2011
DOI: 10.1016/j.diin.2010.11.001
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing Internet e-mail date-spoofing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0
5

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(19 citation statements)
references
References 30 publications
0
14
0
5
Order By: Relevance
“…Banday et al in [4] have shown how header analysis can be carried out on a suspected e-mail message to detect possible date spoofing in it, however, they have neither proposed any model nor have given its implementation details. They have also mentioned some techniques that may be used to stop e-mail date spoofing.…”
Section: Solutions To Date Spoofingmentioning
confidence: 99%
See 2 more Smart Citations
“…Banday et al in [4] have shown how header analysis can be carried out on a suspected e-mail message to detect possible date spoofing in it, however, they have neither proposed any model nor have given its implementation details. They have also mentioned some techniques that may be used to stop e-mail date spoofing.…”
Section: Solutions To Date Spoofingmentioning
confidence: 99%
“…Accordingly, a date spoofed e-mail may be either a predated or a post-dated message. Date spoofing has been reported by Banday et al in [4], who have conducted a detailed study of handling of such e-mail messages by some commercial and corporate e-mail servers. It has been reported that: a) almost all studied e-mail servers accept e-mail messages spoofed in date, however, some reject post-dated e-mail messages spoofed in date by more than two days, b) on webmail systems which use send date as a sort field, post-dated e-mail messages remain on top in the inbox of the recipients, c) send date sorting and short date formats in some webmail systems make even learnt recipients difficult to suspect a mail being spoofed in date, and d) date-spoofed e-mails are not trapped by spam filters.…”
Section: Date Spoofingmentioning
confidence: 99%
See 1 more Smart Citation
“…These protocols either use cryptographic techniques or encryption or some domain validation standards. A detailed survey of e-mail servers in dealing with problem of date spoofing and apprizing e-mail user behaviour with regard to date spoofing has been carried out in [4]. However, this study has not carried out study pertaining to sender spoofing and treatment of such e-mail messages by e-mail servers.…”
Section: Introductionmentioning
confidence: 99%
“…A detailed record of e-mal security protocols and procedures along with the functioning of some prominent security protocols is given in (Banday 2010b). Very limited numbers of e-mail users use these protocols to secure their e-mails due to either their limited technical skill or unawareness about their existence (Banday 2010a)]. Further, their use has not been made mandatory and as such unwillingness of some ESP's does also limit their use.…”
Section: Need For E-mail Forensic Investigationmentioning
confidence: 99%