Empirical Study of Email Security Threats and Countermeasures
![Thumbnail](/xmlui/bitstream/handle/20.500.12498/4798/978-3-319-03692-2.jpg?sequence=2&isAllowed=y)
Tarih
2014Yazar
DHINAHAR, Nagamalai
DHINAHAR, Beatrice Cynthia
ÖZCAN, Abdulkadir
OKATAN, Ali
LEE, Jae-Kwang
Üst veri
Tüm öğe kaydını gösterÖzet
Due to wide range of users, email had emerged as one of the preferred
method to intrude Local area networks and end users. In this paper we
examine the characteristics of various email security threats and the
technology used by attackers. In order to counter defense technology,
attackers change their mode of operation frequently. The continuous
evaluation of attacker's pattern will help the industry to combat
attacks effectively. In our study, we collected several thousand spam
from a corporate server for a period of 12 months from Jan 2012 to Jan
2013. From the collected data, we identified various types of security
threats through email and the attacker's mode of operation. We believe
that this study will help to develop more efficient and secure
methodologies against security threats through email.
Koleksiyonlar
![Creative Commons License](http://i.creativecommons.org/l/by-nc-nd/4.0/88x31.png)
DSpace@Karatay by Karatay University Institutional Repository is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 4.0 Unported License..