豆搜网 文档下载 文档下载导航
设为首页 | 加入收藏
搜索 请输入内容:  
 导航当前位置: 文档下载 > 所有分类 > Push vs. pull Implications of protocol design on controlling unwanted traffic
侵权投诉

Push vs. pull Implications of protocol design on controlling unwanted traffic

Abstract — In this paper we argue that the difficulties in controlling unwanted Internet traffic, such as Email SPAM, stem from the fact that many Internet applications are fundamentally sender-driven and distinctly lack receiver control over traffic deli

Pushvs.Pull:ImplicationsofProtocolDesignon

ControllingUnwantedTraf c

ZhenhaiDuan

FloridaStateUniversityduan@cs.fsu.edu

YingfeiDong

UniversityofHawaiiyingfei@hawaii.edu

KartikGopalan

FloridaStateUniversitykartik@cs.fsu.edu

Abstract—Inthispaperwearguethatthedif cultiesincontrollingunwantedInternettraf c,suchasEmailSPAM,stemfromthefactthatmanyInternetappli-cationsarefundamentallysender-drivenanddistinctlylackreceivercontrolovertraf cdelivery.However,sinceonlyreceiversknowwhattheywanttoreceive,receiver-drivenapproachesmayoftenhaveclearadvantagesinrestrainingunwantedtraf c.Inthispaper,were-examinetheimplicationsofthetwocommontraf cdeliverymodels:sender-pushandreceiver-pull.Inthesender-pushmodel,asendercanatwilldelivertraf ctoareceiver,whocanonlypassivelyacceptthetraf c,suchasintheSMTP-basedEmaildeliverysystem.Incontrast,inthereceiver-pullmodel,receiverscanregulateifandwhentheywishtoretrievedata,suchastheHTTP-basedwebaccesssystem.WearguethattheproblemofunwantedInternettraf ccanbemitigatedtoagreatextentifthereceiver-pullmodelisemployedbyInternetapplications,http://doc.docsou.comingthreepopularapplications–Email,mobiletextmessages,andasynchronousvoicemessages–asexamples,wedemonstratethatasynchronouscommunicationprotocolscanbeeasilydesignedusingthereceiver-pullcommunicationmodeltosuppressunwantedInternettraf c.

I.INTRODUCTION

InrecentyearstheInternethasbeenincreasinglyplaguedbytheseemingly-never-endingunwantedtraf c,manifestingitselfinlargevolumesofunsolicitedbulkEmails(spam),frequentoutbreaksofvirus/wormattacks,andlargescaleDistributedDenialofServices(DDoS)attacks.Forexample,itwasestimatedthat32billionspammessagesweresentdailyontheInternetasofNovember2003[10].Worse,spammersandvirus/wormattackersareincreasinglyjoiningforcetoautomatespammingbyhijacking(home)usermachinesthroughvirus/wormattacks.Arecentstudyreportedthatashighas80%ofspammessagesweresentfromcompromisedusermachines(zombies)[7].Inthispaper,wefocusourattentiononspam-likeunwantedInternettraf c,

whichplaguescriticalInternetapplicationsandservicessuchasEmails,mobiletextmessages,andasynchronousvoicemessages(wherearecordedvoicemessageissenttoalistofreceivers).Werefertosuchapplicationscollectivelyasmessageservices.Inthispaper,weareespeciallyinterestedintheimplicationsoftheprotocoldesignoncontrollingunwantedtraf contheInternet.Giventheimportanceofcontrollingspamforpreserv-ingthevalueofthemessagesystems,thisissuehasattractedagreatamountofattentioninbothnetwork-ingresearchandindustrialcommunities.Manydifferentspamcontrolschemes(inthecontextofInternetEmails)havebeenproposed,andsomeofthemhavebeendeployedontheInternet[2],[6],[8],[11],[13],[14].Ontheotherhand,despitetheseanti-spamresearchanddevelopmentefforts,theproportionofspamseenontheInternethasbeencontinuouslyontherise.Itwasestimatedthatnowadaysspammessagesconstitute79%ofallbusinessEmails,upfrom68%sincetheUSfederalCan-SpamActof2003tookeffectinJanuary2004[1].Itwasalsoreportedthat80%ofmobilephonetextmessageswereunsolicitedinJapan[12],whereSMS(ShortMessageServices)ispopular,andisthereforeattractivetospammers.

Inthispaperwearguethatthedif cultiesinrestrain-ingspamcanbeattributedtothelackofreceivercontroloverhowmessagesshouldbedeliveredontheInternet.Forexample,inthecurrentSMTP-basedEmaildeliveryarchitecture[9],anyusercansendanEmailtoanotheratwill,regardlessofwhetherornotthereceiveriswillingtoacceptthemessage.IntheearlydaysoftheInternetdevelopment,thiswasnotabigproblemaspeopleonthenetworklargelytrustedeachother.However,sincethecommercializationoftheInternetinmid-1990,thenatureoftheInternetcommunityhaschanged.Ithasbecomelesstrustworthy,andEmailspamispossiblyoneofthemostnotableexamplesoftheuntrustworthynatureoftheInternet.

第1页

TOP相关主题

热门文档

站点地图 | 文档上传 | 侵权投诉 | 手机版
新浪认证  诚信网站  绿色网站  可信网站   非经营性网站备案
本站所有资源均来自互联网,本站只负责收集和整理,均不承担任何法律责任,如有侵权等其它行为请联系我们.
文档下载 Copyright 2013 doc.docsou.com All Rights Reserved.  闽ICP备15022310号-9  闽公网安备 35021102001881号  email
返回顶部