Skip to main content

An Approach for Detecting Flooding Attack Based on Integrated Entropy Measurement in E-Mail Server

  • Conference paper
  • First Online:
Advanced Technologies, Embedded and Multimedia for Human-centric Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 260))

Abstract

The aim of this study is to protect an electronic mail (email) server system based on an integrated Entropy calculation via detecting flooding attacks. Lots of approaches have been proposed by many researchers to detect packets accessing email whether are belonging to the normal or abnormal packets. Entropy is an approach of the mathematical theory of Communication; it can be used to measure the uncertainty or randomness in a random variable. A normal email server usually supports the four protocols consists of Simple Mail Transfer Protocol (SMTP), Post Office Protocol version 3 (POP3), Internet Message Access Protocol version 4 (IMAP4), and HTTPS being used by remote web-based email. However, in Internet, there are many flooding attacks will try to paralyze email server system. Therefore, we propose a new approach for detecting flooding attack based on Integrated Entropy Measurement in email server. Our approach can reduce the misjudge rate compared to conventional approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Postel JB (1982) A simple mail transfer protocol. RFC821

    Google Scholar 

  2. Klensin J (2008) A simple mail transfer protocol. RFC5321

    Google Scholar 

  3. Myers J, Rose M (1996) Post office protocol—Version 3. RFC 1939

    Google Scholar 

  4. Crispin M (1996) Request for comments: 2060. Standards Track, Network Working Group, Dec 1996

    Google Scholar 

  5. Cripsin M (2003) Internet message access protocol—version 4rev1. RFC3501

    Google Scholar 

  6. Karlton P (2011) Request for comments: 6101. Standards Track, Network Working Group, Aug 2011

    Google Scholar 

  7. Wikipedia (2013) HTTP secure. http://en.wikipedia.org/wiki/HTTP_Secure

  8. Chen H-C, Sun J-Z, Wu Z-D (2010) Dynamic forensics system with intrusion tolerance based on hierarchical colour petri-nets. In: BWCCA 2010: international conference on broadband and wireless computing, communication and applications, also NGWMN-2010: the third international workshop on next generation of wireless and mobile networks, , Fukuoka, Japan, 4–6 Nov, pp 660–665

    Google Scholar 

  9. O’Donnell AJ (2007) The evolutionary microcosm of stock spam. Sec Priv IEEE 5:70–75

    Google Scholar 

  10. Bass T, Watt G (1997) A simple framework for filtering queued SMTP email. In: MILCOM 97 proceedings, vol. 3, pp 1140–1144

    Google Scholar 

  11. Bass T, Freyre A, Gruber D, Watt G (1998) Email bombs and countermeasure: cyber attack on availability and brand integrity. IEEE Network 12(2):10–17

    Article  Google Scholar 

  12. Wang X, Chellappan S, Boyer P, Xuan D (2006) On the effectiveness of secure overlay forwarding systems under intelligent distributed DoS attacks. IEEE Trans Parallel Distrib Syst 17:619–632

    Google Scholar 

  13. Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27:379–423, 623–656

    Google Scholar 

  14. Absolute Astronomy (2012) Information entropy. Available from: http://www.absoluteastronomy.com/topics/Information_entropy

  15. Weaver W, Shannon CE (1963) The mathematical theory of communication, 1949, republished in paperback

    Google Scholar 

  16. Chen H-C, Sun J-Z, Tseng S-S, Weng C-E (2012) A new approach for detecting smtpfa based on entropy measurement. In: The 9th IFIP international conference on network and parallel computing (NPC 2012), Gwangju, Korea, 6–8 Sept 2012

    Google Scholar 

Download references

Acknowledgments

This work was supported in part by Asia University, Taiwan, under Grant 101-asia-28, and by the National Science Council, Taiwan, Republic of China, under Grant NSC99-2221-E-468-011.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hsing-Chung Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Chen, HC., Tseng, SS., Mao, CH., Lee, CC., Churniawan, R. (2014). An Approach for Detecting Flooding Attack Based on Integrated Entropy Measurement in E-Mail Server. In: Huang, YM., Chao, HC., Deng, DJ., Park, J. (eds) Advanced Technologies, Embedded and Multimedia for Human-centric Computing. Lecture Notes in Electrical Engineering, vol 260. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-7262-5_107

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-7262-5_107

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-7261-8

  • Online ISBN: 978-94-007-7262-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics