Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2005.12C.5.765

E-mail Sending-Server Authorization Method using a Distance Estimation Algorithm between IP Addresses for Filtering Spam  

Yim Hosung (아주대학교 정보통신전문대학원)
Shim Jaehong (조선대학교 인터넷소프트웨어공학부)
Choi Kyunghee (아주대학교 정보통신전문대학원)
Jung Gihyun (아주대학교 전자공학부)
Abstract
In this paper, we propose E-mail sending-server authorization method using a distance estimation algorithm between W addresses to check whether the E-mail sending server is registered in the domain of mail sending server or belongs to the domain for filtering spam mail. This method utilizes the distance between the IP address of sending server and IP addresses registered in the DNS to figure out that the E-mail sending server exists in the domain to filter spam mail. The experimental result of applying the proposed algorithm to sample E-mails gathered in a large size laboratory says that 88 percents of legitimate E-mails and only 10 percents of spam mails are sent by servers in the same domains of senders. The algorithm may be effectively used to block spam mails sent by servers outside of the domains of mail senders. It may be also hired as a temporary E-mail protecting system until the standard E-mail authorization protocol is fully deployed.
Keywords
Spam Mail; An Authorization Mechanism For E-mail Sending Server;
Citations & Related Records
연도 인용수 순위
  • Reference
1 G. S. Malkin, 'RFC2453 - RIP Version 2,' Nov., 1998
2 E. Gabber, M. Jakobsson. Y. Matias, and A. J. Mayer, 'Curbing Junk E-mail via Secure Classification,' Proc. of the Second International Conference on Financial Cryptography, pp.198-213, Feb., 1998   DOI   ScienceOn
3 Microsoft Corporation, 'Caller ID for E-mail : The Next Step to Deterring Spam,' Feb., 2004.
4 M. W. Wong and M. Lentczner. 'Sender Policy Frame work(SPF) : A Convention to Describe Hosts Authorized to Send SMTP Traffic,' May 2004, http://www.danisch.de/work/security/txt/draft-mengwong-spf-01.txt
5 H. Danisch, 'SCAF - Simple Caller Authorization Frame work,' Jan. 2004, http://www.danisch.de/work/security/txt/draft-danisch-scaf-00.txt
6 I. Androutsopoulos, J. Koutsias, K. V. Chandrinos, G. Paliouras, and C. D. Spyropoulos, 'An Evaluation of Naive Bayesian Anti-Spam Filtering,' Proc. of the Workshop on Machine Learning in the New Information Age, 2000
7 B. Templeton, 'Proper Principles for Challenge/Response Anti-Spam Systems,' http://www.templetons.com/brad/spam/challengeresponse.html
8 H. Danisch, 'The RMX DNS RR and Method for Lightweight SMTP Sender Authorization,' Oct. 2003, http://www.danisch.de/work/security/txt/draft-danisch-dns-rr-smtp-03.txt
9 '전자우편 주소 추출 방지 S/W : NeverSpam', http://www.spamcop.or.kr/swDown/pg_email.jsp
10 L. F. Cranor and B. A. LaMacchia, 'Spam!', Communications of the ACM, Vol.41, No.8, pp.74-83, Aug., 1998   DOI   ScienceOn
11 G. Sakkis, I. Androutsopoulos, G. Paliouras, V. Karkaletsis, C. Spyropoulos, and P. Stamatopoulos, 'A Memory-Based Approach to Anti-Spam Filtering,' Tech Report DEMO, National Centre for Scientific Research (NCSR): Demokritos, Athens, 2001
12 'Why is spam bad?' http://spam.abuse.net/overview/spambad.shtml
13 S. Hird, 'Technical Solution for Controlling Spam,' Proc. of AUUG (The Australian Unix systems User Group), Melbourne, Sept., 2002