A comprehensive examination of email spoofing: Issues and prospects for email security

SC Sethuraman, DP VS, T Reddi, MST Reddy… - Computers & …, 2024 - Elsevier
Attackers are becoming more skilled in recent years, using sophisticated technology to
produce look-alike emails that make it difficult to distinguish between real and fake ones …

[HTML][HTML] Addressing the challenges of modern DNS a comprehensive tutorial

O Van Der Toorn, M Müller, S Dickinson… - Computer Science …, 2022 - Elsevier
Abstract The Domain Name System (DNS) plays a crucial role in connecting services and
users on the Internet. Since its first specification, DNS has been extended in numerous …

ZDNS: a fast DNS toolkit for internet measurement

L Izhikevich, G Akiwate, B Berger… - Proceedings of the …, 2022 - dl.acm.org
Active DNS measurement is fundamental to understanding and improving the DNS
ecosystem. However, the absence of an extensible, high-performance, and easy-to-use …

COMAR: classification of compromised versus maliciously registered domains

S Maroofi, M Korczyński, C Hesselman… - 2020 IEEE European …, 2020 - ieeexplore.ieee.org
Miscreants abuse thousands of domain names every day by launching large-scale attacks
such as phishing or malware campaigns. While some domains are solely registered for …

Adoption of email anti-spoofing schemes: a large scale analysis

S Maroofi, M Korczyński, A Hölzel… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Sending forged emails by taking advantage of domain spoofing is a common technique
used by attackers. The lack of appropriate email anti-spoofing schemes or their …

Forward pass: On the security implications of email forwarding mechanism and policy

E Liu, G Akiwate, M Jonker, A Mirian… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
The critical role played by email has led to a range of extension protocols (eg, SPF, DKIM,
DMARC) designed to protect against the spoofing of email sender domains. These protocols …

Building a Resilient Domain Whitelist to Enhance Phishing Blacklist Accuracy

J Bayer, S Maroofi, O Hureau, A Duda… - … APWG Symposium on …, 2023 - ieeexplore.ieee.org
Phishing attacks constitute a significant threat to Internet users. One strategy for mitigating
this threat involves the use of blocklists by Internet Service Providers (ISPs), companies, and …

2 Years in the anti-phishing group of a large company

L Gallo, A Maiello, A Botta, G Ventre - Computers & Security, 2021 - Elsevier
The email threat landscape is constantly evolving and hence difficult to counteract even by
carrier-grade spam filters. Dangerous spam emails may thus reach the users and then result …

Study on domain name system (dns) abuse: Technical report

J Bayer, Y Nosyk, O Hureau, S Fernandez… - arXiv preprint arXiv …, 2022 - arxiv.org
A safe and secure Domain Name System (DNS) is of paramount importance for the digital
economy and society. Malicious activities on the DNS, generally referred to as" DNS abuse" …

Early detection of spam domains with passive DNS and SPF

S Fernandez, M Korczyński, A Duda - International Conference on Passive …, 2022 - Springer
Spam domains are sources of unsolicited mails and one of the primary vehicles for fraud
and malicious activities such as phishing campaigns or malware distribution. Spam domain …