Department of Computer Sciences The University of Texas at Austin Zmail : Zero-Sum Free Market Control of Spam Benjamin J. Kuipers, Alex X. Liu, Aashin.

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Spam Edward W. Felten Dept. of Computer Science Princeton University.
Controlling Spam through Lightweight Currency Proceedings of the Hawaii International Conference on Computer Systems Honolulu HI Jan 2004 David A. Turner.
. How it works? To send an you need an Software or Web Based To send an to a friend you need to know their Address.
Breaking Trust On The Internet
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
TechnoloyPlus Insightful Training On Using Emerging Internet Technology & Media Effectively For Business Success & Hotel Success.
1 Formal Specification and Verification of a Micropayment Protocol Alex X. Liu The University of Texas at Austin, U.S.A. October 13, 2004 Co-author: Mohamed.
The problems associated with operating an effective anti-spam blocklist system in an increasingly hostile environment. Robert Gallagher September 2004.
1 Enhancing Address Privacy on Anti-SPAM by Dou Wang and Ying Chen School of Computer Science University of Windsor October 2007.
Visit for Marketing and Deliverability Tips, Tools, & Trainingwww. Delivered.com.
S ELECTION OF WEB HOST AND WEB PAGE SYSTEM. W EB HOST stores all the pages of your website and makes them available to computers connected to the Internet.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 15 How Spam Works.
Internet basics, Browsers, application, advantages and disadvantages, architecture, WWW, URL, HTML Week 10 Mr. Mohammed Rahmath.
1 Authors: Anirudh Ramachandran, Nick Feamster, and Santosh Vempala Publication: ACM Conference on Computer and Communications Security 2007 Presenter:
Empirical Analysis of Denial of Service Attack Against SMTP Servers Boldizsár BENCSÁTH, Laboratory of Cryptography and System Security (CrySyS) Budapest.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Belnet Antispam Pro A practical example Belnet – Aris Adamantiadis BNC – 24 November 2011.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
1 RedIRIS Reputation Block List September RedIRIS Reputation Block ListPágina 2 RedIRIS and mail services At the beginning, RedIRIS was directly.
WE Can Stop the Spam! June 16, 2003 Author: Mr. Jack P. McHugh Presented by: Nidhi Dalwadi.
Your technology solution partner.™ Security Enterprise Protection Gener C. Tongco Product Manager CT Link Systems Inc.
How Companies Fight Spamming by Sonya Tormaschy & Marc Eggert E-Commerce: Tuesday & Thursdays; 1:30 – 2:45.
Should there be a law that forbids people from sending to thousands of people (spam)? By: Bennett Moss Daniel Hoyt Hizkias Neway Junyu Wang.
1 The Business Case for DomainKeys Identified Mail.
May l Washington, DC l Omni Shoreham The ROI of Messaging Security JF Sullivan VP Marketing, Cloudmark, Inc.
Combating Abuse Brian Nisbet NOC Manager HEAnet.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 2 1 Evaluating an Program and a Web-Based Service Basic Communication.
3.06 Direct Marketing & Brand Building. Types of Marketing Announcements Announcements Newsletters Newsletters Suggestion selling Suggestion selling.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
and VOIP. Definitions Storage- the action or method of storing something for future use. Forward system- Address book- A book for recording the.
2 nd International Summer School Risks and Challenges of the Network Society Karlstad University and HumanIT Theme: Service Provider Responsibility for.
E-commerce--is Based on the use of internet-commerce is fasting becoming an alternative.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Small Business Resource Power Point Series How to Avoid Your Marketing Messages Being Labelled as Spam.
A Technical Approach to Minimizing Spam Mallory J. Paine.
P ERSUASIVE WRITING Advertising. W HAT IS ADVERTISING ? Advertising is a tool used to get people to want to buy something. The main reason ads are created.
The new Marketing Landscape
The Radicati Group, Inc. The Real Cost The Real Cost of Spam Masha Khmartseva Senior Analyst The Radicati Group, Inc.
Tired of Spam? The solution is MailWasher
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Technology Considerations for Spam Control 3 rd AP Net Abuse Workshop Busan Dave Crocker Brandenburg InternetWorking
A FRICA INTERNET GOVERNANCE FORUM TH SEPTEMBER,2015 AFRICA UNION COMMISSION HQS, ADDIS ABABA,ETHIOPIA Presented By: Michael Ilishebo, ZAMBIA.
CAN SPAM and Your Marketing Best Practices for Senders By Lars Helgeson Cooler .
Introduction Spam in Society Spam IM Spam Text Spam Blog Spamming Spam Blogs.
Choose Your Hosting Plan Carefully By: Alphasandesh.comAlphasandesh.com.
Spam. Is spam a problem? Bandwidth hogging -> slower, costlier Discourages use of net ( , e-commerce) Productivity -> loss of time and money Receiver.
Unit 1: What is economics all ABOUT? Chapters 1-6.
I SPCon 2003 – Evaluating Spam Control SolutionsBrandendenburg.com / 1 Points of Control UA = User Agent MTA = Message Transfer Agent o =originator.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
By Toby Reed.
CERN - IT Department CH-1211 Genève 23 Switzerland t OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall.
“We Can Stop the Spam” By: Jack P. McHugh Power Point Presented by: Ian Carey.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
An objective Cashcrate Review. Can I make money with Cashcrate?
Managing Office 365 Identities and Requirements.
© Thomson/South-Western ECONOMIC EDUCATION FOR CONSUMERS Slide 1 Consumer’s Role in the Economy Objectives: By the end of class, students will be able.
Electronic mail News File transfer protocol Chat Instant messaging Online services Online shopping.
I love # . Marketing in 10 minutes WHY? BUILD TARGET TRACK MEASURE.
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
Naftaly Minsky Computer Science Department Rutgers University Reducing Spam by Not Sending it or Can the Spam “Arms Race” be Won?
CASL Compliance & Enforcement Update: Impact on Business
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Microsoft Üzleti Megoldások Konferencia 2005
Presentation transcript:

Department of Computer Sciences The University of Texas at Austin Zmail : Zero-Sum Free Market Control of Spam Benjamin J. Kuipers, Alex X. Liu, Aashin Gautam, Mohamed G. Gouda

2The University of Texas at Austin Spam Problem  Volume of Spam ─ 2001: 8% of all traffic was spam ─ 2004: 60% of all traffic was spam ─# s per day: 31 billion (60% spam = 18.6 billion) ─# spam s per person per day = 6  Cost of Spam ─ 2003: $10 billion/year in U.S. (Ferris Research) $20.5 worldwide (Radicati Group) ─ Just cost for adding spam processing servers

3The University of Texas at Austin Anti-Spam: Legal Approaches  Punish spammers by anti-spam laws  Problems ─Hard to define spam ●First Amendment Right to Free Speech ─Hard to enforce anti-spam laws ●Spammers move to another country

4The University of Texas at Austin Anti-Spam: Filtering Approaches  Filter out spam based on text content  Problems ─False Positive ●What if a job offer gets filtered? ─Can be foiled by spammers ●For example, imbedding spam text in images

5The University of Texas at Austin Anti-Spam: Economic Approaches  Require senders to pay something  Human Effort: Sender pays human effort ─ Inconvenient ─ Inefficient ─ Challenge can be perceived as rude  Computational Cost: Sender pays CPU time ─ Inefficient

6The University of Texas at Austin Anti-Spam: Zmail  Current cost for spamming is almost zero  User’s attention is the important resource consumed  Basic idea of Zmail: ─The sender of an pays money directly to the receiver. ─Zero sum (unlike USPS): T he amount of money charged to the sender =The amount of money rewarded to the receiver ─The money earned can be used to send . ─The cost of sending one is a unit called an e-penny.

7The University of Texas at Austin Impact of Market Forces  Spammers ─ Cost of spamming significantly increases ─ Bulk advertising become more targeted  Normal Users ─ Most users receive more than they send ─ If not, pay money or subscribing commercial  ESPs ( Service Providers) ─ Less spam, less bandwidth, less computational cost

8The University of Texas at Austin Zmail Architecture ESP User Bank User

9The University of Texas at Austin The Zmail Protocol: two parties  Bank: ─ Each compliant ESP has an account with bank ─ Manage accounting for compliant ESPs ─ ESP buy and sell e-pennies with bank ─ Exchange e-pennies between real money for ESPs  ESPs: ─ Manage accounting for each of its users ─ Users buy and sell e-pennies with their ESPs

10The University of Texas at Austin The Zmail Protocol: Transfer  An user s of ESP A  user r of ESP B  Sending: ─ A reduces s’s balance by one ─ A records that A owes B one more e-penny  Receiving: ─ B increments r’s balance by one ─ B records that A owes B one more e-penny

11The University of Texas at Austin The Zmail Protocol: Misbehavior Detection  What if an ESP lies?  Periodically, every ESP reports to the bank how much they owe to every other ESPs  Misbehavior Detection ─ A says that A owes B x e-pennies ─ B says that A owes B y e-pennies ─ If x != y, then Bank further investigates who lies. ─ Most ESPs are honest.

12The University of Texas at Austin Mailing Lists  List server: distributor + subscriber DB  A subscriber sends an to distributor, distributor forwards the to everyone  Solution: for each from distributor, receiver’s ESP sends back an ack .  Extra benefit: subscriber DB is always updated Distributor Sender

13The University of Texas at Austin Zombies and Viruses  Zombie: sends out spam at user’s expense  Virus: sends to everyone in address book  Solution: each user specify a limit on the number of that he can send a day.  Extra benefit: detecting virus and zombies

14The University of Texas at Austin Incremental Deployment  Zmail runs on top of SMTP  No change to SMTP  Deployment: starting from two compliant ESPs  A user may decide to segregate, filter, or discard from non-compliant ESPs.

15The University of Texas at Austin Bank Setup  Internet already has some central authorities such as IANA that controls IP assignment

16The University of Texas at Austin Conclusions  Zmail gives no free ride to spammers  Zmail requires no definition of spam  Zmail works with other anti-spam techniques  Zmail can be incrementally deployed