A new architecture for enhancing the security of e-mail system

被引:0
|
作者
Kim, J [1 ]
Lim, H [1 ]
Choi, K [1 ]
Jung, G [1 ]
机构
[1] Ajou Univ, Grad Sch Informat & Commun, Suwon 441749, South Korea
关键词
e-mail; proxy; spam; bridge;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we propose a bridge-type e-mail proxy architecture to release the bottlenecks of the two popular mail security architectures: software mail filter and e-mail gateway. In the proposed architecture, a bridge-type e-mail proxy is located in front of mail server and sniffs all flowing packets on the network. If sniffed packets belong to one of mail protocols, the proposed system filters the packets just as an e-mail proxy system does. But if a sniffed packet does not belong to mail packets, it is forwarded just as a normal network bridge does. The proposed architecture has several merits.
引用
收藏
页码:449 / 454
页数:6
相关论文
共 50 条
  • [1] SECURITY OF E-MAIL
    DUBB, HE
    [J]. SCIENCE, 1993, 262 (5135) : 827 - 827
  • [2] An Optimistic Certified E-mail Protocol for the Current Internet E-mail Architecture
    Draper-Gil, Gerard
    Ferrer-Gomila, Josep L.
    Hinarejos, M. Francisca
    Tauber, Arne
    [J]. 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 382 - 390
  • [3] A proxy approach to e-mail security
    Brown, I
    Snow, CR
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 1999, 29 (12): : 1049 - 1060
  • [4] Double trouble for e-mail security
    Hoffman, P
    [J]. BYTE, 1998, 23 (05): : 40 - 40
  • [5] Computer security bulletins by e-mail
    不详
    [J]. JOURNAL OF THE AMERICAN DENTAL ASSOCIATION, 2004, 135 (04): : 426 - 426
  • [6] An improved e-mail security protocol
    Schneier, B
    Hall, C
    [J]. 13TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1997, : 227 - 230
  • [7] On the security of a certified E-mail scheme
    Wang, GL
    Bao, F
    Zhou, JY
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2004, PROCEEDINGS, 2004, 3348 : 48 - 60
  • [8] E-mail security gets personal
    Paulson, LD
    [J]. COMPUTER, 2004, 37 (01) : 26 - 26
  • [9] Trustnet architecture for e-mail communication
    Poelz, David
    Gansterer, Wilfried N.
    [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATION, 2009, : 48 - 52