Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Spam Weeding, Detection and Filtering on P2P System


Affiliations
1 Department of Computer Science and Engineering, Pondicherry Engineering College, India
     

   Subscribe/Renew Journal


Domain Keys Identified Mail (DKIM) defines a mechanism for using digital signatures on E-Mail at the domain level,allowing the receiving domain to confirm that E-Mail came from the domain it claims to. Erasure codes introduce pollution attack, an attack in which the adversary injects packets to disrupt the erasure decoding procedure and consequently denies the authentication service to the receiver. This paper modifies the DKIM by encrypting the content of the E-Mail and proposes a new lightweight, pollution-attack resistant multicast authentication scheme (PARM), which generates evidence that receivers can validate on a fast, per-packet basis.

Keywords

DKIM, Pollution Attack, Evidence, PARM.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 264

PDF Views: 2




  • Spam Weeding, Detection and Filtering on P2P System

Abstract Views: 264  |  PDF Views: 2

Authors

M. Packiavathy
Department of Computer Science and Engineering, Pondicherry Engineering College, India
K. Saruladha
Department of Computer Science and Engineering, Pondicherry Engineering College, India

Abstract


Domain Keys Identified Mail (DKIM) defines a mechanism for using digital signatures on E-Mail at the domain level,allowing the receiving domain to confirm that E-Mail came from the domain it claims to. Erasure codes introduce pollution attack, an attack in which the adversary injects packets to disrupt the erasure decoding procedure and consequently denies the authentication service to the receiver. This paper modifies the DKIM by encrypting the content of the E-Mail and proposes a new lightweight, pollution-attack resistant multicast authentication scheme (PARM), which generates evidence that receivers can validate on a fast, per-packet basis.

Keywords


DKIM, Pollution Attack, Evidence, PARM.