Abstract
Unsolicited commercial email, commonly known as spam, has become a pressing problem in today’s Internet. In this paper we re-examine the architectural foundations of the current email delivery system that are responsible for the proliferation of email spam. We argue that the difficulties in controlling spam stem from the fact that the current email system is fundamentally sender-driven and distinctly lacks receiver control over email delivery. Based on these observations we propose a Differentiated Mail Transfer Protocol (DMTP), which grants receivers greater control over how messages from different classes of senders should be delivered on the Internet. In addition, we also develop a formal mathematical model to study the effectiveness of DMTP in controlling spam. Through numerical experiments we demonstrate that DMTP can effectively reduce the maximum revenue that a spammer can gather; moreover, compared to the current SMTP-based email system, the proposed email system can force spammers to stay online for longer periods of time, which may significantly improve the performance of various real-time blacklists of spammers. Furthermore, DMTP provides an incremental deployment path from the current SMTP-based system in today’s Internet.
Chapter PDF
References
Bernstein, D.: Internet mail 2000 (IM2000) (2000), http://cr.yp.to/im2000.html
IBM Corporation. Fair use of unsolicited commercial email FairUCE (November 2004), http://www.alphaworks.ibm.com/tech/fairuce
Delany, M.: Domain-based email authentication using public-keys avertised in the DNS (domainkeys). Internet Draft (August 2004), Work in Progress
Duan, Z., Dong, Y., Gopalan, K.: DMTP: Controlling spam through message delivery differentiation. Technical Report TR-041025, Department of Computer Science, Florida State University (October 2004)
Duan, Z., Gopalan, K., Dong, Y.: Push vs. pull: Implications of protocol design on controlling unwanted traffic. In: Proc. USENIX Steps to Reducing Unwanted Traffic on the Internet Workshop, SRUTI 2005 (July 2005)
Duan, Z., Gopalan, K., Dong, Y.: Receiver-driven extensions to SMTP. Internet Draft (January 2006), Work in Progress
Ferris Research. Spam control research reports, http://www.ferris.com/
Goodman, J., Rounthwaite, R.: Stopping outgoing spam. In: Proc. of EC 2004 (2004)
Graham, P.: A plan for spam (January 2003), http://www.paulgraham.com/spam.html
Harris, E.: The next step in the spam control war: Greylisting. White Paper (August 2003)
ITS. Spam at the university of hawaii, http://www.hawaii.edu/infotech/spam/spam.html (Last checked: 11/19/2005)
Juels, A., Brainard, J.: Client puzzles: A cryptographic defense against connection depletion attacks. In: Proceedings of NDSS 1999 (February 1999)
Klensin, J.: Simple mail transfer protocol. RFC 2821 (April 2001)
Lentczner, M., Wong, M.W.: Sender policy framework (spf): Authorizing use of domains in MAIL FROM. Internet Draft (October 2004), Work in Progress
Li, K., Pu, C., Ahamad, M.: Resisting spam delivery by TCP damping. In: Proceedings of First Conference on Email and Anti-Spam, CEAS (July 2004)
Mannion, P.: Interview: Ethernet’s inventor sounds off. Information Week (November 2005)
RBL. Real-time spam black lists (rbl), http://www.email-policy.com/Spam-black-lists.htm
Sophos Plc. Sophos plc., http://www.sophos.com/
The Editors. Product of the year: Spam? Information Week (January 2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 IFIP International Federation for Information Processing
About this paper
Cite this paper
Duan, Z., Dong, Y., Gopalan, K. (2006). DMTP: Controlling Spam Through Message Delivery Differentiation. In: Boavida, F., Plagemann, T., Stiller, B., Westphal, C., Monteiro, E. (eds) NETWORKING 2006. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems. NETWORKING 2006. Lecture Notes in Computer Science, vol 3976. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11753810_30
Download citation
DOI: https://doi.org/10.1007/11753810_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34192-5
Online ISBN: 978-3-540-34193-2
eBook Packages: Computer ScienceComputer Science (R0)