{"title":"从区域互联网注册管理机构的角度调查反垃圾邮件机制及其使用情况","authors":"A. Phokeer, Alain Aina","doi":"10.1109/ISTAFRICA.2016.7530604","DOIUrl":null,"url":null,"abstract":"This paper specifically deals with the different policies and technical frameworks at a Regional Internet Registry (RIR) level in terms of anti-spam measures. It also exposes the issue of spam from an Internet registry perspective, as an important element of the Internet technical infrastructure. We found out that, an RIR itself is not mandated to fight spam but it maintains a registry that is of paramount importance for traceability of Internet Number Resources ownership information. The paper starts with describing the challenges faced by operators followed by the different sources of spam. It then exposes the different mechanisms deployed by RIRs but importantly, this paper shows how those mechanisms either technical or policy-oriented are mostly underutilised, although they are operational. The latter is achieved by taking AFRINIC, the African RIR as case study.","PeriodicalId":326074,"journal":{"name":"2016 IST-Africa Week Conference","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A survey of anti-spam mechanisms and their usage from a Regional Internet Registry's perspective\",\"authors\":\"A. Phokeer, Alain Aina\",\"doi\":\"10.1109/ISTAFRICA.2016.7530604\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper specifically deals with the different policies and technical frameworks at a Regional Internet Registry (RIR) level in terms of anti-spam measures. It also exposes the issue of spam from an Internet registry perspective, as an important element of the Internet technical infrastructure. We found out that, an RIR itself is not mandated to fight spam but it maintains a registry that is of paramount importance for traceability of Internet Number Resources ownership information. The paper starts with describing the challenges faced by operators followed by the different sources of spam. It then exposes the different mechanisms deployed by RIRs but importantly, this paper shows how those mechanisms either technical or policy-oriented are mostly underutilised, although they are operational. The latter is achieved by taking AFRINIC, the African RIR as case study.\",\"PeriodicalId\":326074,\"journal\":{\"name\":\"2016 IST-Africa Week Conference\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-05-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IST-Africa Week Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISTAFRICA.2016.7530604\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IST-Africa Week Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISTAFRICA.2016.7530604","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A survey of anti-spam mechanisms and their usage from a Regional Internet Registry's perspective
This paper specifically deals with the different policies and technical frameworks at a Regional Internet Registry (RIR) level in terms of anti-spam measures. It also exposes the issue of spam from an Internet registry perspective, as an important element of the Internet technical infrastructure. We found out that, an RIR itself is not mandated to fight spam but it maintains a registry that is of paramount importance for traceability of Internet Number Resources ownership information. The paper starts with describing the challenges faced by operators followed by the different sources of spam. It then exposes the different mechanisms deployed by RIRs but importantly, this paper shows how those mechanisms either technical or policy-oriented are mostly underutilised, although they are operational. The latter is achieved by taking AFRINIC, the African RIR as case study.