Abstract
Spam turns out to be an increasingly serious problem to email users. A number of anti-spam schemes have been proposed and deployed, but the problem has yet been well addressed. One of those schemes is challenge-response, in which a challenge is imposed on an email sender. However, such a scheme introduces new problems for the users, e.g., delay of service and denial of service attacks. In this paper, we introduce a pre-challenge scheme that avoids those problems. It assumes each user has a challenge that is defined by the user himself/herself and associated with his/her email address, in such a way that an email sender can simultaneously retrieve a new receiver’s email address and challenge before sending an email in the first contact. Some new mechanisms are employed to reach a good balance between security against spam and convenience to email users.
Chapter PDF
Similar content being viewed by others
References
J. Postel. Simple Mail Transfer Protocol. RFC 821, IETF, August 1982.
J. Klensin. Simple Mail Transfer Protocol. RFC 2821, IETF, April 2001.
SBL. http://spamhaus.org/.
J. Ioannidis. Fighting Spam by Encapsulating Policy in Email Addresses. NDSS’03, February 2003.
E. Gabber, M. Jakobsson, Y. Matias, and A. Mayer. Curbing Junk E-Mail via Secure Classification. 1998 Financial Cryptography, pages 198–213, February 1998.
R. J. Hall. How to Avoid Unwanted Email. Communications of the ACM, 41(3):88–95, March 1998.
L. F. Cranor and B. A. LaMacchia. Spam! Communications of the ACM, 41(8):74–83, August 1998.
M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz. A Bayesian Approach to Filtering Junk Email. AAAI’98 Workshop on Learning for Text Categorization, July 1998.
P. Cunningham, N. Nowlan, S. J. Delany, and M. Haahr. A Case-Based Approach to Spam Filtering that Can Track Concept Drift. ICCBR’03 Workshop on Long-Lived CBR Systems, June 2003.
C. Dwork and M. Naor. Pricing via Processing or Combatting Junk Mail. Crypto’92, pages 139–147, August 1992.
C. Dwork, A. Goldberg, and M. Naor. On Memory-Bound Functions for Fighting Spam. Crypto’03, pages 426–444, August 2003.
M. Abadi, A. Birrell, M. Burrows, F. Dabek, and T. Wobber. Bankable Postage for Network Services. 8th Asian Computing Science Conference, December 2003.
Microsoft Penny Black Project. http://research.microsoft.com/research/sv/PennyBlack/.
SpamArrest. http://spamarrest.com/.
SpamCap. http://www.toyz.org/cgi-bin/wiki.cgi?SpamCap.
J. Mirkovic, J. Martin, and P. Reiher. A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms. Technical Report #020018, Dept. of Computer Science. Univ. of California.
L. von Ahn, M. Blum, N. J. Hopper, and J. Langford. CAPTCHA: Using Hard AI Problems for Security. Eurocrypt’03, pages 294–311, May 2003.
Ezmlm Mailing List. http://www.ezmlm.org/.
Mailman Mailing List. http://www.list.org/.
Yahoo DomainKeys. http://antispam.yahoo.com/domainkeys/.
D. Boneh and M. Franklin. Identity Based Encryption from the Weil Pairing. Crypto’0l, pages 213–229, August 2001.
Majordomo Mailing List. http://www.greatcircle.com/majordomo/.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this paper
Cite this paper
Roman, R., Zhou, J., Lopez, J. (2005). Protection Against Spam Using Pre-Challenges. In: Sasaki, R., Qing, S., Okamoto, E., Yoshiura, H. (eds) Security and Privacy in the Age of Ubiquitous Computing. SEC 2005. IFIP Advances in Information and Communication Technology, vol 181. Springer, Boston, MA. https://doi.org/10.1007/0-387-25660-1_19
Download citation
DOI: https://doi.org/10.1007/0-387-25660-1_19
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-25658-0
Online ISBN: 978-0-387-25660-3
eBook Packages: Computer ScienceComputer Science (R0)