2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06)
DOI: 10.1109/wowmom.2006.109
|View full text |Cite
|
Sign up to set email alerts
|

Towards Blocking Outgoing Malicious Impostor Emails

Abstract: Electronic mails (emails) have become an indispensable part of most people's daily routines. However, they were not designed for deployment in an adversarial environment, which explains why there have been so many incidents such as spamming and phishing. Malicious impostor emails sent by sophisticated attackers are perhaps even more damaging, because their contents, except the attachments, may look perfectly legitimate while silently targeting certain critical information such as cryptographic keys and passwor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 4 publications
0
7
0
Order By: Relevance
“…The United Kingdom, particularly in 2011, has also been very vocal on the large volume of cyber-attacks that occur daily, which are aimed at government services and global corporations, with the Secretary of State for Foreign Affairs, William Hague, highlighting the volume and variety of cyber-threats being encountered. Whilst many of the attempted attacks remain small, for example, malicious emails [32], [33] containing Trojan horses [34], the sheer volume of the attacks occurring, regularly poses a cause for concern.…”
Section: Growing Cyber-threatmentioning
confidence: 99%
See 1 more Smart Citation
“…The United Kingdom, particularly in 2011, has also been very vocal on the large volume of cyber-attacks that occur daily, which are aimed at government services and global corporations, with the Secretary of State for Foreign Affairs, William Hague, highlighting the volume and variety of cyber-threats being encountered. Whilst many of the attempted attacks remain small, for example, malicious emails [32], [33] containing Trojan horses [34], the sheer volume of the attacks occurring, regularly poses a cause for concern.…”
Section: Growing Cyber-threatmentioning
confidence: 99%
“…As emailing has become indispensable to the operation of businesses, a threat of malicious emails has also grown exponentially [32], [33]. This threat is particularly difficult to counter as their contents may seem genuine making them challenging to identify.…”
Section: Growing Cyber-threatmentioning
confidence: 99%
“…Kartaltepe, E.J., and Xu, S. [9], propose a blocking mechanism for spam e-mail call ContAining Malicious E-mails Locally (CAMEL). The CAMEL mechanism is enforced at legitimate outgoing e-mail servers.…”
Section: Related Workmentioning
confidence: 99%
“…Similar to [9], Yeh, C.F. et al [10] had considered the profiles of users or users' interesting topics.…”
Section: Related Workmentioning
confidence: 99%
“…It also requires the email servers have the established trust (i.e., sharing a common secret), which requires the unrealistic, widespread common key exchange and deployment. Mechanism, CAMEL (ContAining Malicious Emails Locally), dealing with the malicious imposter email including the case that the claimed email senders could have been compromised by the adversary, was explored in [6] in 2006. The mechanism was designed to block outgoing malicious imposter emails to avoid the malicious imposter email attacks.…”
Section: Introductionmentioning
confidence: 99%