dc.contributor | DHINAHAR, Nagamalai | |
dc.contributor | DHINAHAR, Beatrice Cynthia | |
dc.contributor | ÖZCAN, Abdulkadir | |
dc.contributor | OKATAN, Ali | |
dc.contributor | LEE, Jae-Kwang | |
dc.date.accessioned | 2020-08-07T14:19:07Z | |
dc.date.available | 2020-08-07T14:19:07Z | |
dc.date.issued | 2014 | |
dc.identifier | 10.1007/978-3-319-03692-2\_18 | |
dc.identifier.issn | 1876-1100 | |
dc.identifier.uri | http://hdl.handle.net/20.500.12498/4798 | |
dc.description.abstract | Due to wide range of users, email had emerged as one of the preferred
method to intrude Local area networks and end users. In this paper we
examine the characteristics of various email security threats and the
technology used by attackers. In order to counter defense technology,
attackers change their mode of operation frequently. The continuous
evaluation of attacker's pattern will help the industry to combat
attacks effectively. In our study, we collected several thousand spam
from a corporate server for a period of 12 months from Jan 2012 to Jan
2013. From the collected data, we identified various types of security
threats through email and the attacker's mode of operation. We believe
that this study will help to develop more efficient and secure
methodologies against security threats through email. | |
dc.language.iso | English | |
dc.publisher | SPRINGER | |
dc.title | Empirical Study of Email Security Threats and Countermeasures | |
dc.type | Konferans Bildirisi | |