Application of Domain Keys Identified Mail, Sender Policy Framework, Anti-Spam, and Anti-Virus: The Analysis on Mail Servers
Abstract
Viruses spread through email are often sent by irresponsible parties that aim to infect email users' servers. This background encouraged the author to analyze the application of DKIM, SPF, anti-spam, and anti-virus to avoid spam, viruses, and spoofing activities. The goal is for the server to prevent spam, spoofing, and viruses to ensure the security and convenience of email users and prevent the impact of losses caused by them. The design and analysis of DKIM, SPF, anti-spam, and anti-virus applications use the NDLC methodology. The process includes designing spam, spoofing, and virus filtering systems and performing installation and configuration simulations. The next stage is implementation, during which the previously developed system is tested on the spam filtering system, spoofing, and viruses. The last stage is the monitoring stage, where supervision is conducted on the approach to determine its success level. This study concludes that applying the DKIM protocol can prevent spoofing through private and public key-matching methods for authentication. Meanwhile, the application of the SPF protocol can prevent spoofing by authorizing the IP address of the sending server. Additionally, SpamAssassin, ClamAV and Amavisd-New can prevent spam and viruses from entering by checking email headers, bodies, and attachments.
Keywords
Full Text:
PDFReferences
S. R. Barley, D. E. Meyerson, and S. Grodal, “E-mail as a source and symbol of stress,” Organ. Sci., vol. 22, no. 4, pp. 887–906, 2011, doi: 10.1287/orsc.1100.0573.
L. Stebbins, “Email Is Evolving--Are You ?,” no. March, 2016.
F. A. Mir and M. T. Banday, “Control of spam: A comparative approach with special reference to India,” Inf. Commun. Technol. Law, vol. 19, no. 1, pp. 27–59, 2010, doi: 10.1080/13600831003589350.
S. H. Fisher and R. Herrick, “Old versus new:The comparative efficiency of mail and internet surveys of state legislators,” State Polit. Policy Q., vol. 13, no. 2, pp. 147–163, 2013, doi: 10.1177/1532440012456540.
M. Tariq Banday, “Effectiveness and Limitations of E-Mail Security Protocols,” Int. J. Distrib. Parallel Syst., vol. 2, no. 3, pp. 38–49, 2011, doi: 10.5121/ijdps.2011.2304.
A. S. Babrahem, E. T. Alharbi, A. M. Alshiky, S. S. Alqurashi, and J. Kar, “Study of the Security Enhancements in Various E-Mail Systems,” J. Inf. Secur., vol. 06, no. 01, pp. 1–11, 2015, doi: 10.4236/jis.2015.61001.
S. G. Waghmare and S. A. Pathak, “G LOBAL J OURNAL OF E NGINEERING S CIENCE AND R ESEARCHES,” vol. 90, no. C, pp. 90–94, doi: 10.5281/zenodo.1485323.
Y. P. Hoiriyah, Bambang Sugiantoro, “INVESTIGASI FORENSIK PADA E-MAIL SPOOFING MENGGUNAKAN METODE HEADER ANALYSIS,” J. Ilm. DASI, vol. 17, no. 4, pp. 20–25, 2016.
K. Marzuki and A. Apriani, “Evaluasi Penerapan Teknologi Informasi E-Learning Pada Kampus Swasta Menggunakan Cobit 4.1,” J. Bumigora Inf. Technol., vol. 1, no. 2, pp. 161–166, 2019.
S. Hameed, T. Kloht, and X. Fu, “Identity based email sender authentication for spam mitigation,” in 8th International Conference on Digital Information Management, ICDIM 2013, 2013, pp. 14–19. doi: 10.1109/ICDIM.2013.6694015.
H. M. Hamad and W. A. Abudalal, “The Two secured Factors of Authentication,” vol. 24, no. 1, pp. 1–13, 2016.
H. P. Shitole and S. Y. Divekar, “Secure Email Software using e-SMTP,” Int. Res. J. Eng. Technol., pp. 3967–3971, 2019, [Online]. Available: www.irjet.net
S. Hameed, X. Fu, P. Hui, and N. Sastry, “LENS: Leveraging social networking and trust to prevent spam transmission,” Proc. - Int. Conf. Netw. Protoc. ICNP, pp. 13–18, 2011, doi: 10.1109/ICNP.2011.6089044.
M. Alazab and R. G. Broadhurst, “Cyber-Physical Security,” Cyber-Physical Secur., no. January, 2017, doi: 10.1007/978-3-319-32824-9.
A. G. Gani, “Cybercrime (Kejahatan Berbasis Komputer),” J. Sist. Inf. Univ. Suryadarma, vol. 5, no. 1, pp. 16–29, 2014, doi: 10.35968/jsi.v5i1.18.
A. Almomani, B. B. Gupta, S. Atawneh, A. Meulenberg, and E. Almomani, “A survey of phishing email filtering techniques,” IEEE Commun. Surv. Tutorials, vol. 15, no. 4, pp. 2070–2090, 2013, doi: 10.1109/SURV.2013.030713.00020.
A. Zadgaonkar, S. Kashyap, and M. Chandra Patel, “Developing a Model to Detect E-mail Address Spoofing using Biometrics Technique,” Int. J. Sci. Mod. Eng., no. 1, pp. 2319–6386, 2013, [Online]. Available: http://www.commtouch.com/Site/News
A. C. Kigerl, “An empirical assessment of the CAN SPAM Act,” ProQuest Diss. Theses, p. 112, 2010, [Online]. Available: https://login.pallas2.tcl.sc.edu/login?url=https://search.proquest.com/docview/610183396?accountid=13965%0Ahttp://resolver.ebscohost.com/openurl?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&rfr_id=info:sid/ProQuest+Dissertations+%26+Theses+Global&rft_va
M. T. Banday, F. A. Mir, J. A. Qadri, and N. A. Shah, “Analyzing Internet e-mail date-spoofing,” Digit. Investig., vol. 7, no. 3–4, pp. 145–153, 2011, doi: 10.1016/j.diin.2010.11.001.
R. Oppliger, “Certified mail: The next challenge for secure messaging,” Communications of the ACM, vol. 47, no. 8, pp. 75–79, 2004. doi: 10.1145/1012037.1012039.
O. L. Barakat, D. Koll, and X. Fu, “Gavel: A fast and easy-to-use plain data representation for software-defined networks,” IEEE Trans. Netw. Serv. Manag., vol. 16, no. 2, pp. 606–617, 2019, doi: 10.1109/TNSM.2019.2903440.
D. Mooloo, “An SSL-Based Client-Oriented Anti-Spoofing Email Application,” pp. 1–5.
M. A. Hama Saeed, “Malware in Computer Systems: Problems and Solutions,” IJID (International J. Informatics Dev., vol. 9, no. 1, p. 1, 2020, doi: 10.14421/ijid.2020.09101.
L. Cailleux, A. Bouabdallah, and J. M. Bonnin, “A confident email system based on a new correspondence model,” Int. Conf. Adv. Commun. Technol. ICACT, pp. 489–492, 2014, doi: 10.1109/ICACT.2014.6779010.
H. Mukhtar, Daniel Adi Putra Sitorus, and Yulia Fatma, “Analisa Dan Implementasi Security Mail Server,” J. Fasilkom, vol. 10, no. 1, pp. 25–32, 2020, doi: 10.37859/jf.v10i1.1906.
N. Nurlina and I. Irmayana, “Studi Banding Spam-Assassin Mail Server Dengan dan Tanpa Filter di Sisi Mail Client,” Creat. Inf. Technol. J., vol. 1, no. 2, p. 77, 2015, doi: 10.24076/citec.2014v1i2.12.
A. P. Sari, I. Kanedi, and H. Aspriyono, “Designing Mail Server Using Exchange Server At SMPN 17 Bengkulu City Perancangan Mail Server Dengan Menggunakan Exchange Server Di SMPN 17 Kota Bengkulu,” vol. 1, no. 2, pp. 131–138, 2022.
I. P. Hariyadi and K. Marzuki, “Implementation Of Configuration Management Virtual Private Server Using Ansible,” MATRIK J. Manajemen, Tek. Inform. dan Rekayasa Komput., vol. 19, no. 2, pp. 347–357, 2020, doi: 10.30812/matrik.v19i2.724.
R. Chaganti and Y. Marotu, “A study on Clamwin Antivirus software and its Performance Evaluation,” no. April 2018, pp. 0–6, 2021, doi: 10.13140/RG.2.2.10842.26562.
Proofpoint, August 2016, no. August. 2016. doi: 10.1162/leon_r_01372.
L. E. Wurdiana Shinta, “Plagiarism Checker X Originality Report,” J. Edudikara, vol. 2, no. 2, pp. 3–5, 2021.
P. Verma, A. Goyal, and Y. Gigras, “Email phishing: text classification using natural language processing,” Comput. Sci. Inf. Technol., vol. 1, no. 1, pp. 1–12, 2020, doi: 10.11591/csit.v1i1.p1-12.
G. N. Concepts, Network security 3. 2011. doi: 10.1016/B978-1-59749-594-3.00003-X.
DOI: http://dx.doi.org/10.24042/ijecs.v2i2.13543
Refbacks
- There are currently no refbacks.
International Journal of Electronics and Communications System (IJECS) is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.