Loading

Spam Mail Visualization through Open Relay On Firewall Gateway
Shashank Shekhar1, Gurpreet Singh2
1Shashank Shekhar, Born in Bihar, Received B. Tech Degree in Information of Technology, Majitar, India.
2Gurpreet Singh, Born in Punjab and Received B.E. Degree from Sant Longowal Institute of Technology University, Punjab, India.
Manuscript received on March 12, 2013. | Revised Manuscript received on April 13, 2013. | Manuscript published on April 30, 2013. | PP: 597-602 | Volume-2, Issue-4, April 2013. | Retrieval Number: D1505042413/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A picture is able to tell one thousand words. Pictorial representation of any matter is clearer than text. Present time security is more challengeable task in the computer field. No one can say any model/algorithms/idea can’t be crack. This paper is basically an idea to visualise the spam mail send by spammer through open relay. Email log file has many information. A lot information can be extracted from a log file. In this paper, two types of log files are described. These are email and firewall logs. This paper shows how a log file is able to visualize the information, attack, and protection against spammer/attacker. This paper described different method for visualizing the attack through open relay via firewall gateway. Spam mail is a great problem on the email server. Many attack are done on this server via open relays. Firewall may be a great idea to protect the sever/ system by the block or pass the spam mail. This paper also describes the forensic analysis of different attacks via log file on the email server. It is able to visualize worm, virus, dictionary attack, man in the middle attack from log files. Basically this paper represents an idea about the answers of the “wh” words on the email server. Those are “who”(Source and destination), ”when”(time), “where”(port and address), ”what”(visualization of different activity).
Keywords: Log files, MTA, SMTP, Email, Spam, Directory harvest, Firewall, Virus, Worm, Firewall Ruleset.