2007
DOI: 10.1007/978-3-540-74784-0_34
|View full text |Cite
|
Sign up to set email alerts
|

SIPS: A Stateful and Flow-Based Intrusion Prevention System for Email Applications

Abstract: Abstract. In the fast-growing internet applications, email becomes more and more important in communication. SMTP attacks and spam have become one of the most serious problems. Particularly, the SMTP attacks and spam varies on email, for example spoofing address, illegal characters, sending in bulk, too many SMTP commands and so on. A single security technique is not enough to protect the system from these attacks and spam. In this paper, we propose a SMTP Intrusion Prevention System (SIPS) which bases on the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2009
2009
2010
2010

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Within the network spam can be detected by analyzing flows [12]. In Schatzmann et al [7], for example, the authors found that SMTP connections may either fail (because the TCP connection is not successful), be rejected by the mail server (because the sender is blacklisted, greylisted, or the recipient is unknown), or accepted.…”
Section: Related Workmentioning
confidence: 98%
“…Within the network spam can be detected by analyzing flows [12]. In Schatzmann et al [7], for example, the authors found that SMTP connections may either fail (because the TCP connection is not successful), be rejected by the mail server (because the sender is blacklisted, greylisted, or the recipient is unknown), or accepted.…”
Section: Related Workmentioning
confidence: 98%
“…Based on our previous works [4], we modified a PAD profile to implement hardware-based parallel protocol anomaly detection for high speed network application. In order to check size, length, syntax and sequence of SMTP command and parameter in each packet, each SMTP command is modeled as a node of state.…”
Section: A Design Of Smtp Protocol Anomaly Detectionmentioning
confidence: 99%
“…6 shows the architecture of Parallel SMTP IPS. In the system design, we placed two registers which contains the Email Flow Record module [4] to monitor and classify email traffic. It will defense DoS attacks without degrading network throughput.…”
Section: B Design Of Virus Detectionmentioning
confidence: 99%
“…They therefore propose a spam detection approach based on automatic clustering and classification of sender IP addresses that show a similar behavior over a short observation time. More attention to flow approaches has been given in the works of Schatzmann et al [7,8] and Cheng et al [10]. In [7,8], the authors suggest that the average number of bytes, packets and bytes/packets of failed, rejected and accepted connections are flow properties suitable for the classification of spam flows.…”
Section: Introductionmentioning
confidence: 99%
“…The authors rely on server logs for flow classification. On the other hand, in [10], the authors propose an alternative definition of flows that allows the stateful analysis of spam traffic. Finally,Zádník et al [11] propose the use of classification trees for spam identification based on flow characteristic.…”
Section: Introductionmentioning
confidence: 99%