CFP last date
22 April 2024
Reseach Article

A Survey of Email Service; Attacks, Security Methods and Protocols

by Haider M. Al-Mashhadi, Mohammed H. Alabiech
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 162 - Number 11
Year of Publication: 2017
Authors: Haider M. Al-Mashhadi, Mohammed H. Alabiech
10.5120/ijca2017913417

Haider M. Al-Mashhadi, Mohammed H. Alabiech . A Survey of Email Service; Attacks, Security Methods and Protocols. International Journal of Computer Applications. 162, 11 ( Mar 2017), 31-40. DOI=10.5120/ijca2017913417

@article{ 10.5120/ijca2017913417,
author = { Haider M. Al-Mashhadi, Mohammed H. Alabiech },
title = { A Survey of Email Service; Attacks, Security Methods and Protocols },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 162 },
number = { 11 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 31-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume162/number11/27289-2017913417/ },
doi = { 10.5120/ijca2017913417 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:08:46.547217+05:30
%A Haider M. Al-Mashhadi
%A Mohammed H. Alabiech
%T A Survey of Email Service; Attacks, Security Methods and Protocols
%J International Journal of Computer Applications
%@ 0975-8887
%V 162
%N 11
%P 31-40
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Email security becomes a sensitive case to study in the field of information security. From the most important security issues of network is how to secure Email from the threats that can be exposed of the security of massages by attackers. In addition, what are the techniques that can be using to secure the Email? Different solutions and several standards levels have been fashioned according to the last security requirements that enhance the Email security. Some of the current enhancements concentrate on keeping the exchange of data through Email in an integral and confident way. While the others concentrate on authenticating the sender and confirm that, client will not repudiate from his message. This paper will explain Email works and discuss different threats in Email Communication and several Email security solutions. This paper introduces several models and techniques utilized to fix and enhance the safety of Email systems.

References
  1. Apeksha Nemavarkar, Rajesh Kumar Chakrawarti, 2015. "A uniform approach for multilevel Email security using image authentication, compression, OTP & cryptography". In Proceedings of the IEEE International Conference on Computer, Communication and Control IC4.
  2. Sunny gill, Gaurav Rupnar, Vaibhav Ramteke, Dipti Patil and Vijay M.Wadhai, "Email Security Protocol", International Journal of Computer Trends and Technology- March to April Issue 2011.
  3. Gurpal Singh Chhabra, Dilpreet Singh Bajwa, "Review of Email System, Security Protocols and Email Forensics", International Journal of Computer Science & Communication Networks, Vol. 5(3), 201-211, January 2015.
  4. Olalekan Adeyinka, May 2008. "Internet Attack Methods and Internet Security Technology". In Proceedings of the Second Asia International Conference on Modeling & Simulation.
  5. William Stallings, "Cryptography and Network Security Principles and Practice", Fifth Edition, 2011.
  6. M. G. Gouda, E. N. Elnozahy, C.-T. Huang and T. M. McGuire, "Hop Integrity in Computer Networks", IEEE/ACM Transactions on Networking, Vol. 10, Issue: 3, Jun 2002.
  7. Kunal Pandove, Amandeep Jindal and Rajinder Kumar. "E-Mail Spoofing", International Journal of Computer Applications, Vol. 5, No.-1, pp- 27-30, August 2010.
  8. P. Ramesh Babu, D. Lalitha Bhaskari and CH. Satyanarayana, "A Comprehensive Analysis of Spoofing", International Journal of Advanced Computer Science and Applications, Vol. 1, No.-6, Dec. 2010.
  9. Jitendra Nath Shrivastava, Maringanti Hima Bindu, "Email Spam Filtering Using Adaptive Genetic Algorithm", I.J. Intelligent Systems and Applications, 54-60, 02, January 2014.
  10. Kirill Levchenko, Andreas Pitsillidis, Neha Chachra, Brandon Enright, Márk Félegyházi, Chris Grier, Tristan Halvorson, Chris Kanich, Christian Kreibich, He Liu, Damon McCoy, Nicholas Weaver, Vern Paxson, Geoffrey M. Voelker and Stefan Savage, May 2011. "Click Trajectories: End-to-End Analysis of the Spam Value Chain", Oakland, CA: In Proceedings of the IEEE Conference on Security and Privacy (SP).
  11. Tim Bass, Alfredo Freyre, "E-Mail Bombs and Countermeasures: CyberAttacks on Availability and Brand Integrity", IEEE Network , Vol. 12, Issue:2 , Mar/April 1998.
  12. Pam Cocca, "Email Security Threats", GIAC Security Essentials Certification (GSEC) Practical Assignment - Version 1.4b Option1, September 20, 2004.
  13. Kim-Kwang Raymond Choo, "The Cyber Threat Landscape: Challenges and future Directions", Journal of Computer and Security, Science Direct, Elsevier, Vol. 30, Issue 8, pp-719-731, 2011.
  14. Gori Mohamed .J, M. Mohammed Mohideen and Shahira Banu. N, "E-Mail Phishing-An Open Threat to Everyone", International Journal of Scientific and Research Publications, Vol. 4, No.-2, Feb. 2014.
  15. Cleber K., Olivo , Altair O., Santin , Luiz S. and Oliveira, "Obtaining the Threat Model for E-mail Phishing", Journal of Applied Soft Computing, Science Direct, Elsevier, Vol. 13, Issue 12, Pages 4841–4848, Dec. 2013.
  16. Suresh Kumar B., Jagathy Raj V. P., "A Secure Email System Based on IBE, DNS and Proxy Service", Journal of Emerging Trends in Computing and Information Sciences, Vol. 3, No. 9, Sep. 2012.
  17. Yogendra Kumar Jain, Pramod B. Gosavi, 2008. "Email Security using Encryption and Compression", In Proceedings of the IEEE International Conference on Computational Intelligence for Modelling Control & Automation (CIMCA).
  18. Lein Harn, Jian Ren, "Design of Fully Deniable Authentication Service for E-mail Applications", IEEE Communications Letters, Vol. 12, No. 3, March 2008.
  19. Yi Zhang, Tianxi Cui and Hong Tang, 2008. "A new secure e-mail scheme based on Elliptic Curve Cryptography Combined Public Key". In Proceedings of the IEEE International Conference on Network and Parallel Computing (NPC).
  20. Aboli Bhanji, Priyanka Jadhav, Sayali Bhujbal and Punam Mulak, "Secure Server Verification By Using RSA Algorithm And Visual Cryptography", International Journal of Engineering Research & Technology (IJERT), Vol. 2 Issue 4, April 2013.
  21. Ajish S, Rajasree R., 2014. "Secure Mail using Visual Cryptography (SMVC)". In Proceedings of the International Conference on Computing Communication and Networking Technologies (ICCCNT), Hefei, China.
  22. Shweta Umredkar, Snehal Badhe and Hemali kondhekar, "Secure Server Verification", International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Vol. 4 Issue 4, April 2015.
  23. Wenqing Zhao, Yongli Zhu, 2005. "An Email Classification Scheme Based on Decision-Theoretic Rough Set Theory and Analysis of Email Security", In Proceedings of the TENCON IEEE Region 10 Conference.
  24. Cohen, W., 1996. "Ripper Algorithm", Learning Rules that Classify Email. In Proceedings of the AAAI Spring Symposium on Machine Learning in Information Access, Palo Alto, US: pp.18-25.
  25. Clack, C., Farrington, J., Lidwell, P., and Yu and T., 1997. "Genetic Document Classifier", Autonomous Document Classification for Business. In Proceedings of The ACM Agents Conference, pp.201-208.
  26. Spertus, E., 1997. "Smokey:Automatic Recognition of Hostile Messages". In Proceedings of Innovative Applications of Artificial Intelligence (IAAI),AAAI Press, pp.1058-1065.
  27. Sahami, M., Dumais, S., Heckerman, D., and Horvitz and E., 1998. "A Bayesian Approach to Filtering Junk Email, in Learning for Text Categorization", Papers from the Workshop AAAI Technical Report WS-98-05.
  28. Liu Pei-yu, Zhang Li-wei and Zhu Zhen-fang, "Research on E-mail Filtering Based On Improved Bayesian", Journal of Computers, Vol. 4, No. 3, March 2009.
  29. M. Basavaraju, R. Prabhakar, "A Novel Method of Spam Mail Detection using Text Based Clustering Approach", International Journal of Computer Applications (0975 – 8887), Vol. 5– No.4, August 2010.
  30. Samir A. Elsagheer Mohamed, "Efficient Spam Filtering System Based on Smart Cooperative Subjective and Objective Methods", International Journal Communications, Network and System Sciences, Vol. 6, Issue 2, 88-99, Feb. 2013.
  31. B.V.R.R.Nagarjuna, V. Sujatha, "An Innovative Approach for Detecting Targeted Malicious E-mail", International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol. 2, Issue 7, July 2013.
  32. Sarwat Nizamani, Nasrullah Memon, Mathies Glasdam and Dong Duong Nguyen, "Detection of fraudulent Emails by employing advanced feature abundance", Production and hosting by Elsevier B.V. on behalf of Faculty of Computers and Information, Cairo University Egyptian Informatics Journal, Vol. 15, Issue 3, 169–174, 2014.
  33. XiaoQing Gu, TongGuang Ni and Wei Wang, "Online Imbalanced Support Vector Machine for Phishing Emails Filtering", TELKOMNIKA Indonesian Journal of Electrical Engineering Vol. 12, No.6, pp. 4306 - 4313, June 2014.
  34. Siti-Hajar-Aminah Ali, Seiichi Ozawa, Junji Nakazato, Tao Ban and Jumpei Shimamura, "An Online Malicious Spam Email Detection System Using Resource Allocating Network with Locality Sensitive Hashing", Journal of Intelligent Learning Systems and Applications, Vol. 7, Issue 2, 42-57, 2015.
  35. Hung-Min Sun, Bin-Tsan Hsieh, and Hsin-Jia Hwang, "Secure E-mail Protocols Providing Perfect Forward Secrecy", IEEE Communications Letters, Vol. 9, No. 1, January 2005.
  36. Bum Han Kim, Jae Hyung Koo and Dong Hoon Lee, "Robust Email Protocols with Perfect Forward Secrecy", IEEE Communications Letters, Vol. 10, No. 6, June 2006.
  37. Mohsen Toorani, Dec. 2008. "SMEmail - A New Protocol for the Secure Email in Mobile Environment", In Proceedings of the IEEE International Conference Reprinted from the Proceedings of the Australian Telecommunications Networks and Applications (ATNAC'08), pp.39-44, Adelaide, Australia.
  38. Zhe Wu, Jie Tian, Liang Li, Cai-ping Jiang and Xin Yang, 2007 "A Secure Email System Based on Fingerprint Authentication Scheme", In Proceedings of the IEEE International Conference on Intelligence and Security Informatics.
  39. Hugh Wimberly, Lorie M. Liebrock, 2011. "Using Fingerprint Authentication to Reduce System Security - An Empirical Study", In Proceedings of the IEEE International on Symposium on Security and Privacy, IEEE.
  40. Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acquisti, Lorrie Faith Cranor, Jason Hong and Elizabeth Nunge, 2007. "Protecting People from Phishing: The Design and Evaluation of an Embedded Training Email System", In Proceedings of The free and open access Conference organize by the School of Computer Science at Research Showcase, accepted by Human Computer Interaction Institute.
  41. Tejaswini Herath, Rui Chen, Jingguo Wang, Ketan Banjara, Jeff Wilbur & H. Raghav Rao, "Security services as coping mechanisms: an investigation into user intention to adopt an Email authentication service," Information Systems Journal, Vol. 24, Issue 1Pages 61–84 24, January 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Email security Threats Encryption Filtering