PUKYONG

SMTP(Simple Mail Transfer Protocol) 분석을 통해 알 수 없는 발신자를 차단하는 방법

Metadata Downloads
Abstract
Recently, the damage caused by impersonation or forgery∙alteration of e-mail has been increasing. While the existing spam mail processing system scanned and examined mails such as large mails, advertising mails and junk mails as major targets, it was not able to identify or distinguish impersonations or forged mail. In this study, a new email processing system based on error codes was devised by using the mailing system's unique algorithm. In the proposed system, the error codes related to the loss of e-mail provided by the e-mail system environment are used to determine and process whether the e-mail is normal. An impersonation, forgery∙alteration mail management system is located between the network and the recipient's mail server. When an email is received through the mail account of the mail server, it generates verification request information including the received mail content and sends a verification email to the sender's email address. Thereafter, if the sender mail server provides the verification request information normally, email is delivered to recipient. If the sender's e-mail address is not valid, the error code is returned to the impersonation, forgery∙alteration e-mail management system, and the e-mail is blocked. The proposed system was introduced to an actual institution and performance verification was carried out. As a result of the verification, the proposed system has significantly improved the rate of abnormal mail processing. We hope that the results of this study can serve as a useful guide for the development of email processing systems.
Author(s)
정희수
Issued Date
2021
Awarded Date
2021. 2
Type
Dissertation
Publisher
부경대학교
URI
https://repository.pknu.ac.kr:8443/handle/2021.oak/2207
http://pknu.dcollection.net/common/orgView/200000368535
Affiliation
부경대학교 대학원
Department
대학원 정보시스템협동과정
Advisor
이경현
Table Of Contents
I. 서론 1
1. 연구의 필요성 및 목적 1
2. 연구 개요 3
II. 이론적 배경 4
1. 이메일의 개요 4
2. 이메일 관련 용어 5
3. 이메일 동작 원리 6
4. 이메일 관련 선행 연구 10
5. 기존 이메일 보안 시스템 14
III. 악성메일 방지시스템(알 수 없는 발신정보 차단) 18
1. 악성메일 유형 19
2. 악성메일 관련 용어 22
가. 피싱 22
나. 스피어 피싱 23
다. 파밍 24
라. 대량 메일 전송 공격 24
마. 스푸핑 25
바. 랜섬웨어 25
사. 멀웨어 26
3. 발신정보 검증 26
4. SMTP 응답코드 29
5. SMTP 응답코드를 통한 발신정보 검증 39
IV. 성능 검증 49
V. 결론 및 향후 연구 과제 52
Degree
Master
Appears in Collections:
대학원 > 정보시스템협동과정
Authorize & License
  • Authorize공개
Files in This Item:

Items in Repository are protected by copyright, with all rights reserved, unless otherwise indicated.