Spammer, ID Yourself - InformationWeek
IoT
IoT
Software // Enterprise Applications
News
3/25/2005
06:50 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Spammer, ID Yourself

IBM technology challenges spoofed messages before accepting them to stop spam

IBM last week introduced technology called FairUCE, for Fair Use of Unsolicited Commercial E-mail, that blocks spam by trying to ID the sender's Internet domain rather than evaluating message content.

FairUCE aims to stop spam at the perimeter, before it becomes a burden to business networks, says Marc Goubert, manager of IBM's alphaWorks, a Web site for downloading emerging technology. FairUCE sends a query that, if an E-mail's domain is spoofed, must be answered before the message is delivered. That puts a challenge's labor and bandwidth burdens only on those marked as spammers.

But identifying spammers is an inexact science. "A lot of spam these days comes from hacked machines," says Bruce Schneier, founder and chief technology officer of Counterpane Internet Security Inc.

FairUCE creator Matthew Nelson, a software engineer in IBM's Internet group, says the challenges are insignificant in terms of the data sent and are usually refused by suspect machines. And domains can avoid inquiries for spoofed mail by publishing a Sender Policy Framework record.

"This isn't meant to wage a war or start [denial-of-service] attacks," Goubert says. "This is why we're showcasing this on alphaWorks. It's an emerging technology from our R&D labs, and what we want to do is put it in the hands of developers and early adopters who can give us some feedback."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
[Interop ITX 2017] State Of DevOps Report
[Interop ITX 2017] State Of DevOps Report
The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll