Empirical Study of Email Security Threats and Countermeasures

  • Yazar/lar DHINAHAR, Nagamalai
    DHINAHAR, Beatrice Cynthia
    ÖZCAN, Abdulkadir
    OKATAN, Ali
    LEE, Jae-Kwang
  • Yayın Türü Konferans Bildirisi
  • Yayın Tarihi 2014
  • Yayıncı SPRINGER
  • Tek Biçim Adres http://hdl.handle.net/20.500.12498/4798

Due to wide range of users, email had emerged as one of the preferred method to intrude Local area networks and end users. In this paper we examine the characteristics of various email security threats and the technology used by attackers. In order to counter defense technology, attackers change their mode of operation frequently. The continuous evaluation of attacker's pattern will help the industry to combat attacks effectively. In our study, we collected several thousand spam from a corporate server for a period of 12 months from Jan 2012 to Jan 2013. From the collected data, we identified various types of security threats through email and the attacker's mode of operation. We believe that this study will help to develop more efficient and secure methodologies against security threats through email.

  • Koleksiyonlar
Erişime Açık
Görüntülenme
3
22.03.2024 tarihinden bu yana
İndirme
1
22.03.2024 tarihinden bu yana
Son Erişim Tarihi
19 Nisan 2024 14:25
Google Kontrol
Tıklayınız
Tam Metin
Detaylı Görünüm
Eser Adı
(dc.title)
Empirical Study of Email Security Threats and Countermeasures
Yayın Türü
(dc.type)
Konferans Bildirisi
Yazar/lar
(dc.contributor.author)
DHINAHAR, Nagamalai
Yazar/lar
(dc.contributor.author)
DHINAHAR, Beatrice Cynthia
Yazar/lar
(dc.contributor.author)
ÖZCAN, Abdulkadir
Yazar/lar
(dc.contributor.author)
OKATAN, Ali
Yazar/lar
(dc.contributor.author)
LEE, Jae-Kwang
Atıf Dizini
(dc.source.database)
Wos
Yayıncı
(dc.publisher)
SPRINGER
Yayın Tarihi
(dc.date.issued)
2014
Kayıt Giriş Tarihi
(dc.date.accessioned)
2020-08-07T14:19:07Z
Açık Erişim tarihi
(dc.date.available)
2020-08-07T14:19:07Z
ISSN
(dc.identifier.issn)
1876-1100
Özet
(dc.description.abstract)
Due to wide range of users, email had emerged as one of the preferred method to intrude Local area networks and end users. In this paper we examine the characteristics of various email security threats and the technology used by attackers. In order to counter defense technology, attackers change their mode of operation frequently. The continuous evaluation of attacker's pattern will help the industry to combat attacks effectively. In our study, we collected several thousand spam from a corporate server for a period of 12 months from Jan 2012 to Jan 2013. From the collected data, we identified various types of security threats through email and the attacker's mode of operation. We believe that this study will help to develop more efficient and secure methodologies against security threats through email.
Yayın Dili
(dc.language.iso)
en
Tek Biçim Adres
(dc.identifier.uri)
http://hdl.handle.net/20.500.12498/4798
Analizler
Yayın Görüntülenme
Yayın Görüntülenme
Erişilen ülkeler
Erişilen şehirler
6698 sayılı Kişisel Verilerin Korunması Kanunu kapsamında yükümlülüklerimiz ve cerez politikamız hakkında bilgi sahibi olmak için alttaki bağlantıyı kullanabilirsiniz.

creativecommons
Bu site altında yer alan tüm kaynaklar Creative Commons Alıntı-GayriTicari-Türetilemez 4.0 Uluslararası Lisansı ile lisanslanmıştır.
Platforms