Multilayer Filtering or The Dangerous Economics of Spam Control 2008 MIT Spam Conference By Alena Kimakova and Reza Rajabiun York University and COMDOM.

Slides:



Advertisements
Similar presentations
STRENGTHENING FINANCING FOR DEVELOPMENT: PROPOSALS FROM THE PRIVATE SECTOR Compiled by the UN-Sanctioned Business Interlocutors to the International Conference.
Advertisements

A Local Mean Field Analysis of Security Investments in Networks Marc Lelarge (INRIA-ENS) Jean Bolot (SPRINT) NetEcon 2008.
Review of Topology and Access Techniques / Switching Concepts BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
IP Warming Overview and Implementation Using Eloqua.
1 A. Introduction 1.Object of study: firms, markets and systems; structures and behaviour 1.1. Object of the Firm and Industrial Economics 1.2. Basic concepts.
The Economics of Environmental Regulations Pollution Tax and Markets for Transferable Pollution Permits.
Shillin’ like a Villian: Fraud in Online Auction Markets HAN YANG LEE AND TOM XU ECON1465, Fall 2011 Brown University.
Federal Communications Commission NSMA Spectrum Management Conference May 20, 2008 Market Based Forces and the Radio Spectrum By Mark Bykowsky, Kenneth.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
© ComDom Software | | | IPv6 and Spam 2009 MIT Spam Conference Peter Kosik, Patrik Ostrihon and Reza Rajabiun
Internet Economics: the use of Shapley value for ISP settlement Richard T.B. Ma Columbia University Dah-ming Chiu, John C.S. Lui The Chinese University.
1 Microeconomics Lecture 1 Institute of Economic Theories - University of Miskolc Mónika Kis-Orloczki Assistant lecturer
The Role and Regulation of Interchange Fees in European Payments Cards The Role and Regulation of Interchange Fees in European Payments Cards Wilko Bolt.
Adverse Selection Asymmetric information is feature of many markets
Chapter 11 Game Theory and Asymmetric Information
1 8 th Annual IAABD Conference May 29-June 2, 2007 When Retailers are More Powerful Simon Pierre Sigué.
CS 268: Future Internet Architectures Ion Stoica May 1, 2006.
© 2009 Prentice Hall Business Publishing Essentials of Economics Hubbard/O’Brien, 2e. Fernando & Yvonn Quijano Prepared by: Chapter 1 Economics: Foundations.
The Paradox of Liquid Loans discussion by Leonardo Gambacorta Economic Outlook and Monetary Policy Department Bank of Italy The Transmission of Credit.
Interdomain Routing as Social Choice Ronny R. Dakdouk, Semih Salihoglu, Hao Wang, Haiyong Xie, Yang Richard Yang Yale University IBC ’ 06.
Illiquidity, Financial Development and the Growth-Volatility Relationship By Enisse Kharroubi Comments by: Arturo Galindo Universidad de los Andes The.
Distributive Politics and Economic Growth Alberto Alesina and Dani Rodrik Economic Growth Spring Semester, 2009 Benedikte Fogh Larsen.
Economics of Malware: Epidemic Risk Model, Network Externalities and Incentives. Marc Lelarge (INRIA-ENS) WEIS, University College London, June 2009.
Chapter 1 Preliminaries Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent.
Impact of Hospital Provider Payment Mechanism on Household Health Service Utilization in Vietnam (preliminary results) Sarah Bales Public Policy in Asia,
Internet Infrastructure and Pricing. Internet Pipelines Technology of the internet enables ecommerce –Issues of congestion and peak-load pricing –Convergence.
MANAGERIAL ECONOMICS THEORY OF INDIVIDUAL BEHAVIOUR 1
Regulatory Administrative Institutions MPA 517 Lecture-8 1.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
10 Two-sided Platforms 1 Aaron Schiff ECON
© 2006 Pearson Education Canada Inc.9-1 Conflict Resolution Game Theory Agency Theory.
Tussel in Cyberspace Based on Slides by I. Stoica.
Economics as Social Science Economic Methodology Lecture 2 Dominika Milczarek-Andrzejewska.
Intellectual Property and S&T Policy. Outline Economic perspective on S&T policy –Science, technology, information as economic resources –Market failure.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
Popularity versus Similarity in Growing Networks Fragiskos Papadopoulos Cyprus University of Technology M. Kitsak, M. Á. Serrano, M. Boguñá, and Dmitri.
Department of Computer Sciences The University of Texas at Austin Zmail : Zero-Sum Free Market Control of Spam Benjamin J. Kuipers, Alex X. Liu, Aashin.
Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Heterogeneity among research spin-offs: the case of “intellectual property-based firms” Margarida Fontes - INETI & DINAMIA Oscarina Conceição - DINAMIA.
Ilkka Kiema Future Internet and Economics (FIEN) Workshop May 6, 2009 Some Economic Aspects of Future Internet.
Labor Economics Xiaomin Gai.
Session 3: Other Strategies for International Cooperation Scott Barrett Johns Hopkins University School of Advanced International Studies.
Statistics in Food and Resource Economics Lecture I.
Trading in Strategic Resources: Necessary Conditions, Transaction Cost Problems, and Choice of Exchange Structure Tailan Chi Strategic Management Journal.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
© 2006 Pearson Education Canada Inc.9-1 Conflict Resolution Game Theory Agency Theory.
Electronic Commerce Semester 1 Term 1 Lecture 6. Predicting the Future of the IAP Market In the future, four organisational and technology trends will.
Competition, bargaining power and pricing in two-sided markets Kimmo Soramäki Helsinki University of Technology / ECB Wilko Bolt De Nederlandsche Bank.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
Resolving the Commitment Versus Flexibility Trade-off : The role of Resource Accumulation Lags Goncalso Pacheco-de-Almeida James E. Henderson Karel O.
Experimental evidence of the emergence of aesthetic rules in pure coordination games Federica Alberti (Uea) Creed/Cedex/Uea Meeting Experimental Economics.
Algorithmic, Game-theoretic and Logical Foundations
International Trade and Income Differences Michael E. Waugh.
Chapter 1 Introduction. Copyright ©2015 Pearson Education, Inc. All rights reserved.1-2 Preview What is international economics about? International trade.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco Spam & Virus Blocker Wilson Prokosch WW Channel GTM- Sr. BDM.
Externalities >> chapter: 17 Krugman/Wells Economics ©2009  Worth Publishers 1 of 32.
Auctions serve the dual purpose of eliciting preferences and allocating resources between competing uses. A less fundamental but more practical reason.
Laws and Rules That Govern Internet Safety Ashley Martin.
6.2 Population Growth: Past, Present, and Future
Optimal Deposit Insurance Eduardo Dávila (NYU, Stern)
Comments on “Bank Liability Structure”
Internet Economics כלכלת האינטרנט
Trading in Strategic Resources:
For modeling conflict and cooperation Schwartz/Teneketzis
Revisiting the Bright and Dark Sides of Capital Flows in Business Groups Written by:Joseph P. H. Fan,Li Jin & Guojian Zheng 王锦
A New Product Growth Model for Consumer Durables
Asymmetric price adjustments under ever - increasing costs Evidence from the Retail Gasoline Market in Colombia Marc Hofstetter Jorge Tovar Economics.
Capital structure, executive compensation, and investment efficiency
EASTERN MEDITERRANEAN UNIVERSITY DEPARTMENT OF INDUSTRIAL ENGINEERING IENG314 OPERATIONS RESEARCH II SAMIR SAMEER ABUYOUSSEF
Presentation transcript:

Multilayer Filtering or The Dangerous Economics of Spam Control 2008 MIT Spam Conference By Alena Kimakova and Reza Rajabiun York University and COMDOM Software Toronto, Canada

2 I.1 Spam as an empirical problem Two historical observations ( ) A) Spam ratio in 2002 = 20% -30% of all messages Spam ratio in 2008 = 70% - 90% of all messages Increased sophistication of spam (pdf, image, search engine, etc) B) Increased sophistication and accuracy of statistical content filters: 98% accuracy, 0.1% false positives (Cormack and Lynam, 2007) Empirical puzzle: Why more spam after the adoption of technical and regulatory countermeasures?

3 I.2 Methodology: Positive analysis How can we explain the growth and sophistication of spam? Hypothesis: A technological trade-off between speed and accuracy facing network owners and operators. Approach combines: A) Game theoretical models: Large volumes of spam because of asymmetries in the distribution of filter quality across the Internet. B) Evolution of the technological possibilities frontier facing ISPs and other operators from the early 2000s. Problem with existing studies in economics and computer science: Do not account for incentives of spammers and ISPs. General point: Importance of interdisciplinary cooperation between economists and computer scientists in designing spam filtering bundles and regulatory countermeasures.

4 II.1 Technological Choice Advances in content filtering accuracy  Constrained sensory threat However: High noise/signal ratio  Network costs of spam rise Of particular concern in developing countries with relatively lower: a) Bandwidth b) Processing capacity c) Administrative capacity Spam and the Digital Divide (Rajabiun, 2007) The literature in computer science and economics almost exclusively focuses on false negative/positive problem

5 II.2 End user and network costs More realistic assumption: End user (E) and network costs of spam (N) are likely to be closely linked. General problem facing an ISP (Server level problem) Costs of Spam = C ( E (E1, E2 ), N ( E1, E2, S ) ) E1 – Expected false negative rate E2 – Expected false positive rate S – Number of servers Theory: Little known about relationships, but not static. Practice: Can be estimated for individual ISPs based on: a) Accounting information b) Features of antispam systems available at a point in time

6 II.3 Antispam technology Basic filtering methods available since the late 1990s Server level: Adoption of (fuzzy) fingerprinting ( ) and reputation based systems ( ) upstream (fast, but not accurate) End user level: Statistical (Bayesian) content filters (accurate, but not fast) Other technical + public policy measures: Aiming to increase the costs of sending spam (Hashcash, civil/criminal law, do not call registries) Optimal choice of filter depends on identity of end user/ISP Upstream ISPs more sensitive to speed, downstream to accuracy Divergence between (socially) optimal and actual technological choice

7 III.1 The long tail Distribution of taste for spam for each sub-network: not normal Khong (2004): Mechanisms that connect spammers and those with a taste for spam  first best solution (open channel argument) Blocking and filters second best Empirically: More spam after wide-spread adoption of open channels rather than less. Loder et al. (2004): Attention Bond Mechanism (ABM) first best because it allows for price negotiations between senders and receivers. Basic economic assumption: The subjective theory of value Ex: Search for affordable drugs for the uninsured in the U.S. The long tail in natural sciences: Phase transition/multiple equilibria Game theory: Strategic complementarities

8 III.2 Sender side countermeasures In Microeconomic theory: Long tailed distributions associated with markets where markups are invariant to the number of sellers (e.g.: mutual funds) Margin for spammers, or expected response rates, are invariant to the number of spammers at play Implications: Legal sanctions and IP reputation systems increase costs of spamming, drive some spammers out of the market, but do not thin out the market. Intuition: As in wars against prostitution and drugs, “hang them all” strategies ineffective + increase social costs (Becker-Friedman).

9 IV.1 Strategic conflicts Trivial model of spam: Tragedy of the commons  Generic solution is to increase costs on spammers, but results in escalating spam wars. Empirically: Increasing sender costs since early 2000s, but more spam. Escalation  Development and adoption of new spamming techniques Androutsopoulos et al. (2005)  2 player game between senders and receivers has a single Nash equilibrium  Settles in infinitely repeated games, unless changes to underlying technologies or taste for spam

10 IV.2 Spam growth and filter quality Reshef and Solan (2006): Blame filters for growth of spam due to differences in filter quality. When costs of sending messages not too high When costs of sending messages not too high  Effect of improved filter quality on total volume of spam ambiguous Eaton et al. (2008): Complementarities between filters and sender side countermeasures. Improving filtering alone results in more spam. Given ineffective sender side countermeasures, they suggest receiver side payments (as in SMS systems). Kearns (2005): Spam as a source of both costs and revenues for ISPs  economic incentive to adopt inefficient filters

11 V.1 Speed versus accuracy Existing literature: Even if they could read end user preferences accurately, upstream backbone providers do not have sufficient financial incentives to adopt the right technological countermeasures. Argument here: Not necessarily because of financial factors alone. Hypothesis: ISPs faced technological trade-offs in terms of speed v. accuracy Coordination failure not between senders and receivers as in the tragedy of commons or Khong (2004), but between upstream and downstream entities/servers. Downstream better off with less incoming spam, but cannot force upstream to do the optimal filtering for them.

12 V.2 Bundles and layers Bundles of countermeasures facing spammers: a) Ad hoc feature selection rules (late 1990s): centralized b) Fingerprinting/checksum filters ( ): centralized c) IP reputation/authentication mechanism ( ): centralized d) Statistical content filters (since late 1990s): distributed Asymmetric filter quality ( ): (b and c) fast relative to 1 st generation statistical content filters (5x), but less accurate (-5% and -30% respectively). Response by income smoothing spammers: higher noise/signal ratio, more variants, one shot BGP spectrum agility

13 VI.1 The response A) Coordination by operators to strengthen authentication protocols (SPF, DKIM) Problem: A wide range of techniques available to bypass, and even use the protocols as an instrument of sending more spam! B) Closing the gap between fast and accurate filters: Further optimization of the methods for distributed content scanning, learning, and classification 1 st versus 2 nd generation Bayesian filters (CRM114, Bogofilter, COMDOM)

14 VI.2 Evolution of Bayesian content filters

15 VI.3 Findings Technological trade-off between speed and accuracy now closed with distributed 2 nd generation Bayesian filters (at least 30x differential in throughput relative to 1 st generation): Note: Fingerprinting was 5x faster than 1 st generation Bayesian filters in terms of throughput Fixed versus variable costs of message processing  Substantial reductions in variable costs of scanning, minor improvements in fixed costs of classification

16 VII. Summary More spam is an instrument for: a) Evading filters b) Searching for people with a taste for spam Normative question for policy makers: Should spamming be illegal? Legal sanctions may induce moral hazard problem and potentially exacerbate the problem at the aggregate level by adopting more costly strategies/technologies (especially important for developing countries). For designers of antispam systems/bundles: Should we retain layers that aim to increase the costs of spamming through ad hoc centralized control (e.g. IP reputation, fingerprinting)?