DocumentCode
121902
Title
Analysis & compromising the loopholes of existing mail servers by providing an intelligent security measures
Author
Rahim, M. Abdul ; Anandhavalli, D.
Author_Institution
Dept. of Inf. Technol., Velammal Coll. of Eng. & Technol., Madurai, India
fYear
2014
fDate
7-8 Feb. 2014
Firstpage
848
Lastpage
852
Abstract
The evolution of the Internet has introduced many features such as Assortment of Information, Communication, Transaction, Shopping, Social Networks, Chats, Advertisements, Online Education, Encyclopedia etc., Although Internet helps to make our life simple and rich, there is a dangerous threat to Internet security (i.e.) Hacking [2]. Especially, Electronic communication is an emerging technique where we send information from sender to receiver in the form of E- Mail. The basic requirement for each user is to have a separate ID known as Mail Identity. That ID is used for all purposes specified above. Each user can have more than one ID for different mail services including social networking. But most of the Mail ID´s are not really safe and are easily accessible by anyone. Nowadays, most of the mail servers providing Email communication for their valuable users. Among the mail servers, some of them only have well secured communications. We analyzed some well secured mail servers regarding their security based on some unchancy hacking techniques. From our analysis, we found some of the loopholes are in existing mail servers, which are allowing the hackers, to hack the victim´s account. In this paper, we described some dangerous techniques that are considered as loopholes in the existing mail servers. Beyond the loopholes, we analyzed some vulnerabilities from existing mail servers. To compromise the loopholes and vulnerabilities, we planned to create a new mail server as a solution to block the given problems.
Keywords
electronic mail; file servers; security of data; Internet security; electronic communication; intelligent security measures; loopholes; mail servers; unchancy hacking techniques; well secured mail servers; Algorithm design and analysis; Analytical models; Computational modeling; Computer hacking; Industries; Level of Execution; Mail Identity; Message Digest-5 Algorithm; Pretty Good Privacy; Threat Level;
fLanguage
English
Publisher
ieee
Conference_Titel
Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on
Conference_Location
Ghaziabad
Type
conf
DOI
10.1109/ICICICT.2014.6781391
Filename
6781391
Link To Document