ietf-asrg
[Top] [All Lists]

[Asrg] Taxonomy of anti-spam systems version 2

2003-03-18 02:40:50
After more thought and feeedback from some people on the list, here is a
second draft of the taxonomy of anti-spam systems. 

The systems are classified into prevention, deterrence, and reaction
approaches.


1.      Spam Prevention Approaches - These systems aim to prevent the spread
of spam messages. There are fail-open and fail-closed systems. Fail-open
systems aim to detect unwanted messages; just as in intrusion detection,
there are signature-based and anomaly detection-based schemes. I've marked
them below as either [SB] or [AD]. Another useful view would be whether
systems are implemented at the ingress vs. egress and MTA vs. MUA.

a)      Fail-Open (determine unwanted messages)
        i)      Human determination
                (1)     Collaborative filtering (i.e., razor) [SB]
        ii)     System Determination
                (1)     Who is it from? (Blacklists) [SB]
                        (a)     Blacklists
                        (b)     Reputation systems
                (2)     What's in it? (Content Filtering)
                        (a)     Static lists [SB]       
                        (b)     Learning methods [AD]
                (3)     How was it sent?
                        (a)     Forged info? [AD] (i.e. reverse DNS, domain
lookup, verify email address                            on calling server,
verify message on sending server, reverse MX record)
                        (b)     Envelope characteristics; delivery path
information [SB/AD]
                        (c)     Quantity? [AD] (i.e. DCC)
 
b)      Fail-Closed (determine wanted messages)
        i)      Whitelists
                (1)     Basic   
                (2)     Verified
                        (a)     Authenticated sender identity
                        (b)     Token supported
                        (c)     Disposable email addresses              
        ii)     Challenge/Response systems
                (1)     Basic
                (2)     Human verification (i.e. turing tests)
        iii)    Consent Tokens (a priori consent)
                (1)     Proof-of-work (i.e. hashcash)
                (2)     Stamps
                (3)     Payment upon misbehavior 
                        (a)     Confirmed payment (i.e. Bonded Sender,
Trusted Sender)
                        (b)     Pursue payment (i.e.Habeas)
        iv)     Don't receive messages, just notification (i.e. IM2000) 



2)      Spam Deterrence Approaches - These systems aim to deter spamming
activities. In most areas of life, deterrence is achieved by introducing the
ability to identify and track wrongdoers. These systems can provide input to
spam prevention systems. Also, these systems are useful with the presence of
laws to prosecute the wrongdoers that are identified and tracked.

        a)      Authentication
        b)      Tracking        
        c)      Non-repudiation

3)      Spam Reaction Approaches - These are the different approaches that
can be taken upon receipt of a spam message. 

        a)      Accept
        b)      Quarantine
        c)      Reject
        d)      Drop
        e)      Label
        f)      Charge
        g)      Challenge
        h)      Limit Rate
                i)      Ingress
                ii)     Egress
        i)      Feedback
_______________________________________________
Asrg mailing list
Asrg(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/asrg