Advertisement

Empirical Study of Email Security Threats and Countermeasures

  • Dhinaharan NagamalaiEmail author
  • Beatrice Cynthia Dhinakaran
  • Abdulkadir Ozcan
  • Ali Okatan
  • Jae-Kwang Lee
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 284)

Abstract

Due to wide range of users, email had emerged as one of the preferred method to intrude Local area networks and end users. In this paper we examine the characteristics of various email security threats and the technology used by attackers. In order to counter defense technology, attackers change their mode of operation frequently. The continuous evaluation of attacker’s pattern will help the industry to combat attacks effectively. In our study, we collected several thousand spam from a corporate server for a period of 12 months from Jan 2012 to Jan 2013. From the collected data, we identified various types of security threats through email and the attacker’s mode of operation. We believe that this study will help to develop more efficient and secure methodologies against security threats through email.

Keywords

Local Area Network Intrusion Detection System Security Threat Identity Theft Email Account 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    B. Cynthia Dhinakaran, Jae-Kwang Lee, D. Nagamalai, An empirical study of spam and spam vulnerable email accounts, in Proceedings of FGCN-2007, IEEE CS Publications, vol. 1, Dec 2007, pp. 408–413Google Scholar
  2. 2.
    B. Cynthia Dhinakaran, Jae-Kwang Lee, D. Nagamalai, Characterizing spam traffic and spammers, in Proceedings of ICCIT 2007, IEEE CS Publications, Nov 2007, pp. 831–836Google Scholar
  3. 3.
    C. Dhinakaran, D. Nagamalai, Jae-Kwang Lee, Multilayer approach to defend phishing attacks. J. Internet Technol. 11(3), pp. 417–426 (2010)Google Scholar
  4. 4.
    G. Zhang, M. Parashar, Cooperative detection and protection against network attacks using decentralized information sharing [last]. Cluster Comput. 13(1), 67–86 (2010)CrossRefGoogle Scholar
  5. 5.
    T. Moore, R. Clayton, The impact of public information on phishing attack and defense. Commun. Strateg. 81, 47–67 (2011)Google Scholar
  6. 6.
    B. Dhinakaran, D. Nagamalai, Jae-Kwang Lee, Bayesian approach based comment spam defending tool. Adv. Info. Secur. Assur. LNCS 5576, pp. 578–587 (2009)Google Scholar
  7. 7.
    D. Nagamalai, B. Cynthia Dhinakaran, Jae-Kwang Lee, Multi layer approach to defend DDoS attacks caused by spam, in Proceedings of IEEE MUE 07, April 2007, pp. 97–102Google Scholar
  8. 8.
    S. Kumar, S. Surisetty, Microsoft vs Apple: resilience against distributed denial of service attacks, IEEE Security & Privacy, March–April 2012, pp. 60–64Google Scholar
  9. 9.
    W.L. Cukier, E.J. Nesselroth, S. Cody, Genre, narrative and the “Nigerian Letter” in electronic mail, in Proceedings of 40th HICSS-2007, pp. 1–10Google Scholar
  10. 10.
    J. Francois, I. Aib, R. Boutaba, Firecol: a collaborative protection network from the detection of flooding DDoS attacks. IEEE/ACM Trans. Netw. 20(6), 1828–1841 (2012)CrossRefGoogle Scholar
  11. 11.
    Arbor networks’ sixth annual worldwide infrastructure security report, Reveals DDoS attack size breaks 100 Gbps for first time; Up 1000 % Since 2005, 1 Feb 2011, http://www.allvoices.com/news/8061300-arbor-networks-sixth-annual-worldwide-infrastructure-security-report-reveals-ddos-attack-size-breaks-100-gbps-for-first-time-up-1000-since-2005
  12. 12.
    B. Harden, South Korean web sites are hobbled in New Round of attacks, The Washington Post, 10 July 2009, http://articles.washingtonpost.com/2009-07-10/world/36838896_1_web-sites-computer-security-intelligence-agency
  13. 13.
    Sony tells congress anonymous DDoS aided breach, Infosec island, 5 May 2011), http://www.infosecisland.com/blogview/13558-Sony-Tells-Congress-Anonymous-DDoS-Aided-Breach.html
  14. 14.
    T.F. Stafford, R. Poston, Online security threats and Computer User Intentions, IEEE CS Computers Magazine, pp 58–63 (2010)Google Scholar
  15. 15.
    C. Dhinakaran, Jae Kwang Lee, D. Dhinaharan Nagamalai, Reminder: please update your details: phishing trends (2009, December). IEEE Xplore, in Networks and Communications, 2009. NETCOM’09. pp. 295–300Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Dhinaharan Nagamalai
    • 1
    Email author
  • Beatrice Cynthia Dhinakaran
    • 2
  • Abdulkadir Ozcan
    • 1
  • Ali Okatan
    • 1
  • Jae-Kwang Lee
    • 3
  1. 1.Department of Computer Engineering, Faculty of EngineeringKTO Karatay UniversityKonyaTurkey
  2. 2.Optus NetworksSydneyAustralia
  3. 3.Department of Computer EngineeringHannam UniversityDaejoenSouth Korea

Personalised recommendations