skip to main content
10.1145/3373477.3373503acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaissConference Proceedingsconference-collections
research-article

E-mail spoofing based on the datalink layers and its application to e-mail aggregation systems: is it possible to make good use of e-mail spoofing?

Published: 15 January 2020 Publication History

Abstract

It is well known that DHCP snooping is a famous countermeasure against DHCP spoofing. Actually, to what extent DHCP snooping can protect the DHCP clients from being injected malicious DHCP transactions running over the network segment? In this paper, we discuss the problem asking if there exists what is to SMTP spoofing as DHCP snooping is to DHCP spoofing, and the problem asking if it is possible for SMTP spoofing to be applied to a socially useful system.

References

[1]
S. Akashi and Y. Tong, Classification of DHCP Spoofing and Effectiveness of DHCP Snooping, Proceedings on 2018 International Conference on Advances in Computer Technology, Information Science and Communication (Edited by Wen-Bing Horng and Yong Yue), ISBN:978-989-758-357-5, 2019, pp.233--238.
[2]
D. Crocker, T. Hansen and M. Kucherawy, Domain Keys Identified Mail (DKIM) Signatures, RFC 6376, 2011, https://tools.ierf.org/html/rfc6376.
[3]
M. Delany, Domain-Based Email Authentication Using Public Keys Advertised in the DNS (DomainKeys), RFC4870, 2007, https://tools.ietf.org/html/rfc4870.
[4]
G. Ferrari, G. Colavolpe and R. Raheli, Detection Algorithms for Wireless Communications, John Wiley and Sons Ltd., West Sussex, 1st edition, 2004.
[5]
J. G. Gersting, Mathematical Structures for Computer Science, W. H. Freeman and Company, New York, 1st edition, 1982.
[6]
C. Hopps, Analysis of an Equal-Cost Multi-Path Algorithm, RFC 2992, 2000, https://tools.ietf.org/html/rfc2992.
[7]
Kaspersky Home Security Resource Center, What is spoofing, https://www.kaspersky.com/resource-center/definitions/ip-and-email-spoofing.
[8]
M. Kucherawy and E. Zwicky, Domain-based Message Authentication, Reporting, and Conformance, RFC 7489, 2015, https://tools.ietf.org/html/rfc7489.
[9]
O. Santos and J. Muniz, CCNA Cyber Ops Secfnd 210-250, Cisco Press, Indianapolis, 1st edition, 2017.
[10]
O. Santos and J. Muniz, CCNA Cyber Ops Secops 210-255, Cisco Press, Indianapolis, 1st edition, 2017.

Cited By

View all

Index Terms

  1. E-mail spoofing based on the datalink layers and its application to e-mail aggregation systems: is it possible to make good use of e-mail spoofing?

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        AISS '19: Proceedings of the 1st International Conference on Advanced Information Science and System
        November 2019
        253 pages
        ISBN:9781450372916
        DOI:10.1145/3373477
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 15 January 2020

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. SMTP snooping
        2. SMTP spoofing
        3. disguised packet transmission
        4. e-mail spoofing
        5. longest prefix matching rule

        Qualifiers

        • Research-article

        Conference

        AISS 2019

        Acceptance Rates

        AISS '19 Paper Acceptance Rate 41 of 95 submissions, 43%;
        Overall Acceptance Rate 41 of 95 submissions, 43%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 86
          Total Downloads
        • Downloads (Last 12 months)7
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 15 Feb 2025

        Other Metrics

        Citations

        Cited By

        View all

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media