Analysis of security extension protocol in e-mail system

E-mail is the main entry point for hackers to launch network attacks.Impersonating a trusted entity is an important means of e-mail forged.An attribute graph based on the e-mail authentication mechanism was built to measure the global adoption rate of e-mail security extension protocols for governme...

Full description

Saved in:
Bibliographic Details
Main Authors: Jingjing SHANG, Yujia ZHU, Qingyun LIU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2020-12-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020083
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529924217733120
author Jingjing SHANG
Yujia ZHU
Qingyun LIU
author_facet Jingjing SHANG
Yujia ZHU
Qingyun LIU
author_sort Jingjing SHANG
collection DOAJ
description E-mail is the main entry point for hackers to launch network attacks.Impersonating a trusted entity is an important means of e-mail forged.An attribute graph based on the e-mail authentication mechanism was built to measure the global adoption rate of e-mail security extension protocols for government agencies.Research on the deployment effect of security extension protocol was from three dimensions:e-mail content phishing,domain phishing,and letterhead phishing.The results show that about 70% of the SPF protocols are deployed in the mail systems of government agencies in various countries,and less than 30% of the DMARC protocol is deployed.The adoption rate of email identity detection is low.When forged e-mail gets in,the e-mail providers' warning mechanism for counterfeit emails need to be improved.
format Article
id doaj-art-e65f13117e024c758c450d533c029995
institution Kabale University
issn 2096-109X
language English
publishDate 2020-12-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-e65f13117e024c758c450d533c0299952025-01-15T03:14:31ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2020-12-016697959561843Analysis of security extension protocol in e-mail systemJingjing SHANGYujia ZHUQingyun LIUE-mail is the main entry point for hackers to launch network attacks.Impersonating a trusted entity is an important means of e-mail forged.An attribute graph based on the e-mail authentication mechanism was built to measure the global adoption rate of e-mail security extension protocols for government agencies.Research on the deployment effect of security extension protocol was from three dimensions:e-mail content phishing,domain phishing,and letterhead phishing.The results show that about 70% of the SPF protocols are deployed in the mail systems of government agencies in various countries,and less than 30% of the DMARC protocol is deployed.The adoption rate of email identity detection is low.When forged e-mail gets in,the e-mail providers' warning mechanism for counterfeit emails need to be improved.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020083e-mailsecurity extension protocolDKIMSPFDMARC
spellingShingle Jingjing SHANG
Yujia ZHU
Qingyun LIU
Analysis of security extension protocol in e-mail system
网络与信息安全学报
e-mail
security extension protocol
DKIM
SPF
DMARC
title Analysis of security extension protocol in e-mail system
title_full Analysis of security extension protocol in e-mail system
title_fullStr Analysis of security extension protocol in e-mail system
title_full_unstemmed Analysis of security extension protocol in e-mail system
title_short Analysis of security extension protocol in e-mail system
title_sort analysis of security extension protocol in e mail system
topic e-mail
security extension protocol
DKIM
SPF
DMARC
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020083
work_keys_str_mv AT jingjingshang analysisofsecurityextensionprotocolinemailsystem
AT yujiazhu analysisofsecurityextensionprotocolinemailsystem
AT qingyunliu analysisofsecurityextensionprotocolinemailsystem