Email Spoofing Detection Using Volatile Memory
Email Spoofing Detection Using Volatile Memory
Abstract—In email systems, one of the most widely used examining Sender Policy Framework (SPF) [4], DomainKeys
attacks is email spoofing, in which the source address of the Identified Mail (DKIM) [5] and Domain-based Message
email message is forged to make the recipient of the email Authentication, Reporting and Conformance (DMARC) [6]
believe that the email was sent from a legitimate source. Several
research works have been presented in the past to address fields of email header to detect spoofed addresses proposed
email spoofing attack. Further, in recent years, the technique by Gupta et al. [7].
of memory forensics has evolved significantly where critical
evidence is extracted from the volatile memory of the target B. Memory Forensics and Challenges
machine during a cyber crime investigation. In this paper, we One of the emerging branches of digital forensics, namely
utilize memory forensics to detect if the client received any memory forensics [8], entails analyzing the memory of the
spoofed email. In addition, our memory forensics approach
suspect device for garnering evidence of cyber attack. Mem-
detects if the client replied to any spoofed emails. The memory
of the client machine is acquired on a scheduled basis and ory of any computer can be divided into non-volatile memory,
the acquired memory dump is analyzed to identify spoofing which includes internal storage called hard disks, and volatile
attack and, if detected, storing the details in log files that can memory called RAM. The non-volatile memory supports
be used by cyber crime investigators. The benefit of applying persistent storage and is used for storing static critical files.
memory forensics to detect spoofed emails is that it guarantees
On the other hand, volatile memory loses its contents when
non-repudiation since every action performed on a computer
is loaded in the system’s physical memory, including email the device is restarted and stores dynamic information such
communication, and hence the user cannot deny receiving or as processes, network connections details, etc. Although
replying to spoofed email. traditional analysis of non-volatile memory reveals wealth of
Index Terms—Email spoofing, Memory forensics, Spoofing settings and configurations information about the systems and
websites applications, some crucial details like password, unencrypted
content, and email headers and messages can be retrieved
I. INTRODUCTION from volatile memory only.
A. Email Spoofing However, it is challenging to analyze the memory dump
With the growth and evolution of emails, the threats collected from the target computer due to the complex data
associated with email communication also increases, with structures in it. In addition, memory forensics has been
sophisticated adversaries using state-of-the-art techniques like evolving slowly, until recently, with free tools limited to
sending spoofed emails from/to legitimate user email ad- particular Operating System (OS) versions and currently most
dresses. Email Spoofing [1] is a technique that involves tools are targeted on Windows OS RAM. Nevertheless, in
forging of the email source such that the email appears recent years, researches have contributed large volume of
to have come from some other source. Email spoofing is work to this domain of memory forensics like detecting
generally used by adversaries in phishing attacks [2] in order Advanced Persistent Threat (APT) Trojan proposed by Wang
to gain the trust of the target that the received email is from a and Xu [9], discovering kernel mode rootkits described by
legitimate source and making them open the malicious email Korkin et al. [10] and extracting user credentials of popular
document. However, the source information in email header Web applications presented by Joseph et al. [11].
of a spoofed email is different from that of a genuine email C. Using Memory Forensics for Email Spoofing
and this difference between the email headers of a spoofed Any process or action on a computer, like network con-
email and a legitimate email serves as a critical evidence for nections, unencrypted file contents, cryptographic keys and
identifying email spoofing attacks. passwords, resides in the primary memory for its execution
Several approaches have been proposed in the past to and thus leaves evidence therein [8]. All this wealth of
address the issue of email spoofing like anti-spoofing applica- crucial information can be used to track the adversary. The
tion using Secure Socket Layer (SSL) protocol proposed by significance of memory forensics can also be applied in
Mooloo et al. [1], identifying the authentic owner of forged the sphere of email forensics to detect malicious or spam
email address presented by Hanumanthappa et al. [3] and emails. Whenever an email transaction occurs, all email-
978-1-5386-0683-4/17/$31.00 ©2017 IEEE related information gets stored in the memory (RAM) of the
Authorized licensed use limited to: Glyndwr University. Downloaded on October 23,2020 at 21:50:32 UTC from IEEE Xplore. Restrictions apply.
2017 IEEE Conference on Communications and Network Security (CNS): The Network Forensics Workshop
user’s machine. And spoofed emails are no exceptions. The our approach and the flow of operations involved in the
email header and body details get etched in dynamic memory entire process. Section IV elucidates implementation of our
and even if the adversary tries to delete all the evidence scheme with experiments and results, along with performance
pertaining to the spoofing attack like clearing browsing data analysis. Finally, in section V we conclude and shed light on
or deleting the messages from inbox or sent folders, the some potential future works in this direction.
information required for forensics is still safe in the primary
memory of the target machine. II. RELATED WORK
In this paper, we present an approach for detecting spoofing A large volume of work has been undertaken in the past
attacks in received and replied emails, based on the technique to address email spoofing, which is mainly based on network
of memory forensics. The basic procedure behind our scheme forensics. In network forensics based methods, the email
is as follows. Whenever the client opens his email inbox, all headers are extracted from the network traffic and analyzed
email related data is loaded in the client computer’s main to identify spoofed emails [13]. The email headers usually
memory in the form of email headers. The main memory contain crucial information, such as source and destination
dump is acquired and email related data is gathered from the email addresses, evidence of the path traversed by the email
dump. Then the retrieved email data, more specifically email on its journey from source host to receiver host, date and
headers, from the target machine is matched against the email time the message was sent, etc.
header pattern of a genuine email, and any anomalies in this The network forensics defense mechanisms against email
process might possibly indicate a spoofed email. spoofing can be classified as follows:
The entire process runs on a scheduled basis on the client Network Level Defense It typically involves blocking a
computer. To demonstrate the feasibility of our approach, we group of domains or a range of Internet Protocol (IP)
conducted experiments in which spoofed emails were sent addresses to protect the network from systems that
from authentic email addresses to the client via websites commonly deliver spoofed malicious emails [23][24].
that offer such services. The client can reply to the received However, these mechanisms do not focus on the content
spoofed emails, in which case the replied email is received by of the message.
the legitimate owner of the spoofed email address. Genuine Authentication This usually involves checking the path of
emails were also sent and replied to test for false positives. an email to ensure that its domain name has not been
We observe that our implementation stores details of spoofed spoofed by attacker [3][7][25][23]. To accomplish this,
emails in received and replied logs respectively depending on most email servers are equipped with prominent security
whether the client received or replied to the spoofed email, technologies such as Microsoft’s Sender ID and Yahoo’s
while preventing false positives. Hence, log files created by Domain Key. Nevertheless, for a successful email au-
our approach can be utilized by cyber crime investigators to thentication mechanism, both the sender and the receiver
identify email spoofing attacks. mail servers must apply the same technology.
Client Side Defense These protection mechanisms enable
D. Paper Contributions
users to identify spoofed emails so that even when the
To the best of our knowledge, this is the first paper server crashes or is temporarily down, the user is not
that performs volatile memory forensics to not only detect vulnerable to spoofing attacks [1][26]. Usually these
spoofed emails but also identify if the client has replied to mechanisms are based on the white-listing technique to
a received spoofed email. The advantage of using memory differentiate legitimate emails from spoofed emails. As
forensics to detect spoofed emails is that this technique a result, these methods suffer from high false positives.
guarantees non-repudiation [12], that is, the client cannot The main limitation of employing network forensics to
deny receiving or replying to spoofed email. Furthermore, detect email spoofing is that it is almost impossible to capture
all email data including the message, which are otherwise all traffic that pass through a network [27]. For example, most
transmitted in encrypted form over the network, are loaded Intrusion Detection Systems (IDS) do not capture normal
as plain text in RAM. Our key contributions in this paper port 80 traffic. Moreover, prior work focused on identifying
are: spoofing attacks in emails received by the client. Our work
• Design an approach to detect email spoofing based on aims to overcome these shortcomings by using memory
analysis of volatile memory dump and store details forensics for identifying spoofing attack in both received
of detected spoofed emails, received or replied by the and replied emails. The advantage of employing memory
client, in received and replied log files respectively. forensics technique for detecting spoofed emails is that it
• Demonstrate the practicality of our scheme by sending guarantees non-repudiation [12], that is, the user cannot
spoofed emails via websites offering such services. deny receiving or replying to spoofed email, since every
action performed on the user’s computer is recorded in the
E. Paper Organization system’s physical memory, including email communications.
The paper is structured as follows. Section II discusses Furthermore, all email data, including the message, are loaded
related work in the field of email spoofing and memory as plain text in RAM, which are otherwise transmitted
forensics and how our approach is novel compared to prior in encrypted form over the network. In addition, memory
works. In section III, we give a detailed explanation of forensics provides enough control to detect spoofed emails
620
Authorized licensed use limited to: Glyndwr University. Downloaded on October 23,2020 at 21:50:32 UTC from IEEE Xplore. Restrictions apply.
2017 IEEE Conference on Communications and Network Security (CNS): The Network Forensics Workshop
since email headers can be accessed from memory of the system fingerprinting, Directory Table Base identification and
client machine instead of network, which employs https, and obtaining kernel objects. In addition, Case and Richard III
hence there is no need to have access to third-party email [22] focused on memory forensics techniques for detecting
service providers. userland malware on Mac OS X.
Compared to prior works that utilize primary memory
Memory forensics is an evolving and promising area of forensics to gather different types of critical information, the
research. Xu and Wang [14] presented a technique for the goal of our work is to discover spoofing attack in emails
retrieval of system logged-in passwords from the physical received and replied by the client through volatile memory
memory of Windows XP and Windows 7. In addition, analysis of Windows OS, as depicted in table I.
Graziano et al. [15] demonstrated a set of approaches for
analyzing hypervisors and virtual machines by utilizing mem-
III. PROPOSED WORK
ory forensics. Subsequently, Guangqi et al. [16] proposed
an algorithm for memory forensics on virtual machines We propose a scheme that utilizes memory forensics to
comprising of process search, memory dump and memory detect spoofed emails. The goal of this work is twofold.
analysis. Further, Joseph et al. [11] proposed methodology First, our approach detects if any received email is a spoofed
that examines Windows system’s physical memory dump email when the client opens his email inbox. Second, our
for extracting information about Internet activity and re- scheme detects if the client replied to any spoofed email.
trieving usernames and passwords of Web applications like The following subsections describe the procedure followed
mail accounts. Interestingly, Chen and Li [17] presented to accomplish these tasks.
a technique for recovering picture data from the memory
dump. Subsequently, Saltaformaggio et al. [18] presented a A. Extracting Email Related Data From Memory
memory forensics technique called Visual Content Recovery
(VCR) that retrieves all photographic evidence generated 1) Capturing Live Memory Using Mandiant’s Memoryze:
by an Android device’s cameras. Furthermore, Korkin and We used Mandiant’s Memoryze [28] for acquiring live mem-
Nesterov [10] described a new memory forensic system for ory images. A significant advantage of using Memoryze
detection of kernel mode rootkits. Following that, Wang and is that it can be used via the command-line for acquiring
Xu [9] applied memory forensics techniques to identify traces memory images and also provides the flexibility of specifying
of APT Trojan in the memory image. Moreover, Huang et the destination folder for storing the acquired memory im-
al. [19] proposed a technology utilizing memory forensics ages. However, running the tool requires Administrator-level
in Windows OS to gather key evidence in Skype and Face- command prompt because only then Memoryze can load a
book Messenger communications. Subsequently, Chen and kernel-level driver for getting access to raw memory.
Mao [20] focused on discovering email-related information 2) Extracting UNICODE & ASCII Strings Using Strings
by analyzing the volatile memory of the Android mobile Tool: We used Strings v2.53 [29] by Mark Russinovich to
phone. Interestingly, Lee et al. [21] suggested an algorithm retrieve UNICODE and ASCII strings with a length of three
for analyzing the compromised memory while guaranteeing or more characters from the captured memory dump and
all the three bootstrapping steps, comprising of operating redirected the output to a strings file.
621
Authorized licensed use limited to: Glyndwr University. Downloaded on October 23,2020 at 21:50:32 UTC from IEEE Xplore. Restrictions apply.
2017 IEEE Conference on Communications and Network Security (CNS): The Network Forensics Workshop
3) Filtering Email Related Data: The contents of the Algorithm Detecting Spoofing in Replied Emails
strings file contain information that are irrelevant to emails. EmailHeadersList ← read(headers f ile)
So email headers were filtered from the strings file and saved for each header ∈ EmailHeadersList do
in a headers file. f rom ← getF romAddress(header)
to ← getT oAddress(header)
B. Algorithm For Detecting Spoofed Emails subject ← getSubject(header)
The spoofed emails should be detected accurately such that inReplyT o ← getinReplyT o(header)
they are distinguished from genuine emails to prevent false
positives. The basic idea is to compare the domain portion toDom ← getDomain(to)
of from: and messageId fields of email headers to detect inReplyT oDom ← getDomain(inReplyT o)
spoofing attack in received emails and record the details of
spoofed emails in the received log, and comparing the domain cmp ← isComparable(toDom, inReplyT oDom)
portion of to: and inReplyTo email header fields to identify if if cmp = F ALSE then
the client has replied to any spoofed email and save the details header.isSpoof ed ← T RU E
of spoofed emails in the replied log. More specifically, each Log ← write(f rom, to, subject, inReplyT o)
entry in the log file contains the from address, to address, end if
subject, messageId or inReplyTo Id of the spoofed email, and end for
the time the entry was registered in the log.
The following algorithms describe detecting spoofing at-
tack in received and replied emails respectively. These algo-
rithms are implemented in Perl 5, version 12, subversion 3
(v5.12.3).
622
Authorized licensed use limited to: Glyndwr University. Downloaded on October 23,2020 at 21:50:32 UTC from IEEE Xplore. Restrictions apply.
2017 IEEE Conference on Communications and Network Security (CNS): The Network Forensics Workshop
TABLE II: Some Email Header Fields TABLE III: Specifications of the client computer
Field Definition OS Windows 10
From Persons responsible for the email message Processor Intel(R) Core(TM) i7-6700HQ CPU @ 2.60GHz
cc cc=Carbon Copy. Secondary, informational 2.59 GHz
recipients RAM 12.0 GB (11.9 GB usable)
bcc bcc=Blind Carbon Copy. Recipients not to System type 64-bit Operating System, x64-based processor
be disclosed to other recipients
To Primary recipients
Subject Title or heading of the email message
MessageId Unique ID of the email message the basis of our analysis for detecting email spoofing attacks,
inReplyTo Reference to email message for which this
email is a reply to is honest and has not been modified by any malicious activity.
B. Experimental Setup
We implemented our scheme on client machine, with the
specifications given in table III, to detect spoofing attacks
in both received and replied emails. To evaluate our imple-
mentation, spoofed emails were sent from legitimate email
addresses to the client machine from websites providing
services to send spoofed emails, and the client replies to
received spoofed emails. Also, genuine emails were sent
and replied to test if our technique accurately distinguishes
spoofed emails from genuine emails.
Spoofed emails were sent from three websites
namely Emkei’s Fake Mailer (https://emkei.cz),
Anonymailer (http://anonymailer.net/ ) and sharpmail
(http://www.sharpmail.co.uk/ ). For all the three websites,
Fig. 2: Example of an email header as captured from the
we used the following fields to send spoofed emails - From
memory of client computer
email address, To email address, Subject, Body or message,
and attachments. The client receives the email, sent from
acquired memory dump is automated. The Mandiant’s Mem- each of the three above mentioned websites, like any other
oryze software is run on the client’s computer to acquire genuine email that he can access through his inbox. When
the live memory and store the captured memory image on the client replies to the spoofed emails, it is received by
the secondary storage of the machine. Then we run the the innocent user whose email address was forged in the
Strings tool on this just captured memory dump to extract spoofing attack. Genuine emails were sent from various
all the UNICODE and ASCII strings of length three or more email service providers to ensure that our implementation
characters and store the extracted strings in strings file in prevents false positives.
the same directory as the memory dump. Subsequently, all C. Results and Analysis
the email data is filtered from the strings file and outputted
This section elucidates the time analysis and other pro-
to headers file, which is stored in the same directory as the
cessing overheads of the proposed approach when run on
memory dump and the strings file. Figure 2 shows a typical
the client computer with specifications given in table III.
email header. The next step involves correctly identifying
The scheme takes approximately 12 minutes for the entire
spoofed emails by scanning the headers file and registering
process from acquiring memory image of the client machine
their details in the logs, while distinguishing genuine emails
to registering detected spoofed emails in appropriate log files.
from spoofed ones to prevent false positives. Previous subsec-
The Memoryze software takes approximately two and a half
tion gives such an algorithm for identifying spoofed emails.
minutes to complete execution and consumes approximately
IV. IMPLEMENTATION AND RESULTS 6% of CPU, 2 MB of memory and 82 MB/s of disk. The
Our scheme, deployed on the client machine, runs on Strings tool takes approximately seven and a half minutes
a scheduled basis to identify whether the client received consuming nearly 1 MB of memory, 25 MB/s of disk and
any spoofed emails and also detect if the client replied to utilizes about 15% of processor. Finally the QGREP Utility,
any received spoofed emails, while preventing false positives which is filtering email related data followed by execution
by correctly distinguishing spoofed emails from genuine of the Perl script for detecting spoofed emails, takes ap-
emails. In the following subsections we describe details of proximately ten seconds and utilizes about 5% of CPU and
the experiments we conducted to demonstrate the deployment consumes around 1 MB of memory and 46 MB/s of disk.
of our scheme for detecting spoofed emails. The performance evaluation of our scheme is enumerated in
table IV.
A. Assumptions The performance evaluation discussed above is particular
While performing our experiments, we assume that the to the machine with specifications given in table III. As a
memory dump acquired from the client machine, which is result, a client machine with lower RAM will take lesser time
623
Authorized licensed use limited to: Glyndwr University. Downloaded on October 23,2020 at 21:50:32 UTC from IEEE Xplore. Restrictions apply.
2017 IEEE Conference on Communications and Network Security (CNS): The Network Forensics Workshop
Fig. 4: Received log file contains details of spoofed emails received by the client
to execute. For example, we implemented our scheme on a the email O2 for oxygen is stored in the replied log, whereas
machine with 4 GB RAM having 32-bit Pentium Dual-Core the email P for parrot is not, when the client replies to both
processor, and it took approximately 5 minutes for overall the spoofed email (O2 for oxygen) and the genuine email (P
execution. for parrot), as manifested in figure 6.
To verify if our scheme accurately identifies spoofing
TABLE IV: Performance analysis
attacks in both received and replied emails while preventing
Process Memory(MB) Disk(MB/s) CPU(%) Time(mm:ss) false positives, we sent seventy spoofed emails from the
Memoryze 1.9 82.1 6.0 2:30 spoofing website emkei.cz and seventy genuine emails to
Strings 0.9 24.7 14.6 7:30
QGREP Utility 0.6 45.6 5.1 00:10 the client machine. The client replied to all the received
Total time taken (mm:ss) = 12:10. emails. Both spoofed and genuine emails were sent from
seven email service providers, that is ten spoofed and ten
Figure 3 shows the difference in the email headers be- genuine emails were sent from each email service provider
tween a spoofed email and a genuine email when a spoofed since the performance did not change after ten emails. Table
email with subject O2 for oxygen and a genuine email with V demonstrates the results along with accuracy of detecting
subject P for parrot are sent from the gmail address bful- spoofing in both received and replied emails. None of the
[email protected] to the client whose email address genuine email was registered in the log files indicating that
is pi.95 [email protected]. Hence details of the email with our scheme prevents false positives.
subject O2 for oxygen should be registered in the received Although all email data is logged in the memory dump, in
log file whereas the email with subject P for parrot should some cases, when our implementation has to process large
not, which is evident from figure 4. number of newly received emails in a single execution, few
If the client replies to the spoofed email O2 for oxygen, email headers are not properly filtered from the strings file
the replied email is sent to the legitimate owner of the email to the headers file. As a result, the proposed algorithm for
address [email protected]. Figure 5 demonstrates detecting spoofed emails “skips” those emails and hence they
the difference in the email headers between replying to a are not registered in the log. This issue is comparatively
spoofed email (with subject O2 for oxygen) and replying to much less in replied spoofed emails than received spoofed
a genuine email (with subject P for parrot). Hence, details of emails. Nevertheless, in the immediately next execution of
the scheme, all the spoofed emails both received and replied
are registered in the respective log files.
TABLE V: Accuracy of the proposed scheme
Email No. of No. of No. of Accuracy V. CONCLUSION AND FUTURE WORK
Service Spoofed Received Replied
Provider Emails Sent Spoofed Spoofed The advantage of using memory forensics for email spoof-
Emails Emails
Detected Detected ing is that it guarantees non-repudiation, that is, the user
rediffmail.com 10 10 10 100% cannot deny receiving or replying to spoofed emails, since all
zoho.com 10 9 10 96.7% the actions performed on the user’s computer are etched in the
outlook.com 10 8 10 93.4%
mail.com 10 10 10 100% system’s physical memory, including email communications.
gmail.com 10 8 10 93.4% In this work, specifically, we detect if the client received
sfletter.com 10 9 9 93.4%
fastmail.com 10 9 10 96.7% any spoofed email and/or if the client replied to any spoofed
email. Our implementation is run on a scheduled basis on
624
Authorized licensed use limited to: Glyndwr University. Downloaded on October 23,2020 at 21:50:32 UTC from IEEE Xplore. Restrictions apply.
2017 IEEE Conference on Communications and Network Security (CNS): The Network Forensics Workshop
Fig. 6: Replied log file contains details of “replied to spoofed emails” by the client.
the client machine and registers details of spoofed emails, [12] Y. Kavurucu and Ö. Sever, “Hybrid non-repudiation protocol with all
detected by analyzing the memory dump, in appropriate log types of pairings,” 2016.
[13] R. Hunt and S. Zeadally, “Network forensics: an analysis of techniques,
files depending on whether the client received or replied to the tools, and trends,” IEEE Computer, vol. 45, no. 12, pp. 36–43, 2012.
spoofed email, and these log files can be used by cyber crime [14] L. Xu and L. Wang, “Research on extracting system logged-in pass-
word forensically from windows memory image file,” in The 9th IEEE
investigators. Performance analysis indicates that our scheme International Conference on Computational Intelligence and Security
takes around 12 minutes to accurately detect spoofed emails, (CIS), 2013, pp. 716–720.
sent from websites offering such services, while preventing [15] M. Graziano, A. Lanzi, and D. Balzarotti, “Hypervisor memory foren-
sics,” in International Workshop on Recent Advances in Intrusion
false positives, consuming system resources judiciously, and Detection, 2013, pp. 21–40.
without interrupting with normal functioning of the client [16] L. Guangqi, W. Lianhai, Z. Shuhui, X. Shujiang, and Z. Lei, “Memory
computer. dump and forensic analysis based on virtual machine,” in International
Conference on Mechatronics and Automation (ICMA), 2014, pp. 1773–
An interesting future work in this direction is to optimize 1777.
the scheme developed in this paper such that it takes lesser [17] L. Chen and Y. H. Li, “A method of extracting picture in memory,” in
time to execute while requiring minimum overhead on the Applied Mechanics and Materials, vol. 556, 2014, pp. 5186–5189.
[18] B. Saltaformaggio, R. Bhatia, Z. Gu, X. Zhang, and D. Xu, “Vcr:
system’s resources. Also, our approach does not find if any App-agnostic recovery of photographic evidence from android device
spoofed email has been sent by a malicious client from a memory images,” in The 22nd ACM SIGSAC Conference on Computer
spoofing website; we aim to address this issue in future. and Communications Security, 2015, pp. 146–157.
[19] C.-T. Huang, Y.-T. Chang, and S.-J. Wang, “Evidence revelations
R EFERENCES at memory forensics in conversations of instant messages,” Forensic
Science Journal, vol. 14, no. 1, pp. 59–67, 2015.
[1] D. Mooloo and T. P. Fowdur, “An ssl-based client-oriented anti- [20] L. Chen and Y. Mao, “Forensic analysis of email on android volatile
spoofing email application,” in 2013 Africon, Sept 2013, pp. 1–5. memory,” in Trustcom/BigDataSE/I SPA, 2016, pp. 945–951.
[2] G. Varshney, M. Misra, and P. K. Atrey, “A survey and classification [21] K. Lee, H. Hwang, K. Kim, and B. Noh, “Robust bootstrapping
of web phishing detection schemes,” Wiley Journal of Security and memory analysis against anti-forensics,” Elsevier Journal of Digital
Communication Networks, 2016. Investigation, vol. 18, pp. S23–S32, 2016.
[3] M. Kumar, M. Hanumanthappa, and T. S. Kumar, “A countermeasure [22] “Detecting objective-c malware through memory forensics,” Elsevier
technique for email-spoofing,” International Journal of Advanced Re- Journal of Digital Investigation, vol. 18, pp. S3 – S10, 2016.
search in Computer Science, vol. 4, no. 2, 2013. [23] A. Almomani, B. Gupta, S. Atawneh, A. Meulenberg, and E. Al-
[4] S. Kitterman, “Sender policy framework project overview,” momani, “A survey of phishing email filtering techniques,” IEEE
http://www.openspf.org/, accessed: 2014. Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2070–2090,
[5] “DomainKeys Identified Mail (DKIM),” http://www.dkim.org/. 2013.
[6] “DMARC overview,” https://dmarc.org/overview/. [24] V. Ramanathan and H. Wechsler, “phishGILLNETphishing detection
[7] S. Gupta, E. S. Pilli, P. Mishra, S. Pundir, and R. Joshi, “Forensic methodology using probabilistic latent semantic analysis, AdaBoost,
analysis of e-mail address spoofing,” in The 5th IEEE International and co-training,” EURASIP Journal of Information Security, vol. 2012,
Conference on the Next Generation Information Technology Summit no. 1, p. 1, 2012.
(Confluence), 2014, pp. 898–904. [25] A. Jayan and S. Dija, “Detection of spoofed mails,” in IEEE Inter-
[8] K. Amari, “Techniques and tools for recovering and analyzing data national Conference on Computational Intelligence and Computing
from volatile memory,” SANS Institute InfoSec Reading Room, 2009. Research (ICCIC), 2015, pp. 1–4.
[9] L. H. Wang and Q. L. Xu, “An apt trojan detection method based on [26] T. Fowdur and L. Veerasoo, “An email application with active spoof
memory forensics techniques,” Applied Mechanics and Materials, vol. monitoring and control,” in IEEE International Conference on Com-
701, p. 927, 2014. puter Communication and Informatics (ICCCI), 2016, pp. 1–6.
[10] I. Korkin and I. Nesterov, “Applying memory forensics to rootkit [27] A. Xrysanthou and I. Apostolakis, “Network forensics: Problems and
detection,” arXiv preprint arXiv:1506.04129, 2015. solutions,” in E-Democracy: Challenges of the Digital Era, 2006, pp.
[11] N. Joseph, S. Sunny, S. Dija, and K. Thomas, “Volatile internet 307–318.
evidence extraction from windows systems,” in International Confer- [28] “Memoryze,” https://www.fireeye.com/services/freeware/memoryze.html.
ence on Computational Intelligence and Computing Research (ICCIC), [29] Microsoft TechNet, “Windows sysinternals strings v2.53,”
2014, pp. 1–5. https://technet.microsoft.com/en-us/sysinternals/strings.aspx, accessed:
2017.
625
Authorized licensed use limited to: Glyndwr University. Downloaded on October 23,2020 at 21:50:32 UTC from IEEE Xplore. Restrictions apply.