A Differentiated Message Delivery Architecture to Control Spam

Unsolicited bulk electronic mail (spam) is increasingly plaguing the Internet email system and deteriorating its value as a convenient communication tools. In this paper we argue that the difficulties in controlling spam can be attributed to the lack of receiver control on how different email messages should be delievered on the Internet. In the current email delivery architecture, a user can send messages to another at will, regardless of whether or not the latter is willing to accept the message. Based on this observation, we propose a differentiated message delivery architecture - DiffMail. In DiffMail, a user can classify email senders into multiple classes and handle messages from each class differently. For example, although a receiver may directly accept messages from the regular correspondents, he may selectively ask other senders to store messages on the senders' own mail servers, and pull the messages only if and when he wants to. In this paper we present the DiffMail architecture and illustrate some of the appealing advantages using real-world email archives

[1]  John C. Klensin,et al.  Simple Mail Transfer Protocol , 2001, RFC.

[2]  Mark Delany,et al.  Domain-Based Email Authentication Using Public Keys Advertised in the DNS (DomainKeys) , 2007, RFC.

[3]  D. Saunders The brave new world , 1999 .

[4]  Meng Weng Wong,et al.  Sender ID: Authenticating E-Mail , 2006, RFC.

[5]  Mark Lentczner Sender Policy Framework (SPF) A Convention to Describe Hosts Authorized to Send SMTP Traffic , 2004 .

[6]  Ari Juels,et al.  Client puzzles: A cryptographic defense against connection depletion , 1999 .

[7]  Peter W. Resnick,et al.  Internet Message Format , 2001, RFC.

[8]  Pawel Gburzynski,et al.  Fighting the spam wars: A remailer approach with restrictive aliasing , 2004, TOIT.

[9]  Susan T. Dumais,et al.  A Bayesian Approach to Filtering Junk E-Mail , 1998, AAAI 1998.

[10]  Lluís Màrquez i Villodre,et al.  Boosting Trees for Anti-Spam Email Filtering , 2001, ArXiv.

[11]  Calton Pu,et al.  Resisting SPAM Delivery by TCP Damping , 2004, CEAS.

[12]  Andrei Broder,et al.  Network Applications of Bloom Filters: A Survey , 2004, Internet Math..

[13]  Marshall T. Rose,et al.  Post Office Protocol: Version 3 , 1988, RFC.

[14]  Miranda Mowbray,et al.  Email Prioritization: Reducing Delays on Legitimate Mail Caused by Junk Mail , 2004, USENIX Annual Technical Conference, General Track.

[15]  Mark R. Crispin Internet Message Access Protocol - Version 4rev1 , 1996, RFC.

[16]  David D. Clark,et al.  Rethinking the design of the Internet , 2001, ACM Trans. Internet Techn..