Call for papers :

Submission Last Date 30/04/2018
Status Notification Within 2 Days
Submit Paper Online

Check Paper Status

Paper Status

News & Updates

IJAERD provides Hard Copy of Published Certificates of Publication to each author.

We have started accepting articles by online means directly through website. Article submission link is given on left side

IJAERD Provide Review card, Acceptance Letter and Fee Receipt without taking any extra charges

IJAERD invites research paper from various engineering disciplines for Vol.1 Issue 12 (Dec. - 2014) issue,

Conference Proceedings

National Conference on Emerging Trends in Computer & Electrical Engineering (ETCEE - 2014) March 7-8, 2014, Organized by Atmiya Institute of Technology and Science, Rajkot

National Conference on Recent Research in Engineering and Technology (NCRRET-2015) organizing by Dr. Jivraj Mehta Institute of Technology, Mogar-Anand

National Conference on Emerging Trends in Computer, Electrical & Electronics (ETCEE - 2015), March 13-14, 2015, Organized by Atmiya Institute of Technology and Science, Rajkot

Paper Details

Paper Title
Legalistic Evaluation of E-Mail Headers Based on Address Spoofing
Abstract
in this new era of digital world, E-Mail is a communication medium and extensively used, fast & cheap way of message transfer over the internet world. After all, mail is not completely safe & reliable medium due to technically alternate loopholes in protocols which able to culprits to make mistreat it especially to send spoofed E-Mails which is recently large scale problem to handle for mail systems now days. E-Mail sender address spoofing is malicious action where the origin address are changed and presented as it is coming from expected sender but the real sender is an assaulter. In this paper, we present behavior of several mail applications during receiving the sender address spoofed mails. We recommend sender spoofing analysis algorithm to check sender spoofing in mails through performing comprehensive header evaluation on mail header fields. We generally focused on four fields like R-SPF, DKIM, DKIM Signature and DMARC. This proposed algorithm checks the valid values of the headers. Any non valid value shows towards unauthorized mails. We have also created data values of legitimate and spoofed mails and implemented the evaluations on mail headers for valid and invalid values. Our proposed approach and algorithm is capable to detect sender spoofing especially sender spoofed mails.
KeyWord
E-Mail Evaluation, Mail Sender Spoofing, R-SPF, DKIM, DMARC, Header Analysis.
Others Details
Paper Id : 45309
Author Name : Ramakant Upadhyay
Co-Author Name(s) : Chetan Kumar
Volume/Issue No : Volume 05 Issue 01
Page No : 104-113
DOI Number : DOI:10.21090/IJAERD.45309
Publication Date : 2018-01-11
License : This work is licensed under a Creative Commons Attribution 4.0 International License.
website : http://www.ijaerd.com/index.php
Impact Factor : 4.72, SJIF-2016
ISSN Details : eISSN: 2348-4470, pISSN:2348-6406