Email spoofing is referred to as malicious activity in which the origin details have been altered so as to make it to appear to origin from a different source. Sending fake emails is usually used to convince the receiver so that he stays unaware of the real sender. Email spoofing may be effectively used to launch phishing attacks on the receivers. The attacker may also use the attack with some amplification and in addition use mass mailer to spam mail users. Infections may be propagated by the means of spoofed emails to attack victims. There are a variety of attackers who do email spoofing. The list starts from people trying to just have fun by sending spoofed messages to users. Other serious attacks are done by wrong doers to make damages to the systems.
Keywords
DKIM, DMARC, Email spoofing, SMTP server, SPF
References
[1] Dr. Wesam Bhaya , “Security against spoofing attack in mobile Ad Hoc network”
[2] Ahmad Alamgir Khan,“Preventing phishing attacks using one time password and user machine identification,” International Journal of Computer Applications (0975-8887)., vol. 68-No.3, Apr. 2013.
[Hiral Vegda, Chirag Darji
(2014), Identification of Spoofed E-mail, International Journal of Innovative Research in Computer Science and Technology (IJIRCST), Vol-2, Issue-3, Page No-129-131], (ISSN 2347 - 5552). www.ijircst.org
Corresponding Author
Hiral Vegda
School of Computer Studies, Ahmedabad University, Ahmedabad, India, 9904781373, (e-mail: hiralvegda@yahoo.com).