2012
DOI: 10.1007/978-3-642-35606-3_41
|View full text |Cite
|
Sign up to set email alerts
|

A New Approach for Detecting SMTPFA Based on Entropy Measurement

Abstract: In this paper, we propose a new approach of detecting a kind of Simple Mail Transfer Protocol Flooding Attack (SMTPFA for short) based on entropy measurement. We will calculate the entropy values from the received packets flow. Further checking its entropy value compared with the values of abnormal entropy, we then use it to detect this server whether is suffered some attacks from hacker. The scheme can easily detect SMTPFA, and monitor the real-time status of SMTP server.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…The entropy value is inversely proportional to the probability value. With this feature, the value of results we calculate has dependability [16].…”
Section: Entropy Operationmentioning
confidence: 99%
See 4 more Smart Citations
“…The entropy value is inversely proportional to the probability value. With this feature, the value of results we calculate has dependability [16].…”
Section: Entropy Operationmentioning
confidence: 99%
“…1. In the SMTP architecture [16], it consists of a Sender, a sender-SMTP, a receiver-SMTP and a Receiver. When a Sender (user or file server) will connect to another receiver, it will send a request message of Establishes Connection to the sender-SMTP.…”
Section: Smtpmentioning
confidence: 99%
See 3 more Smart Citations