Skip to main content

Empirical Study of Email Security Threats and Countermeasures

  • Conference paper
  • First Online:
Networks and Communications (NetCom2013)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 284))

  • 847 Accesses

Abstract

Due to wide range of users, email had emerged as one of the preferred method to intrude Local area networks and end users. In this paper we examine the characteristics of various email security threats and the technology used by attackers. In order to counter defense technology, attackers change their mode of operation frequently. The continuous evaluation of attacker’s pattern will help the industry to combat attacks effectively. In our study, we collected several thousand spam from a corporate server for a period of 12 months from Jan 2012 to Jan 2013. From the collected data, we identified various types of security threats through email and the attacker’s mode of operation. We believe that this study will help to develop more efficient and secure methodologies against security threats through email.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. B. Cynthia Dhinakaran, Jae-Kwang Lee, D. Nagamalai, An empirical study of spam and spam vulnerable email accounts, in Proceedings of FGCN-2007, IEEE CS Publications, vol. 1, Dec 2007, pp. 408–413

    Google Scholar 

  2. B. Cynthia Dhinakaran, Jae-Kwang Lee, D. Nagamalai, Characterizing spam traffic and spammers, in Proceedings of ICCIT 2007, IEEE CS Publications, Nov 2007, pp. 831–836

    Google Scholar 

  3. C. Dhinakaran, D. Nagamalai, Jae-Kwang Lee, Multilayer approach to defend phishing attacks. J. Internet Technol. 11(3), pp. 417–426 (2010)

    Google Scholar 

  4. G. Zhang, M. Parashar, Cooperative detection and protection against network attacks using decentralized information sharing [last]. Cluster Comput. 13(1), 67–86 (2010)

    Article  Google Scholar 

  5. T. Moore, R. Clayton, The impact of public information on phishing attack and defense. Commun. Strateg. 81, 47–67 (2011)

    Google Scholar 

  6. B. Dhinakaran, D. Nagamalai, Jae-Kwang Lee, Bayesian approach based comment spam defending tool. Adv. Info. Secur. Assur. LNCS 5576, pp. 578–587 (2009)

    Google Scholar 

  7. D. Nagamalai, B. Cynthia Dhinakaran, Jae-Kwang Lee, Multi layer approach to defend DDoS attacks caused by spam, in Proceedings of IEEE MUE 07, April 2007, pp. 97–102

    Google Scholar 

  8. S. Kumar, S. Surisetty, Microsoft vs Apple: resilience against distributed denial of service attacks, IEEE Security & Privacy, March–April 2012, pp. 60–64

    Google Scholar 

  9. W.L. Cukier, E.J. Nesselroth, S. Cody, Genre, narrative and the “Nigerian Letter” in electronic mail, in Proceedings of 40th HICSS-2007, pp. 1–10

    Google Scholar 

  10. J. Francois, I. Aib, R. Boutaba, Firecol: a collaborative protection network from the detection of flooding DDoS attacks. IEEE/ACM Trans. Netw. 20(6), 1828–1841 (2012)

    Article  Google Scholar 

  11. Arbor networks’ sixth annual worldwide infrastructure security report, Reveals DDoS attack size breaks 100 Gbps for first time; Up 1000 % Since 2005, 1 Feb 2011, http://www.allvoices.com/news/8061300-arbor-networks-sixth-annual-worldwide-infrastructure-security-report-reveals-ddos-attack-size-breaks-100-gbps-for-first-time-up-1000-since-2005

  12. B. Harden, South Korean web sites are hobbled in New Round of attacks, The Washington Post, 10 July 2009, http://articles.washingtonpost.com/2009-07-10/world/36838896_1_web-sites-computer-security-intelligence-agency

  13. Sony tells congress anonymous DDoS aided breach, Infosec island, 5 May 2011), http://www.infosecisland.com/blogview/13558-Sony-Tells-Congress-Anonymous-DDoS-Aided-Breach.html

  14. T.F. Stafford, R. Poston, Online security threats and Computer User Intentions, IEEE CS Computers Magazine, pp 58–63 (2010)

    Google Scholar 

  15. C. Dhinakaran, Jae Kwang Lee, D. Dhinaharan Nagamalai, Reminder: please update your details: phishing trends (2009, December). IEEE Xplore, in Networks and Communications, 2009. NETCOM’09. pp. 295–300

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dhinaharan Nagamalai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Nagamalai, D., Dhinakaran, B.C., Ozcan, A., Okatan, A., Lee, JK. (2014). Empirical Study of Email Security Threats and Countermeasures. In: Meghanathan, N., Nagamalai, D., Rajasekaran, S. (eds) Networks and Communications (NetCom2013). Lecture Notes in Electrical Engineering, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-319-03692-2_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03692-2_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03691-5

  • Online ISBN: 978-3-319-03692-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics