Naftaly Minsky Computer Science Department Rutgers University Reducing Spam by Not Sending it or Can the Spam “Arms Race” be Won?

Slides:



Advertisements
Similar presentations
Research Summary Nick Feamster. The Big Picture Improving Internet availability by making networks easier to operate Three approaches –From the ground.
Advertisements

Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Back to Table of Contents
September 20, 2002G2E 2002 GSA Technical Forum1 Best Of Breed (BOB) Standard.
FOSS4G 2009 Building Human Sensor Webs with 52° North SWE Implementations Building Human Sensor Webs with 52° North SWE Implementations Eike Hinderk Jürrens,
1 Towards Decentralized and Secure Electronic Marketplace Yingying Chen, Naftaly Minsky, Constantin Serban, and Wenxuan Zhang Dept of Computer Science.
12/04/2006 Understanding & Predicting E-commerce Adoption: An Extension of the Theory of Planned Behavior (MIS Quarterly March 2006) Presented by: Yasmine.
DomainKeys Identified Mail (DKIM): Introduction and Overview Eric Allman Chief Science Officer Sendmail, Inc.
Flexible Regulation of Virtual Enterprises Naftaly Minsky Rutgers University Joint work with Xuhui Ao.
Apr 9, 2002Mårten Trolin1 Previous lecture TLS details –Phases Handshake Securing messages –What the messages contain –Authentication The second assignment.
Electronic Commerce Yong Choi School of Business CSU, Bakersfield.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Naftaly Minsky Rutgers University Law-Governed Interaction: a Decentralized Access-Control Mechanism.
Naftaly Minsky Rutgers University Preventing Theft By Keeping Good Company.
© 2003 McGraw-Hill Companies, Inc., McGraw-Hill/Irwin IMPLEMENTING INTERACTIVE AND MULTICHANNEL MARKETING.
1 Enhancing Address Privacy on Anti-SPAM by Dou Wang and Ying Chen School of Computer Science University of Windsor October 2007.
E-Monitoring of Outsourcing IS Project in Financial Institutions: A Case Study on Mandatory Provident Fund Projects in Hong Kong Vincent C.T. Chan Dept.
StandardsDIS W4 RJK1 Distributed Information Systems Standards Bob Kummerfeld Department of Computer Science.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
Marketing TRAINING SERIES. Marketing TRAINING SERIES In this webinar, we will cover: Fundamentals of marketing Creating and sending.
© Copyright MX Logic, Inc. All rights reserved. 1 Strictly Confidential MX LOGIC CORPORATE OVERVIEW MARCH 2005.
Marketing What is marketing? Marketing is the art and science of management process through which goods and services move from concept to the customer.
PRISM-PROOF Phillip Hallam-Baker Comodo Group Inc.
“We Can Stop Spam” Author: Jack P. McHugh Pui Ying (Ivy) Cheung.
Untouchable?: A Canadian Perspective on the Anti- Spam Battle Michael Geist Canada Research Chair in Internet & E- commerce Law University of Ottawa, Faculty.
Should there be a law that forbids people from sending to thousands of people (spam)? By: Bennett Moss Daniel Hoyt Hizkias Neway Junyu Wang.
Copyright ©1997 NetDox, Inc. All Rights Reserved. CONFIDENTIAL 1 DATE HERE Julie Grace - NetDox, Inc. Emerging Internet Commerce.
1 The Business Case for DomainKeys Identified Mail.
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream.
DMSO Technical Exchange 3 Oct 03 1 Web Services Supporting Simulation to Global Information Grid Mark Pullen George Mason University with support from.
SOAP Tutorial Ching-Long Yeh 葉慶隆 Department of Computer Science and Engineering Tatung University
Department of Computer Sciences The University of Texas at Austin Zmail : Zero-Sum Free Market Control of Spam Benjamin J. Kuipers, Alex X. Liu, Aashin.
Personalization features to accelerate research Presented by: Armond DiRado Account Development Manager
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
Sponsored by the National Science Foundation Design of an Information Substrate for Measurement, Monitoring and Inference Spiral 2 Year-end Project Review.
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
ARTIFICIAL INTELLIGENCE [INTELLIGENT AGENTS PARADIGM] Professor Janis Grundspenkis Riga Technical University Faculty of Computer Science and Information.
Electronic Data Interchange (EDI) in Baltic States Edisoft Systems, June 2006.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
ACM SIGACT News Distributed Computing Column 9 Abstract This paper covers the distributed systems issues, concentrating on some problems related to distributed.
Cryptography and Network Security (CS435) Part One (Introduction)
Evaluation of Spam Detection and Prevention Frameworks for and Image Spam - A State of Art Pedram Hayati, Vidyasagar Potdar Digital Ecosystems and.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
A Retrospective on Future Anti-Spam Standards Internet Society of China Beijing – September, 2004 Dave Crocker Brandenburg InternetWorking
Facilities for Secure Communication The Internet is insecure The Internet is a shared collection of networks. Unfortunately, that makes it insecure An.
Chapter 11.  Electronic commerce (e-commerce)  The sale of goods and services by computer over the Internet  Internet (Net)  A collection of millions.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
Mobile Communication MMS. Mobile Communication The MM7 interface enables interactions between Value Added Service applications and an MMSC. The technical.
Automated Mechanism Design Tuomas Sandholm Presented by Dimitri Mostinski November 17, 2004.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
IETF 67 – SIMPLE WG SIMPLE Problem Statement Draft-rang-simple-problem-statement-01 Tim Rang - Microsoft Avshalom Houri – IBM Edwin Aoki – AOL.
E-BILLING MOTIVATION. Introduction  E-billing is the electronic delivery of financial documents to the customer, that represents and replaces the conventional.
Weichao Wang, Bharat Bhargava Youngjoo, Shin
Chapter 16: Distributed Applications Business Data Communications, 4e.
March 28, 2006 Phone V 0.93 A Pure Economic Response to Irrelevant Contact Provable Relationships and Personal Interrupt.
“We Can Stop the Spam” By: Jack P. McHugh Power Point Presented by: Ian Carey.
Sitecore.net Training, Oct ECM 2.1 UPDATE 2 PART 1 CRAWL BEFORE YOU WALK.
Handling Spam In Government Administration – The Singapore Approach Presented to ICA Annual Conference 2004 Presented by Wu Choy Peng (Ms) 20 October 2004.
Anti-Spam Updates Activity Coordination Meeting March 2006 Kevin Hill.
TMG Client Protection 6NPS – Session 7.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Business Mail Test and Innovation Scheme
ONLINE SECURE DATA SERVICE
Business Mail Test and Innovation Scheme
Done by:Thikra abdullah
Business Mail Test and Innovation Scheme
Presentation transcript:

Naftaly Minsky Computer Science Department Rutgers University Reducing Spam by Not Sending it or Can the Spam “Arms Race” be Won?

2 N. Minsky---pervasive computing, Oct. 07 The Spam “Arms Race” and its Discontent  The effectiveness of the anti-spam efforts is impressive.  Yet, there is an arms race between spammers and anti-spammers—with no end in sight.  The harmful effects of this arms race:  It undermines the credibility of , due to: the false-positive results of filtering. the black-listings created by unregulated vigilantes [Lessig. Code, Version 2.0, 2006].  The overall traffic of spam seems to be increasing.

3 The Elements of Anti-Spam Measures 1. The content of messages. 2. The reputation of senders & ESPs 3.The “spam immune” -sending protocols, which are unlikely to generate spam.  payment protocols (e.g., stamps);  rate limiting protocols ;  opt-out and opt-in protocols.  The immune sending protocols have only a minor impact so far—but it is our focus here. N. Minsky---pervasive computing, Oct. 07

4 Making Spam-Immune Sending Protocols Useful for Reducing Spam  Claim: immune protocols can help reduce spam, if the receiver of an can recognize the protocol that generated it.  We call such an ability “law-based trust” (or L-trust) which is the basis for the proposed trustworthy Self Regulation (TSR) .  L-trust is provided by LGI, but conventional realizations of i-protocols have hard time satisfying it. N. Minsky---pervasive computing, Oct. 07

5 The concept of law-based trust (L-trust) Under TSR 1.there is a language for writing message-sending protocols (TSR-laws). 2.There is an SMTP-compliant mechanism for sending s subject to any given TSR-law L. 3.Definition [L-trust] : The recipient of an has an L-trust in it, if it can determine with reasonably justified confidence, whether or not it is a TSR- ; and if so, it can identify the law under which this message has been sent. N. Minsky---pervasive computing, Oct. 07

6 Naïve Support for L-Trust  For a single law L1:  use a TCB (T L1 ) to mediate sending under a stateful law L1. N. Minsky---pervasive computing, Oct. 07 L1 S * It is badly unscalable

7 N. Minsky---LaSMAA07workshop March,07 Support for L-Trust via Distributed TCB (DTCB) users the DTCB of TSR Alice Bob adopt(L) L SxSx TALTAL Conjecture: A DTCB can be made more dependable, and more secure, than centralized TCB. m ==> Bob Such a DTCB can be used for much more than TSR- , like: e-commerce, governance of enterprise systems, security of grids, etc

8 A Paid Postage Law (P)—an Example  A user Alice (A) who intends to send P- s, starts by adopting a controller T A P and instructs it to purchases 1000 stamps from a specified stamp vendor, saving the term stamps(1000) in the state of T A P.  Alice sends her P- via controller T A P, which would forward an only if it has at least one stamp in its state; and every sent by this controller would consume one of its stamps.  No stamps are sent to the target of the message, and none is required. N. Minsky---pervasive computing, Oct. 07

9 Realization of Stamp-Based N. Minsky---pervasive computing, Oct. 07 MSA-mail submission agent MDA-mail delivery agent

10 Spam Reduction via Incremental Deployment of TSR-Based  Assuming that the controllers designed for mediating TSR- are provided broadly over the Internet  Several TSR-laws will become popular for their immunity.  Substantial number of users will choose one or more i-laws for preferential treatment. And standards will develop for publishing the preferred i-laws of users.  users would increasingly employ TSR for sending , subject to a preferred law by each destination.  two reasons to believe that these trends would materialize:  It is a win-win proposition  TSR- can be used together with traditional .  TSR can ultimately be made into the standard N. Minsky---pervasive computing, Oct. 07

11 On the Deployment of the DTCB of TSR  A wide ranging deployment of the DTCB of TSR is a formidable proposition.  But it is the same DTCB that underline LGI, which has a wide range of applications.  Such as securing B2B commerce, supporting the governance of enterprise systems, and of grid-like federations of institutions.  It is for the sake of this type of critical applications that such a DTCB may end up being deployed over the Internet, enabling TSR- as well. N. Minsky---pervasive computing, Oct. 07

12 Conclusion  I am seeking help for the implementation of TSR , and for experimenting with it.  A Draft paper can be found in my webcite: under “selected papers”; it is entitled: “ Reducing Spam via Trustworthy Self Regulation by Senders” N. Minsky---pervasive computing, Oct. 07

Questions? Thank You.