Abstract
Due to wide range of users, email had emerged as one of the preferred method to intrude Local area networks and end users. In this paper we examine the characteristics of various email security threats and the technology used by attackers. In order to counter defense technology, attackers change their mode of operation frequently. The continuous evaluation of attacker’s pattern will help the industry to combat attacks effectively. In our study, we collected several thousand spam from a corporate server for a period of 12 months from Jan 2012 to Jan 2013. From the collected data, we identified various types of security threats through email and the attacker’s mode of operation. We believe that this study will help to develop more efficient and secure methodologies against security threats through email.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
B. Cynthia Dhinakaran, Jae-Kwang Lee, D. Nagamalai, An empirical study of spam and spam vulnerable email accounts, in Proceedings of FGCN-2007, IEEE CS Publications, vol. 1, Dec 2007, pp. 408–413
B. Cynthia Dhinakaran, Jae-Kwang Lee, D. Nagamalai, Characterizing spam traffic and spammers, in Proceedings of ICCIT 2007, IEEE CS Publications, Nov 2007, pp. 831–836
C. Dhinakaran, D. Nagamalai, Jae-Kwang Lee, Multilayer approach to defend phishing attacks. J. Internet Technol. 11(3), pp. 417–426 (2010)
G. Zhang, M. Parashar, Cooperative detection and protection against network attacks using decentralized information sharing [last]. Cluster Comput. 13(1), 67–86 (2010)
T. Moore, R. Clayton, The impact of public information on phishing attack and defense. Commun. Strateg. 81, 47–67 (2011)
B. Dhinakaran, D. Nagamalai, Jae-Kwang Lee, Bayesian approach based comment spam defending tool. Adv. Info. Secur. Assur. LNCS 5576, pp. 578–587 (2009)
D. Nagamalai, B. Cynthia Dhinakaran, Jae-Kwang Lee, Multi layer approach to defend DDoS attacks caused by spam, in Proceedings of IEEE MUE 07, April 2007, pp. 97–102
S. Kumar, S. Surisetty, Microsoft vs Apple: resilience against distributed denial of service attacks, IEEE Security & Privacy, March–April 2012, pp. 60–64
W.L. Cukier, E.J. Nesselroth, S. Cody, Genre, narrative and the “Nigerian Letter” in electronic mail, in Proceedings of 40th HICSS-2007, pp. 1–10
J. Francois, I. Aib, R. Boutaba, Firecol: a collaborative protection network from the detection of flooding DDoS attacks. IEEE/ACM Trans. Netw. 20(6), 1828–1841 (2012)
Arbor networks’ sixth annual worldwide infrastructure security report, Reveals DDoS attack size breaks 100 Gbps for first time; Up 1000 % Since 2005, 1 Feb 2011, http://www.allvoices.com/news/8061300-arbor-networks-sixth-annual-worldwide-infrastructure-security-report-reveals-ddos-attack-size-breaks-100-gbps-for-first-time-up-1000-since-2005
B. Harden, South Korean web sites are hobbled in New Round of attacks, The Washington Post, 10 July 2009, http://articles.washingtonpost.com/2009-07-10/world/36838896_1_web-sites-computer-security-intelligence-agency
Sony tells congress anonymous DDoS aided breach, Infosec island, 5 May 2011), http://www.infosecisland.com/blogview/13558-Sony-Tells-Congress-Anonymous-DDoS-Aided-Breach.html
T.F. Stafford, R. Poston, Online security threats and Computer User Intentions, IEEE CS Computers Magazine, pp 58–63 (2010)
C. Dhinakaran, Jae Kwang Lee, D. Dhinaharan Nagamalai, Reminder: please update your details: phishing trends (2009, December). IEEE Xplore, in Networks and Communications, 2009. NETCOM’09. pp. 295–300
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Nagamalai, D., Dhinakaran, B.C., Ozcan, A., Okatan, A., Lee, JK. (2014). Empirical Study of Email Security Threats and Countermeasures. In: Meghanathan, N., Nagamalai, D., Rajasekaran, S. (eds) Networks and Communications (NetCom2013). Lecture Notes in Electrical Engineering, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-319-03692-2_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-03692-2_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-03691-5
Online ISBN: 978-3-319-03692-2
eBook Packages: EngineeringEngineering (R0)