Information and Communications Technology and Policy

Information and Communications Technology and Policy

Information and Communications Technology and Policy ›› 2024, Vol. 50 ›› Issue (8): 46-54.doi: 10.12267/j.issn.2096-5931.2024.08.007

Previous Articles     Next Articles

Design and implementation of email access control gateway for abnormal behavior

ZHOU Linzhi1,2, CHEN Chen2, ZHENG Haoran2, SHI Yi1, XING Jiaming1,3, LIN Fengxu1,2   

  1. 1. Network Information Center, Beihang University, Beijing 100191, China
    2. School of Cyber Science and Technology, Beihang University, Beijing 100191, China
    3. School of Software, Beihang University, Beijing 100191, China
  • Received:2024-06-24 Online:2024-08-25 Published:2024-09-29

Abstract:

On average, university email systems face tens of thousands of brute force authentication attacks every month. Attackers will use the SMTP protocol authentication method to perform brute force authentication on email accounts of university teachers and students. Especially, it is difficult to identify and detect distributed brute force attacks and low-frequency slow brute force attacks, which is a huge threat to the resource consumption and account security of the mail server.Therefore, it is necessary to design a mail access control gateway for abnormal behavior, which can dynamically block malicious IP addresses by analyzing mail logs to capture abnormal attacks. The test results indicate that the gateway has constructed feature rules by analyzing email logs, extracting security events, and capturing abnormal behavior characteristics; based on the leaky bucket algorithm,low-frequency and distributed brute force attacking malicious IPs are captured, and dynamic blocking and lifting of malicious IPs are achieved through linkage with firewalls; designed and implemented an access control gateway and applied it to the campus network, successfully blocking 62% of attack traffic.

Key words: email gateway, access control system, log analysis, abnormal detection

CLC Number: