{"title":"New Snort rule for detection and prevention of SMTP e-mail bomb attacks","authors":"Andrei-Daniel Tudosi, D. Balan, Alin Dan Potorac","doi":"10.1109/DAS54948.2022.9786213","DOIUrl":null,"url":null,"abstract":"Cyberattacks on networks are launched in every moment nowadays. Due to the advancement of digitalization and technology, these types of attacks are present in our lives, whether we are aware of them or not, they still exist. E-mail bomb attacks are listed as cyberattacks, which can create difficulties in the telecommunication sector because they target services that will be disrupted and be harder to access. In definition, an e-mail bomb involves the process of sending a large number of e-mails to a specific server or person. A very powerful open-source tool that can handle this situation is Snort [1], which is used as a solution to identify this network attack. Additionally, with Snort, this paper presents a custom rule proposed to show promising results in detecting this kind of attack.","PeriodicalId":245984,"journal":{"name":"2022 International Conference on Development and Application Systems (DAS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Development and Application Systems (DAS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DAS54948.2022.9786213","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Cyberattacks on networks are launched in every moment nowadays. Due to the advancement of digitalization and technology, these types of attacks are present in our lives, whether we are aware of them or not, they still exist. E-mail bomb attacks are listed as cyberattacks, which can create difficulties in the telecommunication sector because they target services that will be disrupted and be harder to access. In definition, an e-mail bomb involves the process of sending a large number of e-mails to a specific server or person. A very powerful open-source tool that can handle this situation is Snort [1], which is used as a solution to identify this network attack. Additionally, with Snort, this paper presents a custom rule proposed to show promising results in detecting this kind of attack.