{"title":"基于数据链层的电子邮件欺骗及其在电子邮件聚合系统中的应用:是否有可能利用好电子邮件欺骗?","authors":"Yao Tong, Shigeo Akashi","doi":"10.1145/3373477.3373503","DOIUrl":null,"url":null,"abstract":"It is well known that DHCP snooping is a famous countermeasure against DHCP spoofing. Actually, to what extent DHCP snooping can protect the DHCP clients from being injected malicious DHCP transactions running over the network segment? In this paper, we discuss the problem asking if there exists what is to SMTP spoofing as DHCP snooping is to DHCP spoofing, and the problem asking if it is possible for SMTP spoofing to be applied to a socially useful system..","PeriodicalId":300431,"journal":{"name":"Proceedings of the 1st International Conference on Advanced Information Science and System","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"E-mail spoofing based on the datalink layers and its application to e-mail aggregation systems: is it possible to make good use of e-mail spoofing?\",\"authors\":\"Yao Tong, Shigeo Akashi\",\"doi\":\"10.1145/3373477.3373503\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It is well known that DHCP snooping is a famous countermeasure against DHCP spoofing. Actually, to what extent DHCP snooping can protect the DHCP clients from being injected malicious DHCP transactions running over the network segment? In this paper, we discuss the problem asking if there exists what is to SMTP spoofing as DHCP snooping is to DHCP spoofing, and the problem asking if it is possible for SMTP spoofing to be applied to a socially useful system..\",\"PeriodicalId\":300431,\"journal\":{\"name\":\"Proceedings of the 1st International Conference on Advanced Information Science and System\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-11-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 1st International Conference on Advanced Information Science and System\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3373477.3373503\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 1st International Conference on Advanced Information Science and System","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3373477.3373503","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
E-mail spoofing based on the datalink layers and its application to e-mail aggregation systems: is it possible to make good use of e-mail spoofing?
It is well known that DHCP snooping is a famous countermeasure against DHCP spoofing. Actually, to what extent DHCP snooping can protect the DHCP clients from being injected malicious DHCP transactions running over the network segment? In this paper, we discuss the problem asking if there exists what is to SMTP spoofing as DHCP snooping is to DHCP spoofing, and the problem asking if it is possible for SMTP spoofing to be applied to a socially useful system..