By Topic

Spam detection and filtering on P2P system using agents

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
. M Packiavathy ; Department of Computer Science and Engineering, Pondicherry Engineering College, Pindicherry, India ; . K Saruladha

Domain keys identified mail (DKIM) defines a mechanism for using digital signatures on E-Mail at the domain level, allowing the receiving domain to confirm that E-Mail came from the domain it claims to. Erasure codes introduce pollution attack, an attack in which the adversary injects packets to disrupt the erasure decoding procedure and consequently denies the authentication service to the receiver. This paper uses the agent for checking the spam E-Mail by using DKIM and proposes a new lightweight, pollution-attack resistant multicast authentication scheme (PARM), which generates evidence that receiver agent can validate on a fast, per-packet basis. Using agent, the authenticity of the system will increase and also our system will be more secure. Because of using the temporal key, time will be saved for generating evidence to the same message.

Published in:

Intelligent Agent & Multi-Agent Systems, 2009. IAMA 2009. International Conference on

Date of Conference:

22-24 July 2009