Analysis of security extension protocol in e-mail system
E-mail is the main entry point for hackers to launch network attacks.Impersonating a trusted entity is an important means of e-mail forged.An attribute graph based on the e-mail authentication mechanism was built to measure the global adoption rate of e-mail security extension protocols for governme...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
POSTS&TELECOM PRESS Co., LTD
2020-12-01
|
| Series: | 网络与信息安全学报 |
| Subjects: | |
| Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020083 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850091852789710848 |
|---|---|
| author | Jingjing SHANG Yujia ZHU Qingyun LIU |
| author_facet | Jingjing SHANG Yujia ZHU Qingyun LIU |
| author_sort | Jingjing SHANG |
| collection | DOAJ |
| description | E-mail is the main entry point for hackers to launch network attacks.Impersonating a trusted entity is an important means of e-mail forged.An attribute graph based on the e-mail authentication mechanism was built to measure the global adoption rate of e-mail security extension protocols for government agencies.Research on the deployment effect of security extension protocol was from three dimensions:e-mail content phishing,domain phishing,and letterhead phishing.The results show that about 70% of the SPF protocols are deployed in the mail systems of government agencies in various countries,and less than 30% of the DMARC protocol is deployed.The adoption rate of email identity detection is low.When forged e-mail gets in,the e-mail providers' warning mechanism for counterfeit emails need to be improved. |
| format | Article |
| id | doaj-art-e65f13117e024c758c450d533c029995 |
| institution | DOAJ |
| issn | 2096-109X |
| language | English |
| publishDate | 2020-12-01 |
| publisher | POSTS&TELECOM PRESS Co., LTD |
| record_format | Article |
| series | 网络与信息安全学报 |
| spelling | doaj-art-e65f13117e024c758c450d533c0299952025-08-20T02:42:15ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2020-12-016697959561843Analysis of security extension protocol in e-mail systemJingjing SHANGYujia ZHUQingyun LIUE-mail is the main entry point for hackers to launch network attacks.Impersonating a trusted entity is an important means of e-mail forged.An attribute graph based on the e-mail authentication mechanism was built to measure the global adoption rate of e-mail security extension protocols for government agencies.Research on the deployment effect of security extension protocol was from three dimensions:e-mail content phishing,domain phishing,and letterhead phishing.The results show that about 70% of the SPF protocols are deployed in the mail systems of government agencies in various countries,and less than 30% of the DMARC protocol is deployed.The adoption rate of email identity detection is low.When forged e-mail gets in,the e-mail providers' warning mechanism for counterfeit emails need to be improved.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020083e-mailsecurity extension protocolDKIMSPFDMARC |
| spellingShingle | Jingjing SHANG Yujia ZHU Qingyun LIU Analysis of security extension protocol in e-mail system 网络与信息安全学报 security extension protocol DKIM SPF DMARC |
| title | Analysis of security extension protocol in e-mail system |
| title_full | Analysis of security extension protocol in e-mail system |
| title_fullStr | Analysis of security extension protocol in e-mail system |
| title_full_unstemmed | Analysis of security extension protocol in e-mail system |
| title_short | Analysis of security extension protocol in e-mail system |
| title_sort | analysis of security extension protocol in e mail system |
| topic | e-mail security extension protocol DKIM SPF DMARC |
| url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020083 |
| work_keys_str_mv | AT jingjingshang analysisofsecurityextensionprotocolinemailsystem AT yujiazhu analysisofsecurityextensionprotocolinemailsystem AT qingyunliu analysisofsecurityextensionprotocolinemailsystem |