scalable, ii) enforceable over geopolitical boundaries, and iii) do not require technological sea changes. Simulation results on an Internet-style network of 3,000 ISPs show that even in the presence of aggressive spammers, it is possible to reduce the spam versus normal email equilibrium from 90:10 to 20:80. Furthermore, this approach can be used to aid in controlling spear phishing attacks targeting federated organizations.
Keywords :
cryptography; message passing; peer-to-peer computing; protocols; quality of service; unsolicited e-mail; ProVerif; antispam techniques; anyone-to-anyone message passing capability; botnets; email inbox; end point encryption; geopolitical boundaries; nonrepudiable traceback; nonrepudiable traceback protocol; peer level quality-of-service agreements; peered network overlays; spam control; spear phishing; targeted spam friendly ISP removal; traceback techniques; Electronic mail; Government; Internet; Protocols; Quality of service; Servers;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
eCrime Researchers Summit (eCrime), 2011
Conference_Location :
San Diego, CA
ISSN :
2159-1237
Print_ISBN :
978-1-4577-1340-8
Electronic_ISBN :
2159-1237
Type :
conf
DOI :
10.1109/eCrime.2011.6151976
Filename :
6151976
Link To Document :
بازگشت