enhancing email address privacy on anti spam l.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Enhancing Email Address Privacy on Anti-SPAM PowerPoint Presentation
Download Presentation
Enhancing Email Address Privacy on Anti-SPAM

Loading in 2 Seconds...

play fullscreen
1 / 20

Enhancing Email Address Privacy on Anti-SPAM - PowerPoint PPT Presentation


  • 242 Views
  • Uploaded on

Enhancing Email Address Privacy on Anti-SPAM by Dou Wang and Ying Chen School of Computer Science University of Windsor October 2007 Contents Introduction Related Works Our Proposed Method Advantages Conclusion Introduction SPAM Consume recipients’ time and work

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Enhancing Email Address Privacy on Anti-SPAM' - elina


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
enhancing email address privacy on anti spam

Enhancing Email Address Privacy on Anti-SPAM

by

Dou Wang and Ying Chen

School of Computer Science

University of Windsor

October 2007

contents
Contents
  • Introduction
  • Related Works
  • Our Proposed Method
  • Advantages
  • Conclusion
introduction
Introduction
  • SPAM
  • Consume recipients’ time and work
  • Consume resources of Mail Transfer Agents (MTAs)
  • Deliver with virus, spy-ware and/or ad-ware
  • Contain phishing content to break the users’ privacy
introduction4
Introduction
  • Jupiter Research estimates the average e-mail user will receive more than 3,900 spam mails per year by 2007, up from just 40 in 1999, and Ferris Research estimates spam costs U.S. companies 10 billion in 2003 and a user spends on the average 4 seconds to process a SPAM mail. [1]
related works
Related works
  • Anti-spam Solutions Category
  • Filtering [2]
    • Origin-based filtering
    • Content-based filtering
    • Traffic-based filtering
  • Policy-Control
  • Human-interactive

Completely Automatic Public Turing Test to tell Computer and Humans Apart (CAPTCHA) [3]

  • Address-hiding
related works6
Related works
  • Filtering
  • Origin-based filter checks sender information with certain keywords, string styles and compares with recipients’ whitelist and blacklist.
  • Content-based filter analyzes the body content of the email message by complex algorithms and maintain the knowledge base to realize self-learning.
  • Traffic-based filter examines the network traffic on the email server and gather the server logging information to determine the spam probability.
related works7
Related works

User interface of SOPHOS spam filter about quarantine and whitelist and blacklist.

related works8
Related works
  • Policy-Control
  • Non-technical policy restriction. More and more governments defined regulations and acts to restrict spammers performing the spam spreading.
  • Technical policy restriction. Change the protocol regulation can restrict spam message delivery for the technology that the spammers currently are using.
related works9
Related works
  • Human-Interactive
  • Completely Automatic Public Turing Test to Tell Computer and Humans Apart (CAPTCHA)

Ttriggered by the recipient MTA to send a verification string back to sender to verify the sender is a real human.

Samples of CAPTCHA string

related works10
Related works
  • Address-hiding

Hide the unique character in the email address, the symbol @

userid@domain.comuserid at domain dot com

our proposed method
Our Proposed Method
  • Make email addresses on the Internet be unsearchable by scanning program.
  • Encrypt both sender and recipients email addresses to prevent hijacking during the transferring.
our proposed method12
Our Proposed Method
  • How the spammers get bulk email addresses
  • Buy the millions of email addresses from some organizations.
  • Scan the Internet addresses from the Internet web pages or some web pages that contain email addresses.
our proposed method13
Our Proposed Method
  • Make email addresses on the Internet be unreachable by scanning program

username@company.com

<br><div> username@company.ca</div></br>

<img src="/imgs/emailaddress/username.gif" />

our proposed method14
Our Proposed Method
  • Encrypt both sender and recipients email addresses to prevent hijacking during the transferring
  • The MTA randomly generates a MessageID and assign it to the email which arrived to the MTA.
  • Before sending out the email message to destination MTA, sender relay host sends a SMTP socket with MessageID to recipient MTA to ask for returning a key generated by using the MessageID on the recipient server.
our proposed method15
Our Proposed Method
  • Encrypt both sender and recipients email addresses to prevent hijacking during the transferring (continue)
  • Sender MTA uses this key to encrypt all the email addresses in the message (SendTo, CopyTo and From, etc) to generate the encrypted code for the part of email address before “@” symbol.

userid@gmail.com1Qerg4mF7@gmail.com

  • After the message arrived the recipient MTA, the host uses the original MessageID to decrypt the email addresses in the email message and assign a new MessageID for delivery.
our proposed method16
Our Proposed Method

Diagram of encoding email addresses

advantages
Advantages
  • Reduces the SPAM from the root.
  • Compatibility and maintain the standard.
  • Low cost of network traffic.
  • Easy to implement.
  • Gain the initiative in the anti-spam combat.
conclusions
Conclusions
  • The first approach convert posted email addresses to graphical pictures rather than expose the character strings to prevent spammers use scanning program to search them out.
  • The second approach use an encryption method to secure the email addresses to avoid hijacking during the email transferring.
references
References
  • [1] Ming-Wei Wu; Yennun Huang; Shyue-Kung Lu; Ing-Yi Chen; Sy-Yen Kuo, “A Multi-faceted approach towards spam-resistible mail”, Dependable Computing, 2005. Proceeding, 11th Pacific Rim International Symposium, Page(s): 9 pp, Dec, 2005.
  • [2] Yanhui Guo; Yaolong Zhang; Jianyi Liu; Cong Wang, “Research on the Comprehensive Anti-Spam Filter”, Industrial Informatics, 2006 IEEE International Conference, Page(s) 1069-1074, Aug, 2006
  • [3] Sajad Shirali-Shahreza; Ali Movaghar, “A New Anti-Spam Protocol Using CAPTCHA”, Networking, Sensing and Control, 2007 IEEE International Conference, Page(s) 234-238, April, 2007