A New Approach for Detecting SMTPFA Based on Entropy Measurement - Network and Parallel Computing Access content directly
Conference Papers Year : 2012

A New Approach for Detecting SMTPFA Based on Entropy Measurement

Hsing-Chung Chen
  • Function : Author
  • PersonId : 1001335
Jai-Zong Sun
  • Function : Author
  • PersonId : 1011309
Shian-Shyong Tseng
  • Function : Author
  • PersonId : 1011310
Chien-Erh Weng
  • Function : Author
  • PersonId : 1011311

Abstract

In this paper, we propose a new approach of detecting a kind of Simple Mail Transfer Protocol Flooding Attack (SMTPFA for short) based on entropy measurement. We will calculate the entropy values from the received packets flow. Further checking its entropy value compared with the values of abnormal entropy, we then use it to detect this server whether is suffered some attacks from hacker. The scheme can easily detect SMTPFA, and monitor the real-time status of SMTP server.
Fichier principal
Vignette du fichier
978-3-642-35606-3_41_Chapter.pdf (381.03 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01551369 , version 1 (30-06-2017)

Licence

Attribution

Identifiers

Cite

Hsing-Chung Chen, Jai-Zong Sun, Shian-Shyong Tseng, Chien-Erh Weng. A New Approach for Detecting SMTPFA Based on Entropy Measurement. 9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.349-359, ⟨10.1007/978-3-642-35606-3_41⟩. ⟨hal-01551369⟩
50 View
55 Download

Altmetric

Share

Gmail Facebook X LinkedIn More