Skip to main content
Top

2014 | OriginalPaper | Chapter

An Approach for Detecting Flooding Attack Based on Integrated Entropy Measurement in E-Mail Server

Authors : Hsing-Chung Chen, Shian-Shyong Tseng, Chuan-Hsien Mao, Chao-Ching Lee, Rendabel Churniawan

Published in: Advanced Technologies, Embedded and Multimedia for Human-centric Computing

Publisher: Springer Netherlands

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The aim of this study is to protect an electronic mail (email) server system based on an integrated Entropy calculation via detecting flooding attacks. Lots of approaches have been proposed by many researchers to detect packets accessing email whether are belonging to the normal or abnormal packets. Entropy is an approach of the mathematical theory of Communication; it can be used to measure the uncertainty or randomness in a random variable. A normal email server usually supports the four protocols consists of Simple Mail Transfer Protocol (SMTP), Post Office Protocol version 3 (POP3), Internet Message Access Protocol version 4 (IMAP4), and HTTPS being used by remote web-based email. However, in Internet, there are many flooding attacks will try to paralyze email server system. Therefore, we propose a new approach for detecting flooding attack based on Integrated Entropy Measurement in email server. Our approach can reduce the misjudge rate compared to conventional approaches.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Postel JB (1982) A simple mail transfer protocol. RFC821 Postel JB (1982) A simple mail transfer protocol. RFC821
2.
go back to reference Klensin J (2008) A simple mail transfer protocol. RFC5321 Klensin J (2008) A simple mail transfer protocol. RFC5321
3.
go back to reference Myers J, Rose M (1996) Post office protocol—Version 3. RFC 1939 Myers J, Rose M (1996) Post office protocol—Version 3. RFC 1939
4.
go back to reference Crispin M (1996) Request for comments: 2060. Standards Track, Network Working Group, Dec 1996 Crispin M (1996) Request for comments: 2060. Standards Track, Network Working Group, Dec 1996
5.
go back to reference Cripsin M (2003) Internet message access protocol—version 4rev1. RFC3501 Cripsin M (2003) Internet message access protocol—version 4rev1. RFC3501
6.
go back to reference Karlton P (2011) Request for comments: 6101. Standards Track, Network Working Group, Aug 2011 Karlton P (2011) Request for comments: 6101. Standards Track, Network Working Group, Aug 2011
8.
go back to reference Chen H-C, Sun J-Z, Wu Z-D (2010) Dynamic forensics system with intrusion tolerance based on hierarchical colour petri-nets. In: BWCCA 2010: international conference on broadband and wireless computing, communication and applications, also NGWMN-2010: the third international workshop on next generation of wireless and mobile networks, , Fukuoka, Japan, 4–6 Nov, pp 660–665 Chen H-C, Sun J-Z, Wu Z-D (2010) Dynamic forensics system with intrusion tolerance based on hierarchical colour petri-nets. In: BWCCA 2010: international conference on broadband and wireless computing, communication and applications, also NGWMN-2010: the third international workshop on next generation of wireless and mobile networks, , Fukuoka, Japan, 4–6 Nov, pp 660–665
9.
go back to reference O’Donnell AJ (2007) The evolutionary microcosm of stock spam. Sec Priv IEEE 5:70–75 O’Donnell AJ (2007) The evolutionary microcosm of stock spam. Sec Priv IEEE 5:70–75
10.
go back to reference Bass T, Watt G (1997) A simple framework for filtering queued SMTP email. In: MILCOM 97 proceedings, vol. 3, pp 1140–1144 Bass T, Watt G (1997) A simple framework for filtering queued SMTP email. In: MILCOM 97 proceedings, vol. 3, pp 1140–1144
11.
go back to reference Bass T, Freyre A, Gruber D, Watt G (1998) Email bombs and countermeasure: cyber attack on availability and brand integrity. IEEE Network 12(2):10–17CrossRef Bass T, Freyre A, Gruber D, Watt G (1998) Email bombs and countermeasure: cyber attack on availability and brand integrity. IEEE Network 12(2):10–17CrossRef
12.
go back to reference Wang X, Chellappan S, Boyer P, Xuan D (2006) On the effectiveness of secure overlay forwarding systems under intelligent distributed DoS attacks. IEEE Trans Parallel Distrib Syst 17:619–632 Wang X, Chellappan S, Boyer P, Xuan D (2006) On the effectiveness of secure overlay forwarding systems under intelligent distributed DoS attacks. IEEE Trans Parallel Distrib Syst 17:619–632
13.
go back to reference Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:379–423, 623–656 Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:379–423, 623–656
15.
go back to reference Weaver W, Shannon CE (1963) The mathematical theory of communication, 1949, republished in paperback Weaver W, Shannon CE (1963) The mathematical theory of communication, 1949, republished in paperback
16.
go back to reference Chen H-C, Sun J-Z, Tseng S-S, Weng C-E (2012) A new approach for detecting smtpfa based on entropy measurement. In: The 9th IFIP international conference on network and parallel computing (NPC 2012), Gwangju, Korea, 6–8 Sept 2012 Chen H-C, Sun J-Z, Tseng S-S, Weng C-E (2012) A new approach for detecting smtpfa based on entropy measurement. In: The 9th IFIP international conference on network and parallel computing (NPC 2012), Gwangju, Korea, 6–8 Sept 2012
Metadata
Title
An Approach for Detecting Flooding Attack Based on Integrated Entropy Measurement in E-Mail Server
Authors
Hsing-Chung Chen
Shian-Shyong Tseng
Chuan-Hsien Mao
Chao-Ching Lee
Rendabel Churniawan
Copyright Year
2014
Publisher
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-7262-5_107