Analysis of security extension protocol in e-mail system
E-mail is the main entry point for hackers to launch network attacks.Impersonating a trusted entity is an important means of e-mail forged.An attribute graph based on the e-mail authentication mechanism was built to measure the global adoption rate of e-mail security extension protocols for governme...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2020-12-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020083 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529924217733120 |
---|---|
author | Jingjing SHANG Yujia ZHU Qingyun LIU |
author_facet | Jingjing SHANG Yujia ZHU Qingyun LIU |
author_sort | Jingjing SHANG |
collection | DOAJ |
description | E-mail is the main entry point for hackers to launch network attacks.Impersonating a trusted entity is an important means of e-mail forged.An attribute graph based on the e-mail authentication mechanism was built to measure the global adoption rate of e-mail security extension protocols for government agencies.Research on the deployment effect of security extension protocol was from three dimensions:e-mail content phishing,domain phishing,and letterhead phishing.The results show that about 70% of the SPF protocols are deployed in the mail systems of government agencies in various countries,and less than 30% of the DMARC protocol is deployed.The adoption rate of email identity detection is low.When forged e-mail gets in,the e-mail providers' warning mechanism for counterfeit emails need to be improved. |
format | Article |
id | doaj-art-e65f13117e024c758c450d533c029995 |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2020-12-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-e65f13117e024c758c450d533c0299952025-01-15T03:14:31ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2020-12-016697959561843Analysis of security extension protocol in e-mail systemJingjing SHANGYujia ZHUQingyun LIUE-mail is the main entry point for hackers to launch network attacks.Impersonating a trusted entity is an important means of e-mail forged.An attribute graph based on the e-mail authentication mechanism was built to measure the global adoption rate of e-mail security extension protocols for government agencies.Research on the deployment effect of security extension protocol was from three dimensions:e-mail content phishing,domain phishing,and letterhead phishing.The results show that about 70% of the SPF protocols are deployed in the mail systems of government agencies in various countries,and less than 30% of the DMARC protocol is deployed.The adoption rate of email identity detection is low.When forged e-mail gets in,the e-mail providers' warning mechanism for counterfeit emails need to be improved.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020083e-mailsecurity extension protocolDKIMSPFDMARC |
spellingShingle | Jingjing SHANG Yujia ZHU Qingyun LIU Analysis of security extension protocol in e-mail system 网络与信息安全学报 security extension protocol DKIM SPF DMARC |
title | Analysis of security extension protocol in e-mail system |
title_full | Analysis of security extension protocol in e-mail system |
title_fullStr | Analysis of security extension protocol in e-mail system |
title_full_unstemmed | Analysis of security extension protocol in e-mail system |
title_short | Analysis of security extension protocol in e-mail system |
title_sort | analysis of security extension protocol in e mail system |
topic | e-mail security extension protocol DKIM SPF DMARC |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020083 |
work_keys_str_mv | AT jingjingshang analysisofsecurityextensionprotocolinemailsystem AT yujiazhu analysisofsecurityextensionprotocolinemailsystem AT qingyunliu analysisofsecurityextensionprotocolinemailsystem |