IP Addresses in Email Clients

نویسنده

  • Joshua Goodman
چکیده

IP addresses are an important tool for fighting spam, used for safe lists, blackhole lists, anti-spoofing and related purposes. While it is trivial to find the sender’s IP address in most email server software, it turns out to be surprisingly difficult to do so in email client software: we explain why. This implies that either alternative approaches are needed (typically signature-based) or that new standards for communicating between clients and servers are needed. We suggest several forms such standards might take.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fast Flux Service Networks: Dynamics and Roles in Hosting Online Scams∗

This paper studies the dynamics of fast flux service networks and their role in online scam hosting infrastructures. By monitoring changes in DNS records of over 350 distinct fast flux domains collected from URLs in 115,000 spam emails at a large spam sinkhole, we measure the rate of change of DNS records, accumulation of new distinct IPs in the hosting infrastructure, and location of change bo...

متن کامل

A NEW DYNAMIC-AUTO-STATIC TECHNIQUE FOR DHCPv4 IP ADDRESS ALLOCATION

One feature of Dynamic Host Configuration Protocol (DHCP) servers is the ability to assign static (fixed) IP Addresses for well-known clients in the Local Area Network (LAN) based on their Medium Access Control (MAC) addresses. This typically involves manual intervention by the network administrator to enter the correct MAC address and IP address information into the DHCP server configuration f...

متن کامل

Identity-Based Internet Protocol Network

The Identity-Based Internet Protocol (IBIP) Network project is experimenting with a new enterprise oriented network architecture using standard IP version 6 protocol to encode user and host identity (ID) information into the IP address. Our motivation is to increase our security posture by leveraging identity, reducing our threat exposure, enhancing situational understanding of our environment,...

متن کامل

Distribution of IP Source Addresses Experienced By Wolfenstein Enemy Territory Game Servers

Online multiplayer first person shooter (FPS) games typically limit themselves to between 4 and 30+ concurrent players, seemingly limiting the number of source IP addresses seen over time. However, this report demonstrates how common FPS game servers usually ‘experience’ traffic from hundreds of unique IP source addresses every minute, regardless of an individual game server’s popularity or loc...

متن کامل

Analysis of Intrusion Detection System Using Trusted Clients

Traditionally firewall has been used to stop the intrusion attempts by an attacker. But firewalls have static configurations that block attacks based on source and destination ports and IP addresses. These are not sufficient to provide security from all the attacks. Therefore, we need IDS type systems which could analyze the payload of the packet to detect these attacks. Proposed IDS is in two ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004