Title of article :
Email Spoofing
Author/Authors :
Kunal Pandove، نويسنده , , Amandeep Jindal، نويسنده , , Rajinder Kumar، نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2010
Abstract :
Email spoofing is referred to as malicious activity in which the origin details have been altered so as to make it to appear to origin from a different source. Sending fake emails is usually used to convince the receiver so that he stays unaware of the real sender. Email spoofing may be effectively used to launch phishing attacks on the receivers. The attacker may also use the attack with some amplification and in addition use mass mailer to spam mail users. Infections may be propagated by the means of spoofed emails to attack victims. There are a variety of attackers who do email spoofing. The list starts from people trying to just have fun by sending spoofed messages to users. Other serious attacks are done by wrong doers to make damages to the systems. Causes of email spoofing include compromised account information from where emails are sent. Sometimes user browsers are infected so as to use them to send spoofed emails. Email service providers versatility may be attacked by misusing the SMTP protocol. Proper management and deterrence steps that are always recommended should be used to avoid falling into spoofing attacks. Mostly administrators need to follow guidelines to prevent email spoofing in their domains. Once email spoofing is been detected or reported, it should be properly handled. There are a certain set of instructions to react to attacks and also to provide deterrence against spoofing attacks. Implementation of security relies on usage of physical medium like smart cards. The end users may also implement verification for the originators of email to prevent them from falling into the attacks of spoofed emails. Digital signatures and certificates are also recommended to ensure that the emails are genuine. The recommended implementation of security does not come without limitations. These mostly include cost factors, providing training to users and implementation at both the client as well as the server ends.
Keywords :
PGP , Email spoofing , SSL/TLS , Phishing
Journal title :
International Journal of Computer Applications
Journal title :
International Journal of Computer Applications