{"title":"A survey of anti-spam mechanisms and their usage from a Regional Internet Registry's perspective","authors":"A. Phokeer, Alain Aina","doi":"10.1109/ISTAFRICA.2016.7530604","DOIUrl":null,"url":null,"abstract":"This paper specifically deals with the different policies and technical frameworks at a Regional Internet Registry (RIR) level in terms of anti-spam measures. It also exposes the issue of spam from an Internet registry perspective, as an important element of the Internet technical infrastructure. We found out that, an RIR itself is not mandated to fight spam but it maintains a registry that is of paramount importance for traceability of Internet Number Resources ownership information. The paper starts with describing the challenges faced by operators followed by the different sources of spam. It then exposes the different mechanisms deployed by RIRs but importantly, this paper shows how those mechanisms either technical or policy-oriented are mostly underutilised, although they are operational. The latter is achieved by taking AFRINIC, the African RIR as case study.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":"106 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IST-Africa Week Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISTAFRICA.2016.7530604","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This paper specifically deals with the different policies and technical frameworks at a Regional Internet Registry (RIR) level in terms of anti-spam measures. It also exposes the issue of spam from an Internet registry perspective, as an important element of the Internet technical infrastructure. We found out that, an RIR itself is not mandated to fight spam but it maintains a registry that is of paramount importance for traceability of Internet Number Resources ownership information. The paper starts with describing the challenges faced by operators followed by the different sources of spam. It then exposes the different mechanisms deployed by RIRs but importantly, this paper shows how those mechanisms either technical or policy-oriented are mostly underutilised, although they are operational. The latter is achieved by taking AFRINIC, the African RIR as case study.