DocumentCode :
121902
Title :
Analysis & compromising the loopholes of existing mail servers by providing an intelligent security measures
Author :
Rahim, M. Abdul ; Anandhavalli, D.
Author_Institution :
Dept. of Inf. Technol., Velammal Coll. of Eng. & Technol., Madurai, India
fYear :
2014
fDate :
7-8 Feb. 2014
Firstpage :
848
Lastpage :
852
Abstract :
The evolution of the Internet has introduced many features such as Assortment of Information, Communication, Transaction, Shopping, Social Networks, Chats, Advertisements, Online Education, Encyclopedia etc., Although Internet helps to make our life simple and rich, there is a dangerous threat to Internet security (i.e.) Hacking [2]. Especially, Electronic communication is an emerging technique where we send information from sender to receiver in the form of E- Mail. The basic requirement for each user is to have a separate ID known as Mail Identity. That ID is used for all purposes specified above. Each user can have more than one ID for different mail services including social networking. But most of the Mail ID´s are not really safe and are easily accessible by anyone. Nowadays, most of the mail servers providing Email communication for their valuable users. Among the mail servers, some of them only have well secured communications. We analyzed some well secured mail servers regarding their security based on some unchancy hacking techniques. From our analysis, we found some of the loopholes are in existing mail servers, which are allowing the hackers, to hack the victim´s account. In this paper, we described some dangerous techniques that are considered as loopholes in the existing mail servers. Beyond the loopholes, we analyzed some vulnerabilities from existing mail servers. To compromise the loopholes and vulnerabilities, we planned to create a new mail server as a solution to block the given problems.
Keywords :
electronic mail; file servers; security of data; Internet security; electronic communication; intelligent security measures; loopholes; mail servers; unchancy hacking techniques; well secured mail servers; Algorithm design and analysis; Analytical models; Computational modeling; Computer hacking; Industries; Level of Execution; Mail Identity; Message Digest-5 Algorithm; Pretty Good Privacy; Threat Level;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on
Conference_Location :
Ghaziabad
Type :
conf
DOI :
10.1109/ICICICT.2014.6781391
Filename :
6781391
Link To Document :
بازگشت