Basit öğe kaydını göster

dc.contributorDHINAHAR, Nagamalai
dc.contributorDHINAHAR, Beatrice Cynthia
dc.contributorÖZCAN, Abdulkadir
dc.contributorOKATAN, Ali
dc.contributorLEE, Jae-Kwang
dc.date.accessioned2020-08-07T14:19:07Z
dc.date.available2020-08-07T14:19:07Z
dc.date.issued2014
dc.identifier10.1007/978-3-319-03692-2\_18
dc.identifier.issn1876-1100
dc.identifier.urihttp://hdl.handle.net/20.500.12498/4798
dc.description.abstractDue to wide range of users, email had emerged as one of the preferred method to intrude Local area networks and end users. In this paper we examine the characteristics of various email security threats and the technology used by attackers. In order to counter defense technology, attackers change their mode of operation frequently. The continuous evaluation of attacker's pattern will help the industry to combat attacks effectively. In our study, we collected several thousand spam from a corporate server for a period of 12 months from Jan 2012 to Jan 2013. From the collected data, we identified various types of security threats through email and the attacker's mode of operation. We believe that this study will help to develop more efficient and secure methodologies against security threats through email.
dc.language.isoEnglish
dc.publisherSPRINGER
dc.titleEmpirical Study of Email Security Threats and Countermeasures
dc.typeKonferans Bildirisi


Bu öğenin dosyaları:

DosyalarBoyutBiçimGöster

Bu öğe ile ilişkili dosya yok.

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster