Skip to main content

Spam Control by Source Throttling Using Integer Factorization

  • Conference paper
Computer Networks and Intelligent Computing (ICIP 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 157))

Included in the following conference series:

  • 2040 Accesses

Abstract

Existing solutions for spam control that are limited to spam filtering at the receiver side underestimate the fact that the network bandwidth and processing time of the recipient email servers are wasted. To cut down these costs spam should be controlled before it reaches the receiving email server. In this paper, we propose a solution to control spam at the senders email server by throttling the client’s CPU using integer factorization problem. Integer factorization is used to generate stamps as a proof of CPU cycles expended by the senders system for each email recipient. Cost of generating stamps is negligible when the client is sending emails to only a few recipients. However, as the number of recipients increases, the cost of generating stamps also increases which adversely affects the processing speed of the client. The server requires minimal processing time to verify stamps generated by the client.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Zhong, Z., Huang, K., Li, K.: Throttling Outgoing SPAM for Webmail Services. In: Proceedings of the Second Conference on Email and Anti-Spam (June 2005)

    Google Scholar 

  2. Jagannath, S., Mohandas, R.: SPAM control using CPU Timestamps. In: Proceedings of the International Conference on Information Security and Artificial Intelligence (2010)

    Google Scholar 

  3. Hayes, B.: How many ways can you spell V1@gra? Scientific American 95(4), 298–302 (2007)

    Google Scholar 

  4. Yang, Y., Elfayoumy, S.: Anti-Spam Filtering Using Neural Networks and Baysian Classifiers. In: Proceedings of the 2007 IEEE International Symposium on Computational Intelligence in Robotics and Automation Jacksonville, FL, USA (June 2007)

    Google Scholar 

  5. Kanaris, I., Kanaris, K., Houvardas, I., Stamatatos, E.: Words vs. Character N-Grams For Anti-Spam Filtering. International Journal On Artificial Intelligence Tools, 1–20 (2006)

    Google Scholar 

  6. Delio, M.: Not All Asian E-Mail Is Spam. Wired News article (February 2002)

    Google Scholar 

  7. Williams, A.: Truth finally brought to light, Harvard acceptance letters discovered unkosher. Daily Princetonian (February 15 2002)

    Google Scholar 

  8. Jacob, P.: The Spam Problem: Moving Beyond RBLs, http://theory.whirlycott.com/~phil/antispam

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gupta, R., K., V.K., Mohandas, R. (2011). Spam Control by Source Throttling Using Integer Factorization. In: Venugopal, K.R., Patnaik, L.M. (eds) Computer Networks and Intelligent Computing. ICIP 2011. Communications in Computer and Information Science, vol 157. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22786-8_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22786-8_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22785-1

  • Online ISBN: 978-3-642-22786-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics