1998
DOI: 10.1109/65.681925
|View full text |Cite
|
Sign up to set email alerts
|

E-mail bombs and countermeasures: cyber attacks on availability and brand integrity

Abstract: The simplicity of SMTP mail can be combined with t he robustnessof the sendmail MTA program and misused in numerous ways to create extraordinary and p o werful e-mail bombs. These e-mail bombs can be launched in many different a ttack scenarios which can easily ood and s h ut d o wn chains of SMTP mail servers. Sendmail-based SMTP mail relays also can be used covertly to distribute m essages and les that could be very damaging t o t he i n tegrity a n d brands of victims. This paper discusses mail-bombing t ec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 10 publications
0
12
0
Order By: Relevance
“…In the researches of e-mail bombs detection, Base et al [2,3] pointed out that to capture and minimize delivery of e-mail bombs by a rules-based filter and then block bombs in routers is the right method to use. Bass et al presented an e-mail bombs filter [3] that used a mathematical process of collecting e-mail statistics on the daily volume.…”
Section: E-mail Bombsmentioning
confidence: 99%
See 1 more Smart Citation
“…In the researches of e-mail bombs detection, Base et al [2,3] pointed out that to capture and minimize delivery of e-mail bombs by a rules-based filter and then block bombs in routers is the right method to use. Bass et al presented an e-mail bombs filter [3] that used a mathematical process of collecting e-mail statistics on the daily volume.…”
Section: E-mail Bombsmentioning
confidence: 99%
“…For example, a "bomber" sent over 24,000 messages to a university computer in one day [5] and the other hacker sent approximately 25,000 messages to a military unit within 8 h [2]. Preventing e-mail bombs are difficult [2,3], because there are many email bomb techniques employed by hackers, such as direct email spam, indirect e-mail spam, rejected e-mail spam, chain relay e-mail spam, mailing list spam [2], chain bombs, error message bombs, covert distribution channels, exploiting mail exploders and list servers, and automated attack tools [3].…”
Section: E-mail Bombsmentioning
confidence: 99%
“…Email "bombing" indicates to very mail sending over and over by an offender to a specific user [3,4] and to overcome Email Bombing, filtering Queued Email can be utilized dependent on the developed rule sets [11].…”
Section: Email Bombingmentioning
confidence: 99%
“…Some various attacks on SMTP protocol and characteristics of spam flow [10] are as following: Buffer Overrun, Partial Message Attack, Probing Behaviors, Email Bombs, and HELO commands DoS attacks.…”
Section: Introductionmentioning
confidence: 99%