Main content

Alert message

 

Project Name: Reducing unsolicited traffic in communication networks

 

Inventors: Dr. Shay Gueron, Dr. Ohad I. Unna

 

Field Of The Invention

The present invention, relates to traffic flow in communication networks and, more specifically, but not exclusively, to undesired message control within communication networks.

Description

The present invention, in some embodiments thereof, relates to traffic flow in communication networks and, more specifically, but not exclusively, to undesired and desired message control within communication networks.

The proliferation of unsolicited messages, also referred to as spam, has become a disturbance to internet users and businesses, as well as a burden on internet and telephony infrastructures. Spam communication can be disseminated in bulk to mass lists of recipients, cheaply and often anonymously. As such, unsolicited messaging remains economically viable because advertisers have little or no operating costs beyond the management of their mailing lists. It is also difficult to hold senders accountable for their mass mailings.

Existing approaches of mitigating spam require considerable involvement of recipients, for example their cooperation in identifying and reporting spam, or collaboration with legitimate senders. Other approaches include scanning and filtering messages according to pattern recognition techniques. These may result in unwanted filtering of messages sent from legitimate senders and commercial advertisers. Moreover, pattern recognition techniques can be circumvented by astute spammers over time.

Current anti-spam methodologies involving user interaction include, among others, avoiding the use of contact forms on the internet or disabling HTML rendering in e-mail. More centralized approaches include reputation services such as a sender policy framework or challenge-response systems for unknown senders. Such systems typically manage DNS blacklists of IP addresses of known spammers, known open relays, known proxy servers, compromised “zombie” spammers or the like.