Abstract — In this paper we argue that the difficulties in controlling unwanted Internet traffic, such as Email SPAM, stem from the fact that many Internet applications are fundamentally sender-driven and distinctly lack receiver control over traffic deli
Pushvs.Pull:ImplicationsofProtocolDesignon
ControllingUnwantedTraf c
ZhenhaiDuan
FloridaStateUniversityduan@cs.fsu.edu
YingfeiDong
UniversityofHawaiiyingfei@hawaii.edu
KartikGopalan
FloridaStateUniversitykartik@cs.fsu.edu
Abstract—Inthispaperwearguethatthedif cultiesincontrollingunwantedInternettraf c,suchasEmailSPAM,stemfromthefactthatmanyInternetappli-cationsarefundamentallysender-drivenanddistinctlylackreceivercontrolovertraf cdelivery.However,sinceonlyreceiversknowwhattheywanttoreceive,receiver-drivenapproachesmayoftenhaveclearadvantagesinrestrainingunwantedtraf c.Inthispaper,were-examinetheimplicationsofthetwocommontraf cdeliverymodels:sender-pushandreceiver-pull.Inthesender-pushmodel,asendercanatwilldelivertraf ctoareceiver,whocanonlypassivelyacceptthetraf c,suchasintheSMTP-basedEmaildeliverysystem.Incontrast,inthereceiver-pullmodel,receiverscanregulateifandwhentheywishtoretrievedata,suchastheHTTP-basedwebaccesssystem.WearguethattheproblemofunwantedInternettraf ccanbemitigatedtoagreatextentifthereceiver-pullmodelisemployedbyInternetapplications,http://doc.docsou.comingthreepopularapplications–Email,mobiletextmessages,andasynchronousvoicemessages–asexamples,wedemonstratethatasynchronouscommunicationprotocolscanbeeasilydesignedusingthereceiver-pullcommunicationmodeltosuppressunwantedInternettraf c.
I.INTRODUCTION
InrecentyearstheInternethasbeenincreasinglyplaguedbytheseemingly-never-endingunwantedtraf c,manifestingitselfinlargevolumesofunsolicitedbulkEmails(spam),frequentoutbreaksofvirus/wormattacks,andlargescaleDistributedDenialofServices(DDoS)attacks.Forexample,itwasestimatedthat32billionspammessagesweresentdailyontheInternetasofNovember2003[10].Worse,spammersandvirus/wormattackersareincreasinglyjoiningforcetoautomatespammingbyhijacking(home)usermachinesthroughvirus/wormattacks.Arecentstudyreportedthatashighas80%ofspammessagesweresentfromcompromisedusermachines(zombies)[7].Inthispaper,wefocusourattentiononspam-likeunwantedInternettraf c,
whichplaguescriticalInternetapplicationsandservicessuchasEmails,mobiletextmessages,andasynchronousvoicemessages(wherearecordedvoicemessageissenttoalistofreceivers).Werefertosuchapplicationscollectivelyasmessageservices.Inthispaper,weareespeciallyinterestedintheimplicationsoftheprotocoldesignoncontrollingunwantedtraf contheInternet.Giventheimportanceofcontrollingspamforpreserv-ingthevalueofthemessagesystems,thisissuehasattractedagreatamountofattentioninbothnetwork-ingresearchandindustrialcommunities.Manydifferentspamcontrolschemes(inthecontextofInternetEmails)havebeenproposed,andsomeofthemhavebeendeployedontheInternet[2],[6],[8],[11],[13],[14].Ontheotherhand,despitetheseanti-spamresearchanddevelopmentefforts,theproportionofspamseenontheInternethasbeencontinuouslyontherise.Itwasestimatedthatnowadaysspammessagesconstitute79%ofallbusinessEmails,upfrom68%sincetheUSfederalCan-SpamActof2003tookeffectinJanuary2004[1].Itwasalsoreportedthat80%ofmobilephonetextmessageswereunsolicitedinJapan[12],whereSMS(ShortMessageServices)ispopular,andisthereforeattractivetospammers.
Inthispaperwearguethatthedif cultiesinrestrain-ingspamcanbeattributedtothelackofreceivercontroloverhowmessagesshouldbedeliveredontheInternet.Forexample,inthecurrentSMTP-basedEmaildeliveryarchitecture[9],anyusercansendanEmailtoanotheratwill,regardlessofwhetherornotthereceiveriswillingtoacceptthemessage.IntheearlydaysoftheInternetdevelopment,thiswasnotabigproblemaspeopleonthenetworklargelytrustedeachother.However,sincethecommercializationoftheInternetinmid-1990,thenatureoftheInternetcommunityhaschanged.Ithasbecomelesstrustworthy,andEmailspamispossiblyoneofthemostnotableexamplesoftheuntrustworthynatureoftheInternet.
热门文档