Abstract—In this paper, it is shown that application of the
OSI reference model to the e-mail spoofing enables us to specify
the causal network skills which have been abused and that
countermeasures against this cybercrime, which are different
from the sender domain authentication, can be developed.
Firstly, we see that the phenomena which are brought about by
the e-mail spoofing based on the datalink layer protocols are
different from the phenomena which are brought about by the
e-mail spoofing based on the network layer protocols. Secondly,
we develop countermeasures which can discriminate the
network segments where the impersonated e-mail users and the
impersonators co-exist from the network segments where only
the non-impersonated e-mail users exist.
Index Terms—OSI reference model, e-mail spoofing, longest
prefix matching rule, disguised packet transmission, sender
domain authentication.
Shigeo Akashi and Yao Tong are with the Department of Information
Sciences, Faculty of Science and Technology, Tokyo University of Science.
2641, Yamazaki, Noda City, Chiba Prefecture, 278-8510, Japan (e-mail:
akashi@is.noda.tus.ac.jp, 6316063@ed.tus.ac.jp).
[PDF]
Cite: Shigeo Akashi and Yao Tong, "The E-mail Spoofing on the Network Layer Protocols and Countermeasures Besides the Sender Domain Authentication," International Journal of Information and Electronics Engineering vol. 10, no. 1, pp. 22-27, 2020.