• Title/Summary/Keyword: email

Search Result 377, Processing Time 0.025 seconds

A Distributed Architecture Based SMTP Server for Large Email Service (대용량 이메일 서비스를 위한 분산 구조 기반의 SMTP 서버)

  • Kim, Young-Jong;Kwak, Hu-Keun;Chung, Kyu-Sik
    • The KIPS Transactions:PartC
    • /
    • v.16C no.5
    • /
    • pp.597-604
    • /
    • 2009
  • An SMTP(Simple Mail Transfer Protocol) server was designed for delivering and storing user's email across a network. An SMTP server can be distributed as multiple servers for large service, huge users or massive emails. An SMTP server can be constructed by multiple servers with separating file system as email storing space, and each SMTP server can usually share each file system by using the NFS(Network File system). However the NFS is originally designed for sharing each file system across a network, and contains all attributes and features of regular file system. Using this NFS for email storing space of SMTP servers, it makes overhead due to unnecessary work of regular file system. In this paper, we propose a method to do directly operation with socket for reducing work overhead caused by the NFS. For doing directly operation with socket, this paper defines information based storing space structure and a protocol for storing emails. We performed experiments using Mailstone made by Netscape. The experimental results show the performance improvement of the proposed method compared to the existing method.

A Research on an Email Method based on Sender Mailbox (송신자사서함 기반의 메일 방식에 관한 연구)

  • Kim, Tae-Joon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.689-696
    • /
    • 2004
  • The conventional email method based on a recipient mailbox has a structural weakness, which may cause the spam message problem and the extreme waste of recipient mailbox space, and also require an explicit recipient notification scheme. This paper proposes a new email method based on a sender mailbox and evaluates its performance. Under the new email method, a message is stored at sender mailbox instead of recipient one until an intended recipient reads the message, so that the burden of mailbox management such as removing spam message is now shifted to sender side. And also a sender can confirm whether an intended recipient has read his or her message by simply rummaging his or her sender mailbox. The results of Performance evaluation show that 75% of mailbox space and 90% of message traffic are reduced in conditions that the portions of spam message and multicasting message are 90% and 80%, respectively.

Study for Tracing Zombie PCS and Botnet Using an Email Spam Trap (이메일 스팸트랩을 이용한 좀비 PC 및 봇넷 추적 방안연구)

  • Jeong, Hyun-Cheol;Kim, Huy-Kang;Lee, Sang-Jin;Oh, Joo-Hyung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.101-115
    • /
    • 2011
  • A botnet is a huge network of hacked zombie PCs. Recognizing the fact that the majority of email spam is sent out by botnets, a system that is capable of detecting botnets and zombie PCS will be designed in this study by analyzing email spam. In this study, spam data collected in "an email spam trail system", Korea's national spam collection system, were used for analysis. In this study, we classified the spam groups by the URLs or attached files, and we measured how much the group has the characteristics of botnet and how much the IPs have the characteristics of zombie PC. Through the simulation result in this study, we could extract 16,030 zombie suspected PCs for one hours and it was verified that email spam can provide considerably useful information in tracing zombie PCs.

Phishing Email Detection Using Machine Learning Techniques

  • Alammar, Meaad;Badawi, Maria Altaib
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.277-283
    • /
    • 2022
  • Email phishing has become very prevalent especially now that most of our dealings have become technical. The victim receives a message that looks as if it was sent from a known party and the attack is carried out through a fake cookie that includes a phishing program or through links connected to fake websites, in both cases the goal is to install malicious software on the user's device or direct him to a fake website. Today it is difficult to deploy robust cybersecurity solutions without relying heavily on machine learning algorithms. This research seeks to detect phishing emails using high-accuracy machine learning techniques. using the WEKA tool with data preprocessing we create a proposed methodology to detect emails phishing. outperformed random forest algorithm on Naïve Bayes algorithms by accuracy of 99.03 %.

An Information Filtering Agent in a Flexible Message System

  • JUN, Youngcook;SHIRATORI, Norio
    • Educational Technology International
    • /
    • v.6 no.1
    • /
    • pp.65-79
    • /
    • 2005
  • In a widely distributed environment, many occasions arise when people need to filter informationwith email clients. The existing information agents such as Maxims and Message Assistant have capabilities of filtering email messages either by an autonomous agent or by user-defined rules. FlexMA, a variation of FAMES (Flexible Asynchronous Messaging System) is proposed as an information filtering agent. Agents in our system can be scaled up to adapt user's various demands by controlling messages delivered among heterogeneous email clients. Several functionalities are split into each agent in terms of component configuration with the addition of multiple agents'cooperation and negotiation. User-defined rules are collected and executed by these agents in a semi-autonomous manner. This paper demonstrates how this design is feasible in a flexible message system.

Email Extraction and Utilization for Author Disambiguation (저자 식별을 위한 전자메일의 추출 및 활용)

  • Kang, In-Su
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.261-268
    • /
    • 2008
  • An author of a paper is represented as his/her personal name in a bibliographic record. However, the use of names to indicate authors may deteriorate recall and precision of paper and/or author search, since the same name can be shared by many different individuals and a person can write his/her name in different forms. To solve this problem, it is required to disambiguate same-name author names into different persons. As features for author resolution, previous studies have exploited bibliographic attributes such as co-authors, titles, publication information, etc. This study attempts to apply email addresses of authors to disambiguate author names. For this, we first handle the extraction of email addresses from full-text papers, and then evaluate and analyze the effect of email addresses on author resolution using a large-scale test set.

Intelligent Spam-mail Filtering Based on Textual Information and Hyperlinks (텍스트정보와 하이퍼링크에 기반한 지능형 스팸 메일 필터링)

  • Kang, Sin-Jae;Kim, Jong-Wan
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.7
    • /
    • pp.895-901
    • /
    • 2004
  • This paper describes a two-phase intelligent method for filtering spam mail based on textual information and hyperlinks. Scince the body of spam mail has little text information, it provides insufficient hints to distinguish spam mails from legitimate mails. To resolve this problem, we follows hyperlinks contained in the email body, fetches contents of a remote webpage, and extracts hints (i.e., features) from original email body and fetched webpages. We divided hints into two kinds of information: definite information (sender`s information and definite spam keyword lists) and less definite textual information (words or phrases, and particular features of email). In filtering spam mails, definite information is used first, and then less definite textual information is applied. In our experiment, the method of fetching web pages achieved an improvement of F-measure by 9.4% over the method of using on original email header and body only.

The Study on Secure Mail Platform and Mutual Authentication Using Mail Proxy (메일 프락시를 통한 사용자 상호인증 방법과 안전한 메일 플랫폼에 대한 연구)

  • Ahn, Hyo-Beom;Lee, Su-Yeon
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.201-208
    • /
    • 2016
  • The purpose of Email system is used to transmit important information between companies in today. But Email system has vulnerabilities such that changing email address of sender by attacker. So it is important to authenticate mail server and user using mail server. This paper proposed mail proxy located between mail servers that evaluate authority and authenticate sender and receiver. The proposed email platform has some functions to compose trusted domain and to authenticate mail servers in the domain. Also, if sender and recipient are valid users in mail system, each exchanges a key for confidentiality and the sender sends an e-mail encrypted with exchanged key to recipient. In this paper, we propose a key exchange scheme in proposed platform and verify this protocol using Casper which is the formal analysis tool. In the future research, we will study the overall platform of the domain configuration for the security of mail.

A Study on Conventional Expression of Hangul Ganchal and Email (조선시대 한글 간찰과 이메일의 상투적 표현 고찰)

  • Jeon, Byeong-yong
    • (The)Study of the Eastern Classic
    • /
    • no.49
    • /
    • pp.431-459
    • /
    • 2012
  • The purpose of this article is to compare and analyze the conventional expression of Hangul Ganchal in Cheosun Dynasty and Email. Conventional expression is used remarkably in introductions and conclusions. In introduction, it is used for addressing and safety greetings while in conclusion, it is used for closing address and closing words. In Cheosun Dynasty, an envelope of Ganchal only included the details of the receiver because the letter was genuinely delivered by someone who knew the receiver and the sender very well. An envelope of Ganchal is applicable to the screen of the internet which is used for emailing. In an email, we see the name of the sender and the title of the text and once we click the title, we are able to view the text. The difference between the Ganchal and the email was reflected on how the receiver's detail showed on Ganchal and the email show the sender's details. In a case of addressing in a letter while using the conventional expression, we can see how we use "To~" in humble term and " ~께" in a honorific term. We confirmed that the conventional expression has not yet settled in both of the Gnachal and email for the seasonal greetings. The safety greetings comprised with both of the senders' and receivers' latest updates. In Ganchal, this composition is well described conventionally, whereas in emails, only the receivers' latest news are written but the senders' latest updates are hard to be seen throughout the text. In Ganchal's closing section, the closing address and closing words were expressed conventionally. However, in the case of email; those were again hard to be found throughout. To conclude, in Ganchal the conventional expression was developed and placed in 16thcentury(Sun-eon) when there was a focus in our native language. In 17thcentury(Hyeon-eon), it stood still for a sometime and moved on to 19thcentury(Jing-eon) when there was a strong in fluence of Hangul Ganchal, which resulted in regression to the conservative expression. In general, we are able to confirm that the conventional expression is slowly disappearing.