Improvement of Legitimate Mail Server Detection Method using Sender Authentication

被引:0
|
作者
Sakuraba, Shuji [1 ]
Yoda, Minami [2 ]
Sei, Yuichi [2 ]
Tahara, Yasuyuki [2 ]
Ohsuga, Akihiko [2 ]
机构
[1] Univ Electrocommun, Sch Informat Syst, Tokyo, Japan
[2] Univ Electrocommun, Grad Sch Informat & Engn, Tokyo, Japan
来源
2021 IEEE/ACIS 19TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA) | 2021年
关键词
email; anti-spam; sender authentication; SPF; DKIM; sender reputation;
D O I
10.1109/SERA51205.2021.9509275
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Anti-spam measures include methods for determining unsolicited email from the email content and methods for using sender information. If it can be determined from the sender's IP address of sender information and the sender's domain name whether the email should be received, it is possible to reduce the processing of the spam filter by the email content that has a high processing load for the determination. This study uses sender authentication technology to identify the sender of forwarded email. We consider that the sender of this forwarded email is the legitimate email sender to receive, and propose to use these as an allow list. In this paper, we propose a method to further improve the method we proposed and reduce misjudgment of the allow list. We verified that this new method is effective by using the log information of the emails actually received.
引用
收藏
页码:10 / 14
页数:5
相关论文
共 50 条
  • [1] Improvement of EAP Authentication Method Based on Radius Server
    Ma, Yi
    Ning, Hongyun
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2018, : 1324 - 1328
  • [2] Fast and effective spam sender detection with granular SVM on highly imbalanced mail server behavior data
    Tang, Yuchun
    Krasser, Sven
    Judge, Paul
    2006 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2006, : 18 - +
  • [3] Implementation of Image Based Authentication to Ensure the Security of Mail Server
    Rahim, Abdul M.
    Anandhavalli, D.
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 555 - 558
  • [4] Spam Mail Detection and Prevention at Server Side
    Shyry, S. Prayla
    Charan, Venkat Sai K.
    Kumar, V. Sudheer
    2019 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2019,
  • [5] Blocking spam by separating end-user machines from legitimate mail server machines
    Sanchez, Fernando
    Duan, Zhenhai
    Dong, Yingfei
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (04) : 316 - 326
  • [7] Using a biological fingerprint for server authentication
    DeFrangesco, Ralph M.
    APPLICATIONS OF COMPUTER AND INFORMATION SCIENCES TO NATURE RESEARCH 2010 (ACISNR 2010), 2010, : 12 - 14
  • [8] The Creation Process of an Individual Grade Sender via E-Mail for Students Running on the Server of Sun Trackers
    Szabo, Roland
    2018 26TH TELECOMMUNICATIONS FORUM (TELFOR), 2018, : 611 - 614
  • [9] Client authentication model using duplicated authentication server systems
    Lee, JW
    ARTIFICIAL INTELLIGENCE AND SIMULATION, 2004, 3397 : 655 - 662
  • [10] User authentication mechanism using authentication server in home network
    Lee, Y
    Ju, H
    Park, J
    Han, J
    8th International Conference on Advanced Communication Technology, Vols 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U503 - U506