CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Algorithm for Detection and Prevention of Email Date Spoofing

by M. Tariq Banday
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 21 - Number 6
Year of Publication: 2011
Authors: M. Tariq Banday
10.5120/2518-3421

M. Tariq Banday . Algorithm for Detection and Prevention of Email Date Spoofing. International Journal of Computer Applications. 21, 6 ( May 2011), 7-11. DOI=10.5120/2518-3421

@article{ 10.5120/2518-3421,
author = { M. Tariq Banday },
title = { Algorithm for Detection and Prevention of Email Date Spoofing },
journal = { International Journal of Computer Applications },
issue_date = { May 2011 },
volume = { 21 },
number = { 6 },
month = { May },
year = { 2011 },
issn = { 0975-8887 },
pages = { 7-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume21/number6/2518-3421/ },
doi = { 10.5120/2518-3421 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:07:46.402237+05:30
%A M. Tariq Banday
%T Algorithm for Detection and Prevention of Email Date Spoofing
%J International Journal of Computer Applications
%@ 0975-8887
%V 21
%N 6
%P 7-11
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Different security protocols offer different levels of security to insecure Simple Mail Transfer Protocol. These protocols vary considerably in degree of efficiency and adaptability. E-mail system not only suffers from various well known message integrity problems like spamming, phishing, sender spoofing, etc., but it also experiences a lesser know problem of date spoofing. This paper briefly appraises date spoofing and threats it can cause to e-mail and other e-systems. It also illustrates processes to send and receive date spoofed e-mail messages. Further, it lists solutions to the problem of date spoofing and proposes a model including necessary algorithms to detect and stop transmission and reception of date spoofed e-mail messages.

References
  1. Banday, M.T., and Qadri, J.A. 2010. A Study of E-mail Security Protocols. eBritian, ISSN: 1755-9200, British Institute of Technology and E-commerce, UK, Issue 5, Summer 2010, pp. 55-60. Available online at: http://www.bite.ac.uk/ebritain/ebritain_summer_10.pdf.
  2. Klensin. 2001. Simple Mail Transfer Protocol. IETF RFC 2821, Apr 2001.
  3. Resnick, P. Ed. 2001. Internet Message Format. IETF RFC 2822, Apr 2001.
  4. Banday MT, et al. 2010. Analyzing Internet e-mail date-spoofing, Digital Investigation, doi:10.1016/j.diin.2010.11.001.
  5. Banday, M. T. 2011. Design and Development of Efficient Techniques for Securing E-mail System from threats, PhD Thesis, University of Kashmir, India.
  6. Tzerefos, Smythe, Stergiou and Cvetkovic. 1997. A comparative study of Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP) and X.400 Electronic Mail Protocols. In Proceedings of the 22nd Annual IEEE Conference on Local Computer Networks, pp. 545–554.
  7. Resnick, P. Ed. 2008. Internet Message Format. IETF RFC 5332, Oct 2008.
  8. Vaudreuil, G. 2003. Enhanced Mail System Status Codes. IETF RFC 3463, Jan 2003.
Index Terms

Computer Science
Information Sciences

Keywords

E-mail Date Spoofing Security Protocols E-mail Security SMTP Mail Transfer Process