An Application with Active Spoof Monitoring and Control

Slides:



Advertisements
Similar presentations
Basic Communication on the Internet:
Advertisements

. How it works? To send an you need an Software or Web Based To send an to a friend you need to know their Address.
© 2007 Convio, Inc. Implementation of Sender ID Bill Pease, Chief Scientist Convio.
Lesson 7: Business, , & Personal Information Management
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 23 Electronic Mail: SMTP,
Simple Mail Transfer Protocol (SMTP) Team: Zealous Team: Zealous Presented By: Vishal Parikh ( ) Vishal Parikh ( ) Ribhu Pathria( )
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
POP Configuration Microsoft Outlook Express 6.x.
SMTP Simple Mail Transfer Protocol. Content I.What is SMTP? II.History of SMTP III.General Features IV.SMTP Commands V.SMTP Replies VI.A typical SMTP.
2440: 141 Web Site Administration Services Instructor: Enoch E. Damson.
Architecture of SMTP, POP, IMAP, MIME.
POP Configuration Microsoft Outlook What is POP? Short for Post Office Protocol, a protocol used to retrieve from a mail server. Most.
Electronic Mail: SMTP, POP, and IMAP
SIMPLE MAIL TRANSFER PROTOCOL SECURITY Guided By Prof : Richard Sinn Bhavesh Jadav Mayur Mulani.
Lecturer : Ms.Trần Thị Ngọc Hoa Chapter 8 File Transfer Protocol – Simple Mail Transfer Protocol.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Outlook 2000 Summertime Technology 2002 Vicki Blackwell Tangipahoa Parish Schools.
Chapter 7: Internet-Based Applications Business Data Communications, 6e.
SMTP PROTOCOL CONFIGURATION AND MANAGEMENT Chapter 8.
© 2010 Computer Science Faculty, Kabul University ELECTRONICE MAIL CONTINUED… 6 TH LECTURE 9, May, 2010 Baseer Ahmad Baheer.
CSIE 1 Filtering mail Speaker: Chung yu Wu Adviser: Quincy Wu Date: 2005/12/07.
TCP/IP Protocol Suite 1 Chapter 20 Upon completion you will be able to: Electronic Mail: SMTP, POP, and IMAP Understand four configurations of architecture.
1 Using Messages sent from machine to machine and stored for later reading. You will use a client to read –Type mail or pine in UNIX to read.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
File Transfer Protocol (FTP)
 Subject: The topic you are talking about. So they understand what it is a about and explain to the point.  clients usually display it in a.
1 SMTP - Simple Mail Transfer Protocol –RFC 821 POP - Post Office Protocol –RFC 1939 Also: –RFC 822 Standard for the Format of ARPA Internet Text.
SIMPLE MAIL TRANSFER PROTOCOL. Introduction Simple Mail Transfer Protocol is the standard protocol on the Internet and part of the TCP/IP protocol.
SIMPLE MAIL TRANSFER PROTOCOL PRADEEP KOLLIPARA SANDEEP PINNAMANENI.
LinxChix And Exim. Mail agents MUA = Mail User Agent Interacts directly with the end user  Pine, MH, Elm, mutt, mail, Eudora, Marcel, Mailstrom,
SMTP Tapu Ahmed Jeremy Nunn. Basics Responsible for electronic mail delivery. Responsible for electronic mail delivery. Simple ASCII protocol that runs.
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
RYAN HICKLING. WHAT IS AN An messages distributed by electronic means from one computer user to one or more recipients via a network.
SMTP - Simple Mail Transfer Protocol RFC 821
CITA 310 Section 6 Providing Services (Textbook Chapter 8)
Slides based on Carey Williamson’s: FTP & SMTP1 File Transfer Protocol (FTP) r FTP client contacts FTP server at port 21, specifying TCP as transport protocol.
1 Kyung Hee University Chapter 22 Simple Mail Transfer Protocol (SMTP)
1 Architecture 2 User Agent 3 Message Transfer Agent 4 Message Access Agent 5 MIME 6 Web-Based Mail 7 Electronic Mail Security.
Discussion of OCP/SMTP profile and some Use cases Presented by Abbie Barbir
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
26.1 Electronic Mail Sending/Receiving Mail Addresses User Agent MIME Mail Transfer Agent Mail Access Protocols.
Analysing s Michael Jones. Overview How works Types of crimes associated with Mitigations Countermeasures Michael Jones2Analsysing s.
Application Layer instructors at St. Clair College in Windsor, Ontario for their slides. Special thanks to instructors at St. Clair College in Windsor,
درس مهندسی اینترنت – مهدی عمادی مهندسی اینترنت برنامه‌نویسی در اینترنت 1 SMTP, FTP.
Mail User Agent Submitted by: Geetha Chittireddy.
Agenda Spoofing Types of Spoofing o IP Spoofing o URL spoofing o Referrer spoofing o Caller ID spoofing o Address Spoofing.
Contents Spelling Origin of Operation Message Format
Application Layer Functionality and Protocols Abdul Hadi Alaidi
Network Programming 10- SMTP-POP3
Dibyajit Computer Security Hacking dibyajit
SMTP - Simple Mail Transfer Protocol POP - Post Office Protocol
SMTP By Antoinette Davis.
SMTP: simple mail transfer protocol
Networking CS 3470, Section 1 Sarah Diesburg
WEB SERVICES From Chapter 19 of Distributed Systems Concepts and Design,4th Edition, By G. Coulouris, J. Dollimore and T. Kindberg Published by Addison.
Unix System Administration
Roadrunner Error 530 Call 1 (888) Toll-free
Social Media And Global Computing Sending
Overview What is Spoofing Types of Spoofing
William Stallings Data and Computer Communications
Unit – 4 Chap - 2 Mail Delivery System
WEB SERVICES From Chapter 19, Distributed Systems
Chapter 7 Network Applications
… and doesn’t Chris Taylor
Chapter 2 Application Layer
 Zone in name space  DNS IN THE INTERNET  Generic domains :There are fourteen generic domains, each specifying an organization type.
MESSAGE ACCESS AGENT: POP AND IMAP
Presentation transcript:

An Email Application with Active Spoof Monitoring and Control Author: T.P. Fowdur, L.Veerasoo Presenter: Haozhou Yu

The E-mail Mail User Agent (MUA), Mail Transfer Agent (MTA) Simple Mail Transfer Protocol (SMTP) The email send and receive procedure, the weekpoint

Spoof imitate (something) while exaggerating its characteristic features for comic effect. hoax or trick (someone). interfere with (radio or radar signals) so as to make them useless. Dictionary explaination

E-mail spoofing Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source. 

SMTP MAIL FROM: - generally presented to the recipient as the Return-path: header but not normally visible to the end user, and by default no checks are done that the sending system is authorized to send on behalf of that address. RCPT TO: - specifies which email address the email is delivered to, is not normally visible to the end user but may be present in the headers as part of the "Received:" header. Together these are sometimes referred to as the "envelope" addressing, by analogy with a traditional paper envelope,[1] and unless the receiving mail server signals that it has problems with either of these items, the sending system sends the "DATA" command, and typically sends several header items, including: From: Joe Q Doe <joeqdoe@example.com> - the address visible to the recipient; but again, by default no checks are done that the sending system is authorized to send on behalf of that address. Reply-to: Jane Roe <Jane.Roe@example.mil> - similarly not checked and sometimes: Sender: Jin Jo <jin.jo@example.jp> - also not checked

SMTP itself lacks authentication so servers that are poorly configured in this way are prey to abusers. And there is nothing that can stop a determined attacker from setting up his own email server.

E-mail spoofing https://en.wikipedia.org/wiki/Email_spoofing Sender and receiver, examples and data Date and time spoofing Anti-spoofing

E-mail spam E-mail spoofing is not spam It is more dangerous than spam

Anti-spoofing The idea of anti-spoofing The tools, ways SSL HTTPS Authentication message

Proposed application How it works

Artecture

Test

Conclusion and analysis Web based client-oriented Advantages and limitations Last part of the paper Have a discuess