Spam Detection and Filtering on P2P System Using Agents

被引:0
|
作者
Packiavathy, M. [1 ]
Saruladha, K. [1 ]
机构
[1] Pondicherry Engn Coll, Dept Comp Sci & Engn, Pindicherry, India
关键词
DKIM; Evidence; Pollution attack;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Domain Keys Identified Mail (DKIM) defines a mechanism for using digital signatures on E-Mail at the domain level, allowing the receiving domain to confirm that E-Mail came from the domain it claims to. Erasure codes introduce pollution attack, an attack in which the adversary injects packets to disrupt the erasure decoding procedure and consequently denies the authentication service to the receiver. This paper uses the agent for checking the spam E-Mail by using DKIM and proposes a new lightweight, pollution-attack resistant multicast authentication scheme (PARM), which generates evidence that receiver agent can validate on a fast, per-packet basis. Using agent, the authenticity of the system will increase and also our system will be more secure. Because of using the temporal key, time will be saved for generating evidence to the same message.
引用
收藏
页码:152 / 158
页数:7
相关论文
共 50 条
  • [1] P2P-AVS: P2P based cooperative VoIP spam filtering
    Wang, Fei
    Mo, Yijun
    Huang, Benxiong
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 3550 - 3555
  • [2] Addressing interest diversity in P2P based collaborative spam filtering
    Fang Weidong
    Dong Shoubin
    GCC 2006: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING WORKSHOPS, PROCEEDINGS, 2006, : 163 - +
  • [3] A spam filter system based on P2P architecture
    Dong, Dafan
    Zhang, Jianzhong
    Wu, Ying
    Lu, Hongbo
    Wu, Gongyi
    PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, : 155 - 156
  • [4] P2P-Based collaborative Spam detection and filtering
    Damiani, E
    De Capitani di Vimercati, S
    Paraboschi, S
    Samarati, P
    FOURTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2004, : 176 - 183
  • [5] A Geographical Observation System based on P2P Agents
    Teranishi, Yuuichi
    Tanaka, Hirokazu
    Ishi, Yoshimasa
    Yoshida, Mikio
    2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 615 - +
  • [6] Authentication with P2P agents
    Ghanea-Hercock, R
    BT TECHNOLOGY JOURNAL, 2003, 21 (04) : 146 - 152
  • [7] Advanced P2P architecture using autonomous agents
    Homayounfar, H
    Wang, F
    Areibi, S
    COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, 2002, : 115 - 118
  • [8] P2P collaborative filtering with privacy
    Kaleli, Cihan
    Polat, Hueseyin
    TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2010, 18 (01) : 101 - 116
  • [9] Multi-agent interaction based collaborative P2P system for fighting Spam
    Mo, Guoqing
    Zhao, Wei
    Cao, Haixia
    Dong, Jianshe
    2006 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON INTELLIGENT AGENT TECHNOLOGY, PROCEEDINGS, 2006, : 428 - 431
  • [10] A scalable P2P recommender system based on distributed collaborative filtering
    Han, P
    Xie, B
    Yang, F
    Shen, RM
    EXPERT SYSTEMS WITH APPLICATIONS, 2004, 27 (02) : 203 - 210