E-mail bombs and countermeasures: Cyber attacks on availability and brand integrity

被引:14
作者
Bass, T [1 ]
Freyre, A
Gruber, D
Watt, G
机构
[1] SAIC, Ctr Informat Protect, Hampton, VA 23666 USA
[2] USAF, Langley AFB, VA 23665 USA
来源
IEEE NETWORK | 1998年 / 12卷 / 02期
关键词
D O I
10.1109/65.681925
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The simplicity of SMTP mail can be combined with the robustness of the sendmail MTA program and misused in numerous ways to create extraordinary and powerful e-mail bombs. These e-mail bombs can be launched in many different attack scenarios which can easily flood and shut down chains of SMTP mail servers. Sendmail-based SMTP mail relays also can be used covertly to distribute messages and files that could be very damaging to the integrity and brands of victims. This article discusses mail-bombing techniques, automated attack tools, and countermeasures. Also discussed is an actual Internet-based attack that was launched in 1997 on the Langly AFB SMTP e-mail infrastructure. The authors also present an analysis of the cyber attack, graphs illustrating the attack volume, and a statistical e-mail bomb early warning system.
引用
收藏
页码:10 / 17
页数:8
相关论文
共 21 条
[1]  
[Anonymous], 1997, CNN INTERACTIVE
[2]  
BASS T, 1997, P IEEE MILCOM 9M NOV
[3]  
BERNSTEIN T, 1996, INTERNET SECURITY BU
[4]  
BERST J, 1997, ZDNET 0819
[5]  
COSTALES B, 1997, SENDMAIL
[6]  
Crocker D., 1982, 822 RFC
[7]  
GULCU C, 1996, IEEE P S NETW DISTR
[8]  
HERFERT M, 1997, IEEE NETWORKS MAY
[9]  
KAUFMAN, 1995, NETWORK SECURITY
[10]  
LINN J, 1988, 1049 RFC