TITLE

A NOVEL APPROACH AGAINST E-MAIL ATTACKS DERIVED FROM USER-AWARENESS BASED TECHNIQUES

AUTHOR(S)
Ojha, Gaurav; Tak, Gaurav Kumar
PUB. DATE
August 2012
SOURCE
International Journal of Information Technology Convergence & Se;Aug2012, Vol. 2 Issue 4, p1
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
A large part of modern day communications are carried out through the medium of E-mails, especially corporate communications. More and more people are using E-mail for personal uses too. Companies also send notifications to their customers in E-mail. In fact, in the Multinational business scenario E-mail is the most convenient and sought-after method of communication. Important features of E-mail such as its speed, reliability, efficient storage options and a large number of added facilities make it highly popular among people from all sectors of business and society. But being largely popular has its negative aspects too. E-mails are the preferred medium for a large number of attacks over the internet. Some of the most popular attacks over the internet include spams, and phishing mails. Both spammers and phishers utilize E-mail services quite efficiently in spite of a large number of detection and prevention techniques already in place. Very few methods are actually good in detection/prevention of spam/phishing related mails but they have higher false positives. A variety of filters such as Bayesian filters, Checksum-based filters, machine learning based filters and memory-based filters are usually used in order to identify spams. These techniques are implemented at the server and in addition to giving higher number of false positives, they add to the processing load on the server. This paper outlines a novel approach to detect not only spam, but also scams, phishing and advertisement related mails. In this method, we overcome the limitations of server-side detection techniques by utilizing some intelligence on the part of users. Keywords parsing, token separation and knowledge bases are used in the background to detect almost all E-mail attacks. The proposed methodology, if implemented, can help protect E-mail users from almost all kinds of unwanted mails with enhanced efficiency, reduced number of false positives while not increasing the load on E-mail servers.
ACCESSION #
82373806

 

Related Articles

  • Information Security: Code Red, Code Red II, and SirCam Attacks Highlight Need for Proactive Measures: GAO-01-1073T.  // GAO Reports;8/29/2001, p1 

    Organizations and individuals have recently had to contend with particularly vexing computer attacks. The most notable is Code Red, but potentially more damaging are Code Red II and SirCam. Together, these attacks have infected millions of computer users, shut down websites, slowed Internet...

  • IT directors list cyber threats as top priority.  // Computer Weekly;2/3/2004, p38 

    Firms failing to report attacks on their information technology (IT), phishing, unexpected cyberattacks and cyberterrorism are the four biggest "banana skin" risk areas for IT leaders in 2004, according to a report by the Real Time Club based on a debate and membership survey at the end of 2003....

  • End e-mail tyranny. Cohen, Sharon; Strote, Mary Ellen // Shape;Aug2004, Vol. 23 Issue 12, p96 

    Presents information on reducing e-mail overload for computer users.

  • Junk mail hell -- from Victoria's Secret to the Scooter Store. Younts, Clint // Hays Free Press (Buda, TX);4/21/2010, Vol. 107 Issue 3, p5A 

    In this article, the author discusses various aspects of the junk electronic mails received by the users on the computers.

  • Comparative study of Authorship Identification Techniques for Cyber Forensics Analysis. Nirkhi, Smita; Dharaska, R. V. // International Journal of Advanced Computer Science & Application;May2013, Vol. 4 Issue 5, p32 

    Authorship Identification techniques are used to identify the most appropriate author from group of potential suspects of online messages and find evidences to support the conclusion. Cybercriminals make misuse of online communication for sending blackmail or a spam email and then attempt to...

  • Time for an e-mail call. Connolly, P.J. // InfoWorld;10/21/2002, Vol. 24 Issue 42, p25 

    Focuses on the e-mail from Forrest Landreth which attacked a magazine column on September 23, 2002 which deals with cyberattacks. Comparison between the attack on Pearl Harbor and a cyberattack; Uses of the Network Address Translation.

  • HOW SECURE IS YOUR MACHINE? Chen, Christine Y. // Fortune;10/18/2004, Vol. 150 Issue 8, p268 

    The article suggests steps to take against computer viruses and worms if you are an individual or small business. Install an antivirus program. These companies all offer personal firewalls too; make sure your computer has one. Check for patches or software updates. If you use your computer...

  • Netsky's Number One Spot Shows Users Still Not Protecting Their Machines.  // Software World;Mar2006, Vol. 37 Issue 2, p26 

    The article reports on the results of the February 2006 computer virus statistics which put Netsky at the top spot and the reason behind it. SoftScan, Scandinavia's managed email security service, informed that the statistics shows that email messages containing viruses account for 0.6% of total...

  • Think those joke e-mails are funny? Look in the mirror. Goldsborough, Reid // Business Journal (Central New York);1/24/2003, Vol. 17 Issue 4, p33 

    Provides hints about electronic mail jokes of computers users. Murphy's Laws of information technology; Preservation of computer data; Symptoms of an Internet addicted person.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics