%0 Conference Proceedings %T A New Approach for Detecting SMTPFA Based on Entropy Measurement %+ Asia University %+ National Kaohsiung Marine University [Taïwan] (NKMU) %A Chen, Hsing-Chung %A Sun, Jai-Zong %A Tseng, Shian-Shyong %A Weng, Chien-Erh %Z Part 9: ATIMCN %< avec comité de lecture %( Lecture Notes in Computer Science %B 9th International Conference on Network and Parallel Computing (NPC) %C Gwangju, South Korea %Y James J. Park %Y Albert Zomaya %Y Sang-Soo Yeo %Y Sartaj Sahni %I Springer %3 Network and Parallel Computing %V LNCS-7513 %P 349-359 %8 2012-09-06 %D 2012 %R 10.1007/978-3-642-35606-3_41 %K SMTP %K Entropy %K Attack detecting %K SMTP flooding attack %Z Computer Science [cs]Conference papers %X In this paper, we propose a new approach of detecting a kind of Simple Mail Transfer Protocol Flooding Attack (SMTPFA for short) based on entropy measurement. We will calculate the entropy values from the received packets flow. Further checking its entropy value compared with the values of abnormal entropy, we then use it to detect this server whether is suffered some attacks from hacker. The scheme can easily detect SMTPFA, and monitor the real-time status of SMTP server. %G English %Z TC 10 %Z WG 10.3 %2 https://inria.hal.science/hal-01551369/document %2 https://inria.hal.science/hal-01551369/file/978-3-642-35606-3_41_Chapter.pdf %L hal-01551369 %U https://inria.hal.science/hal-01551369 %~ IFIP-LNCS %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC10 %~ IFIP-NPC %~ IFIP-WG10-3 %~ IFIP-LNCS-7513