Skip to main content
Log in

An intelligent method to block e-mail bombs

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

It is hard to block e-mail bombs because they are usually sent by normal SMTP (Simple Mail Transfer Protocol) applications with fake mail sender addresses and IP addresses. Fortunately, original network packets contain real IP address information anyway. Collecting and analyzing these packet contents can help an administrator to realize where the e-mail bombs are coming from and block them. This article presents a simple method that uses a bandwidth manager device to collect and analyze packets to get e-mail bombs information as well as to block e-mail bomb source IP addresses in routers. In practical application experiences at the computer center in a university, this method blocked e-mail bombs simply and effectively. Furthermore, a fuzzy inference system was also designed to help identify e-mail bombs. Its fuzzy membership functions could be adapted using the fuzzy neural network learning method. In brief, the proposed method affords an automatic and adaptable alarm to find e-mail bombs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Barber R (2001) Hackers profiled – who are they and what are their motivations. Comput Fraud Security (2):14–17

  2. Bass T, Watt G (1997) A simple framework for filtering queued smtp mail (cyberwar countermeasures). IEEE MILCOM 97 Proc 3:1140–1144

    Article  Google Scholar 

  3. Bass T, Freyre A, Gruber D, Watt G (1998) E-mail bombs and countermeasures: cyber attacks on availability and brand integrity. IEEE Network 12(2):10–17

    Article  Google Scholar 

  4. Chang FM (2005) An intelligent method for knowledge derived from limited data. In: Proceedings – 2005 IEEE international conference on systems, man, and cybernetics. pp 566–571

  5. Computer fraud & security (1996) E-mail bomb suspect arrested. Comput Fraud Security (2):3

  6. Icove D, Seger K, VonStorch W (1998) Computer Crime. O'Reilly

  7. Jang, JSR (1993) ANFIS: adaptive-network-based fuzzy inference systems. IEEE Trans Syst Man Cybem 23(3):665–685

    Article  MathSciNet  Google Scholar 

  8. Jang JSR (1997) Fuzzy inference systems. Neuro-Fuzzy and Soft Computing, Prentice Hall, pp 75–77

  9. Jared S (1998) AOL users fall prey to hackers' dirty tricks. Comput Security 17(2):153

    Google Scholar 

  10. Jha S, Hassan M (2002) Building agents for rule-based intrusion detection system. Comput Commun 25:1366–1373

    Article  Google Scholar 

  11. Kadoya Y, Fuketa M, Atlam E, Morita K, Kashiji S, Aoe J (2004) An efficient e-mail filtering using time priority measurement. Inf Sci 166(1–4):213–229

    Article  Google Scholar 

  12. Kuo YH, Hsu JP, Wang CW (1998) A parallel fuzzy inference model with distributed prediction scheme for reinforcement learning. IEEE Syst Man Cybern 28(2):160–172

    Article  Google Scholar 

  13. Lee CS, Guo SM, Hsu CY (2005) Genetic-based fuzzy image filter and its application to image processing. IEEE Trans Syst Man Cybern Part B 35(4):694–711

    Article  Google Scholar 

  14. Lee CS, Jiang CC, Hsieh TC (2005) A genetic fuzzy agent using ontology model for meeting scheduling system. Inf Sci 176:1131–1155

    Article  Google Scholar 

  15. Lee CS, Pan CY (2004) An intelligent fuzzy agent for meeting scheduling decision support system. Fuzzy Set Syst 142(3):467–488

    Article  MATH  MathSciNet  Google Scholar 

  16. Leinwand A, Conroy KF (1994) Network management: a practical perspective. Addison-Weslay Longman

  17. Li DC, Wu CS, Chang FM (2006) Using data continualization and expansion to improve small data set learning accuracy for early FMS scheduling. Int J Prod Res 44(21):4491–4509

    MATH  Google Scholar 

  18. Lin CT, Lee CSG (1991) Neural-network-based fuzzy logic control and decision system. IEEE Comput 40(12):1320–1336

    Article  MathSciNet  Google Scholar 

  19. Oad T, White T (2003) Increasing the accuracy of a spam-detecting artificial immune system. 2003 Congr Evol Comput, pp. 390–396

  20. Rogers MK (2006) A two-dimensional circumplex approach to the development of a hacker taxonomy. Digital Invest 3:97–102

    Article  Google Scholar 

  21. Stevens WR (1994) TCP/IP illustrated volume I: the protocols. Addison-Weslay Longman

  22. Sumitomo T, Kadoya Y, Fuketa M, Morita K, Kashiji S, Aoe J (2004) An new e-mail filtering technique using time priority measurement. In: Proceedings-Ninth internation symposium on computers and communications, pp. 122–127

  23. Wang JH, Deng PH, Fan YS, Jaw LJ, Liu, YC (2003) Virus detection using data mining techinques. In: Proceedings-IEEE 37th Annual 2003 internation carnahan conference on security technology, pp. 71–76

  24. Wood P (2006) The hacker's top five routes into the network (and how to block them). Network Security (2):5–9

  25. Yen J, Langari R (1999) Fuzzy logic—intelligence, control, and information. Prentice Hall

  26. Zakariah R, Ehsan S (2006) Detecting junk mails by implementing statistical theory. In: Proceedings 20th internation conference on advanced inforamation networking and applications

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fengming M. Chang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chang, F.M. An intelligent method to block e-mail bombs. Appl Intell 27, 39–47 (2007). https://doi.org/10.1007/s10489-006-0029-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-006-0029-8

Keywords

Navigation