Empirical analysis of Denial of Service attack against SMTP servers

12Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper we show that the performance of the generic SMTP servers are more limited than we previously thought. We implemented a environment to test SMTP server performance focusing on Denial of Service (DoS) attacks. Our measurements show that a standard SMTP server can be easily overloaded by sending simple emailmessages and the overload can occur without consuming all network bandwidth. Our measurements also show that the usage Of conte nt filte ring applications can harm the performance so much that the server become even more vulnerable to DoS attacks. In the paper we describe the problems of performance measurements in SMTP environment and we also give a detailed background about the performed measurements. e.g we proposed to use traffic level measurements in a DoS front-end ([1]). In the current paper our goal is to help the understanding why SMTP servers are so much affected with DoS related problems, and why such countermeasures are important. We also do not claim that measuring throughput of a server is something really novel, but in fact, we found no such usable information (e.g. scientific paper) to help or base our work in the field of DoS protection of SMTP servers. © 2007 IEEE.

Cite

CITATION STYLE

APA

Bencsáth, B., & Rónai, M. A. (2007). Empirical analysis of Denial of Service attack against SMTP servers. In Proceedings of the 2007 International Symposium on Collaborative Technologies and Systems, CTS (pp. 72–79). https://doi.org/10.1109/CTS.2007.4621740

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free