Optimization of Account Security Management of Campus Self-Built E-Mail System
CSTR:
Author:
  • Article
  • | |
  • Metrics
  • |
  • Reference [13]
  • |
  • Related
  • | | |
  • Comments
    Abstract:

    As a popular data carrier, E-mail is an important tool in campus daily work and study, and account stolen issues are typical threats to the E-mail security. Firstly, a systematic study on the optimal security management of Nanjing Agricultural University self-built E-mail system is carried out in this study, then potential risks, courses, and strategies are discussed. Finally, the comprehensive optimization scheme is given, especially on the discovery and handling of account stolen issues, and a novel account status monitoring method based on automated scripts is proposed in this study. Implementation indicates that the proposed scheme significantly increases both the discovery rate and handling efficiency of account stolen issues, particularly stolen cases and spam mails from domain users are explicitly reduced, meanwhile, the manpower of management is saved and the user experience is improved. It also has a certain reference value in college E-mail system management applications.

    Reference
    [1] 罗辉琼, 李瑞维. 高校电子邮件系统的优化管理. 计算机系统应用, 2015, 24(5):232-236
    [2] 王涛, 卢显良. Fast & Safe邮件系统的设计. 计算机应用研究, 2004, 21(10):238-240, 243.[doi:10.3969/j.issn.1001-3695.2004.10.085
    [3] 徐伟平, 董秀成. 安全、可靠的电子邮件服务器系统的实现. 计算机应用, 2003, 23(5):120-122
    [4] 陈建奇, 张玉清, 李学农, 等. 安全电子邮件的研究与实现. 计算机工程, 2002, 28(6):121-122, 134.[doi:10.3969/j.issn.1000-3428.2002.06.047
    [5] 杨豪璞, 邱辉, 王坤. 面向多步攻击的网络安全态势评估方法. 通信学报, 2017, 38(1):187-198.[doi:10.11959/j.issn.1000-436x.2017021
    [6] Wu Y, Li ZJ, Luo P, et al. A new anti-Spam filter based on data mining and analysis of email security. Proceedings of SPIE 5098, Data Mining and Knowledge Discovery:Theory, Tools, and Technology V. Orlando, FL, USA, 2003:147-154.[doi:10.1117/12.484894
    [7] Balakrishnan SK, Raj VPJ. Practical implementation of a secure email system using certificateless cryptography and domain name system. International Journal of Network Security, 2016, 18(1):99-107
    [8] 柏宗超, 姚健康, 孔宁. 基于DANE的电子邮件安全研究. 计算机系统应用, 2018, 27(7):71-77.[doi:10.15888/j.cnki.csa.006427
    [9] Rajamohana SP, Umamaheswari K, Abirami B. Adaptive binary flower pollination algorithm for feature selection in review spam detection. 2017 International Conference on Innovations in Green Energy and Healthcare Technologies (IGEHT). Coimbatore, India. 2017. 1-4.
    [10] Alkaht IJ, Al Khatib B. Filtering SPAM using several stages neural networks. International Review on Computers and Software, 2016, 11(2):123
    [11] Zhao SY, Xu ZW, Liu LM, et al. Towards accurate deceptive opinions detection based on word order-preserving CNN. Mathematical Problems in Engineering, 2018, 2018:2410206
    [12] 邓楚燕. 如何确保邮件信息安全. 信息安全与技术, 2014, 5(1):53-54
    [13] 尹芷仪, 江伟玉, 沈嘉荟. 一种针对暴力破解的安全口令保管库方案. 计算机应用与软件, 2017, 34(7):319-324.[doi:10.3969/j.issn.1000-386x.2017.07.059
    Related
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

王露阳,罗国富.高校自建邮件系统的账户安全管理优化研究.计算机系统应用,2019,28(12):232-237

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:May 16,2019
  • Revised:June 21,2019
  • Online: December 13,2019
  • Published: December 15,2019
Article QR Code
You are the first990989Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-3
Address:4# South Fourth Street, Zhongguancun,Haidian, Beijing,Postal Code:100190
Phone:010-62661041 Fax: Email:csa (a) iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063