Presentation is loading. Please wait.

Presentation is loading. Please wait.

An Application with Active Spoof Monitoring and Control

Similar presentations


Presentation on theme: "An Application with Active Spoof Monitoring and Control"— Presentation transcript:

1 An Email Application with Active Spoof Monitoring and Control
Author: T.P. Fowdur, L.Veerasoo Presenter: Haozhou Yu

2 The E-mail Mail User Agent (MUA), Mail Transfer Agent (MTA)
Simple Mail Transfer Protocol (SMTP) The send and receive procedure, the weekpoint

3 Spoof imitate (something) while exaggerating its characteristic features for comic effect. hoax or trick (someone). interfere with (radio or radar signals) so as to make them useless. Dictionary explaination

4 spoofing spoofing is the forgery of an  header so that the message appears to have originated from someone or somewhere other than the actual source. 

5 SMTP MAIL FROM: - generally presented to the recipient as the Return-path: header but not normally visible to the end user, and by default no checks are done that the sending system is authorized to send on behalf of that address. RCPT TO: - specifies which address the is delivered to, is not normally visible to the end user but may be present in the headers as part of the "Received:" header. Together these are sometimes referred to as the "envelope" addressing, by analogy with a traditional paper envelope,[1] and unless the receiving mail server signals that it has problems with either of these items, the sending system sends the "DATA" command, and typically sends several header items, including: From: Joe Q Doe - the address visible to the recipient; but again, by default no checks are done that the sending system is authorized to send on behalf of that address. Reply-to: Jane Roe - similarly not checked and sometimes: Sender: Jin Jo - also not checked

6 SMTP itself lacks authentication so servers that are poorly configured in this way are prey to abusers. And there is nothing that can stop a determined attacker from setting up his own server.

7 E-mail spoofing https://en.wikipedia.org/wiki/Email_spoofing
Sender and receiver, examples and data Date and time spoofing Anti-spoofing

8 spam spoofing is not spam It is more dangerous than spam

9

10

11 Anti-spoofing The idea of anti-spoofing The tools, ways SSL HTTPS
Authentication message

12 Proposed application How it works

13 Artecture

14 Test

15

16

17

18

19 Conclusion and analysis
Web based client-oriented Advantages and limitations Last part of the paper Have a discuess

20


Download ppt "An Application with Active Spoof Monitoring and Control"

Similar presentations


Ads by Google