Improvement of Legitimate Mail Server Detection Method using Sender Authentication

被引:0
|
作者
Sakuraba, Shuji [1 ]
Yoda, Minami [2 ]
Sei, Yuichi [2 ]
Tahara, Yasuyuki [2 ]
Ohsuga, Akihiko [2 ]
机构
[1] Univ Electrocommun, Sch Informat Syst, Tokyo, Japan
[2] Univ Electrocommun, Grad Sch Informat & Engn, Tokyo, Japan
来源
2021 IEEE/ACIS 19TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING RESEARCH, MANAGEMENT AND APPLICATIONS (SERA) | 2021年
关键词
email; anti-spam; sender authentication; SPF; DKIM; sender reputation;
D O I
10.1109/SERA51205.2021.9509275
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Anti-spam measures include methods for determining unsolicited email from the email content and methods for using sender information. If it can be determined from the sender's IP address of sender information and the sender's domain name whether the email should be received, it is possible to reduce the processing of the spam filter by the email content that has a high processing load for the determination. This study uses sender authentication technology to identify the sender of forwarded email. We consider that the sender of this forwarded email is the legitimate email sender to receive, and propose to use these as an allow list. In this paper, we propose a method to further improve the method we proposed and reduce misjudgment of the allow list. We verified that this new method is effective by using the log information of the emails actually received.
引用
收藏
页码:10 / 14
页数:5
相关论文
共 50 条
  • [21] Analysis and improvement of a key exchange and authentication protocol in client-server environment
    Yuting Li
    Qingfeng Cheng
    Xinghua Li
    Journal of Ambient Intelligence and Humanized Computing, 2020, 11 : 3787 - 3799
  • [22] Cryptanalysis and Improvement of a Biometrics-based Multi-server Authentication Protocol
    Gu, Yi
    Li, Shengqiang
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2018, : 16 - 20
  • [23] Analysis and improvement of a key exchange and authentication protocol in client-server environment
    Li, Yuting
    Cheng, Qingfeng
    Li, Xinghua
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (09) : 3787 - 3799
  • [24] The improvement of extraction method for noncontact fingerprint authentication
    Torii, Keita
    Okamoto, Noriyoshi
    IEEJ Transactions on Electronics, Information and Systems, 2006, 126 (08) : 972 - 979
  • [25] Sender Based Adaptive VoIP Quality Improvement Using Constructive Feedback
    Faghihi, Ehsan
    Behdadfar, Mohammad
    Sadeghi, Mohammad Ebrahim
    2015 7TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2015,
  • [26] Cryptanalysis and Improvement of an Advanced Anonymous and Biometrics-Based Multi-server Authentication Scheme Using Smart Cards
    Quan, Chunyi
    Lee, Hakjun
    Kang, Dongwoo
    Kim, Jiye
    Cho, Seokhyang
    Won, Dongho
    ADVANCES IN HUMAN FACTORS IN CYBERSECURITY, 2018, 593 : 62 - 71
  • [27] CCLA: an accurate method and web server for cancer cell line authentication using gene expression profiles
    Zhang, Qiong
    Luo, Mei
    Liu, Chun-Jie
    Guo, An-Yuan
    BRIEFINGS IN BIOINFORMATICS, 2021, 22 (03)
  • [28] Cryptanalysis and Improvement of a Robust Smart Card Authentication Scheme for Multi-server Architecture
    Wei, Jianghong
    Liu, Wenfen
    Hu, Xuexian
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (03) : 2255 - 2269
  • [29] Cryptanalysis of Tan's improvement on a password authentication scheme for multi-server environments
    Feng, Tung-Huang
    Ling, Chung-Huei
    Hwang, Min-Shiang
    International Journal of Network Security, 2014, 16 (04) : 318 - 321
  • [30] Authentication of IoT Device and IoT Server Using Secure Vaults
    Shah, Trusit
    Venkatesan, S.
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 819 - 824