[go: up one dir, main page]

Whyte et al., 2005 - Google Patents

Addressing malicious smtp-based mass-mailing activity within an enterprise network

Whyte et al., 2005

View PDF
Document ID
8527300372806816544
Author
Whyte D
Van Oorschot P
Kranakis E
Publication year
Publication venue
Carleton University, School of Computer Science, Technical Report TR-05-06

External Links

Snippet

Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes massmailing worms, spam, and phishing. A mechanism commonly used to deliver such malicious mass mail is an SMTP-engine, which turns an infected system into a …
Continue reading at people.scs.carleton.ca (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/12Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/585Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload

Similar Documents

Publication Publication Date Title
US7984493B2 (en) DNS based enforcement for confinement and detection of network malicious activities
Whyte et al. DNS-based Detection of Scanning Worms in an Enterprise Network.
Srivastava et al. A recent survey on DDoS attacks and defense mechanisms
EP2147390B1 (en) Detection of adversaries through collection and correlation of assessments
US9674217B2 (en) Method and system for mitigation of distributed denial of service (DDOS) attacks
US20080256622A1 (en) Reduction of false positive reputations through collection of overrides from customer deployments
US20120278889A1 (en) Detecting malicious behaviour on a network
Schneider The state of network security
Hudaib et al. DNS advanced attacks and analysis
Hands et al. A study on botnets utilizing DNS
Trabelsi et al. Preventing ARP attacks using a fuzzy-based stateful ARP cache
Whyte et al. Addressing malicious smtp-based mass-mailing activity within an enterprise network
Jin et al. Trigger-based blocking mechanism for access to email-derived phishing URLs with user alert
Arafat et al. A realistic approach and mitigation techniques for amplifying ddos attack on dns
Xie et al. Thwarting e-mail spam laundering
Kessler Denial‐of‐Service Attacks
Whyte et al. Addressing SMTP-based mass-mailing activity within enterprise networks
Hashmi et al. Intrusion Prevention System based Defence Techniques to manage DDoS Attacks
Kamal et al. Analysis of network communication attacks
Arslan A solution for ARP spoofing: Layer-2 MAC and protocol filtering and arpserver
Al-Bataineh et al. Detection and prevention methods of botnet-generated spam
Huang et al. On capturing and containing e-mail worms
Zhang et al. Internet-scale malware mitigation: combining intelligence of the control and data plane
Tupakula et al. DoSTRACK: a system for defending against DoS attacks
Berger-Sabbatel et al. Architecture of a platform for malware analysis and confinement