Spam Control Mechanism using Identity based Message Admission

Download Now
Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
Spammers have a tremendous financial incentive to compromise user Email accounts. Many approaches to curb spam have been developed. In the traditional DKIM signature approach no Certificate Authority is used. Survey tells that most of the DNS are exploited to DNS cache poisoning attack. Further smaller keys are exposed to wiener attack. Also DKIM does not verify the author and does not provide security after signature generation/verification. An attacker can be able to trick the recipient by masquerading as a legitimate sender and insert malicious information and send as spam Mails to other recipients.
Download Now

Find By Topic