作者
Surekha Gupta, Emmanuel S Pilli, Preeti Mishra, Sumit Pundir, RC Joshi
发表日期
2014/9/25
研讨会论文
2014 5th International Conference-Confluence The Next Generation Information Technology Summit (Confluence)
页码范围
898-904
出版商
IEEE
简介
E-mail is the most widely used application on the internet. However E-mail application is not totally reliable and safe communication medium as loopholes in protocols make the attacker able to misuse it for sending spoofed E-mails. E-mail sender spoofing is a major problem of the E-mail system. E-mail sender spoofing is a malicious activity in which the source is being modified and presented as if the E-mail is coming from intended sender whereas the original sender is an attacker. This paper presents the behavior of different E-mail client applications while receiving the sender spoofed E-mails. We propose an investigation algorithm for sender spoofing which will check for spoofed addresses in E-mail by performing extensive analysis on E-mail header fields. We have taken basically four fields into consideration i.e. Received SPF, DKIM, DKIM-Signature, and DMARC. Our algorithm checks for valid values of the …
引用总数
20162017201820192020202120222023202423312311
学术搜索中的文章
S Gupta, ES Pilli, P Mishra, S Pundir, RC Joshi - 2014 5th International Conference-Confluence The …, 2014