29.07.2013 Views

Master of Science thesis Fighting Spam

Master of Science thesis Fighting Spam

Master of Science thesis Fighting Spam

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

5.6.1 Økonomisk misbrug ..................................................................................49<br />

5.6.2 Netværkstrusler .........................................................................................50<br />

5.6.3 Fysiske trusler ...........................................................................................51<br />

6 Design .......................................................................................................................53<br />

6.1 Systemstruktur...................................................................................................53<br />

6.1.1 Infrastruktur...............................................................................................53<br />

6.2 Autentifikation ..................................................................................................54<br />

6.2.1 Oprettelse ..................................................................................................54<br />

6.2.1.a Traditionelt certifikatsystem ................................................................. 55<br />

6.2.1.b <strong>Spam</strong>Cash certifikatsystem ...................................................................55<br />

6.2.2 Pengeoverførsler........................................................................................56<br />

6.3 Design af elektroniske penge ............................................................................56<br />

6.3.1 Betaling .....................................................................................................57<br />

6.3.2 Møntstruktur..............................................................................................58<br />

6.3.2.a Transaktionslisten..................................................................................59<br />

6.3.3 Økonomisk misbrug ..................................................................................61<br />

6.3.3.a Modifikation..........................................................................................61<br />

6.3.3.b Tyveri ....................................................................................................62<br />

6.4 Blacklisting .......................................................................................................63<br />

6.4.1 Opdatering af blacklist ..............................................................................64<br />

6.4.2 Detektion af kopier....................................................................................66<br />

6.4.2.a Detektion i pengeserver.........................................................................66<br />

6.4.2.b Detektion i klient...................................................................................66<br />

6.5 Anonymitet........................................................................................................67<br />

6.5.1 Anonymitet overfor systemet....................................................................67<br />

6.5.2 Anonymitet overfor andre brugere............................................................68<br />

6.6 Use-cases...........................................................................................................69<br />

6.6.1 Use Case 1a: Start program.......................................................................69<br />

6.6.2 Use Case 1b: Start program.......................................................................70<br />

6.6.3 Use Case 2: Konfigurer program ..............................................................70<br />

6.6.4 Use Case 3: Penge-status...........................................................................70<br />

6.6.5 Use Case 4a: Afsend email .......................................................................71<br />

6.6.6 Use Case 4b: Afsend email .......................................................................71<br />

6.6.7 Use Case 5: Modtag email ........................................................................71<br />

6.6.8 Use Case 6: Indkasser <strong>Spam</strong>Cash ..........................................................72<br />

6.6.9 Use Case 7: Hæv Penge ............................................................................72<br />

6.6.10 Use Case 8: Indløs penge ..........................................................................73<br />

6.6.11 Use Case 9: Tilføj email til whitelist.........................................................73<br />

6.6.12 Use Case 10: Fjern email fra whitelist ......................................................73<br />

6.6.13 Use Case 11: Luk program........................................................................74<br />

6.7 Sikkerhed...........................................................................................................74<br />

6.7.1 Lokal sikkerhed.........................................................................................74<br />

6.7.2 Netværkssikkerhed....................................................................................75<br />

6.7.3 Nøglestørrelser ..........................................................................................75<br />

6.8 Kommunikationsprotokoller og serverdesign ...................................................77<br />

6.8.1 Servere.......................................................................................................77<br />

2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!