Open Access Open Access  Restricted Access Subscription Access

Defending Against Ransomware Attacks with DKIM and SPF

D.Suvarna Lakshmi Manikanteswari, N. Hiranmayee, M.N.V Surekha, S. Shanthi Rupa

Abstract


Emails are frequently used as a launch pad for ransomware attacks by those looking to compromise company data. Organizations are more conscious of their vulnerability to assaults due to the complexity and frequency of ransomware attacks. Ransomware attacks have been launched against companies. By encrypting and locking a victim's data. Ransomware renders them useless and unusable until the attacker gets paid a ransom. The email gateway technologies DKIM and SPF are responsible for monitoring incoming and outgoing traffic for data integrity, context, and content for emails and web interactions. To verify a sender's identity and authenticate message content, DKIM employs a digital signature, while SPF determines the permissible devices for sending mail on a network. This can inspect malicious web links and attachments to stop an infection. Perform real-time threat analysis, detect malicious behavior on the outbound web with detection capabilities, view encrypted traffic and attachments, and prevent endpoint data loss.

 


Full Text:

PDF

References


https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=8c20a8a96aa0bda907630f66596c44339b1319de

S. R. Barley, D. E. Meyerson, and S. Grodal, “E-mail as a source and symbol of stress,” Organ. Sci., vol. 22, no. 4, pp. 887–906, 2011, doi: 10.1287/orsc.1100.0573.

https://seap.taylors.edu.my/file/rems/publication/105055_5256_1.pdf

https://download.garuda.kemdikbud.go.id/article.php?article=3257880&val=23997&title=Application%20of%20Domain%20Keys%20Identified%20Mail%20Sender%20Policy%20Framework%20Anti-Spam%20and%20Anti-Virus%20The%20Analysis%20on%20Mail%20Servers

S. H. Fisher and R. Herrick, “Old versus new:The comparative efficiency of mail and internet surveys of state legislators,” State Polit. Policy Q., vol. 13, no. 2, pp. 147–163, 2013, doi: 10.1177/1532440012456540.

A. Aslan and R. Samet, "A Comprehensive Review on Malware Detection Approaches," in IEEE Access, vol. 8, pp. 6249-6271, 2020, doi: 10.1109/ACCESS.2019.2963724. keywords: {Computer viruses;Feature extraction;Encryption;Internet;Cyber security;malware classification;malware detection approaches;malware features},


Refbacks

  • There are currently no refbacks.