The E-mail Spoofing on the Network Layer Protocols and Countermeasures Besides the Sender Domain Authentication

Authors

  • Shigeo Akashi and Yao Tong Author

Keywords:

OSI reference model, e-mail spoofing, longest prefix matching rule, disguised packet transmission, sender domain authentication.

Abstract

In this paper, it is shown that application of the 
OSI reference model to the e-mail spoofing enables us to specify the causal network skills which have been abused and that countermeasures against this cybercrime, which are different from the sender domain authentication, can be developed.  Firstly, we see that the phenomena which are brought about by 
the e-mail spoofing based on the datalink layer protocols are different from the phenomena which are brought about by the e-mail spoofing based on the network layer protocols. Secondly, we develop countermeasures which can discriminate the 
network segments where the impersonated e-mail users and the impersonators co-exist from the network segments where only the non-impersonated e-mail users exist.

Downloads

Download data is not yet available.

Downloads

Published

10.11.2024

How to Cite

The E-mail Spoofing on the Network Layer Protocols and Countermeasures Besides the Sender Domain Authentication. (2024). International Journal of Information and Electronics Engineering, 10(1), 22-27. https://ijiee.org/index.php/ijiee/article/view/231