
DOI:
https://doi.org/10.14483/23448393.20626Published:
2023-10-19Issue:
Vol. 28 No. 3 (2023): September-DecemberSection:
Systems EngineeringApplication of Regular Grammar in the Syntactic Analysis of Email Addresses
Aplicación de gramática regular en el análisis sintáctico de direcciones de correo electrónico
Keywords:
email validation, formal grammar, regular expressions (en).Keywords:
validación de correos electrónicos, gramática formal, expresiones regulares (es).Downloads
Abstract (en)
Context: This article proposes the use of regular grammar as a strategy to validate the textual structures of emails. It focuses on the RFC 5321 standard and its syntax, formalizing regular grammars to apply production rules with the aim of validating the syntactic context of each structure of an email address.
Method: This article presents a literature review and the development of an email validation model. Related texts focus on the Internet Protocol, along with building automata that apply IPV4 protocol. There are three phases: the development of the model from syntax and regular grammar rules and its construction and application.
Results: The result is a functional application that validates email addresses based on regular grammars and existing regulations. When running efficiency tests, our application obtained a higher email validation margin in comparison with JFLAP. The library can work as a great analyzer of grammatical or lexical structures.
Conclusions: The email validation tool based on GR regular grammars contributes to the practical use of specialized algorithms in the field of computer science, since it is possible to apply it to the recognition of search patterns such as the analysis of lexical structures (e.g., NITs, alphanumeric codes, and valid URLs).
Abstract (es)
Contexto: En este artículo se propone el uso de la gramática regular como estrategia para validar las estructuras textuales de los correos electrónicos. El estudio se enfoca en el estándar RFC 5321 y su sintaxis, formalizando gramáticas regulares para aplicar reglas de producción en aras de validar el contexto sintáctico de cada estructura de una dirección de correo electrónico.
Método: Este artículo presenta una revisión de la literatura y el desarrollo de un modelo para la validación de correos electrónicos. Los textos relacionados se enfocan en el Protocolo de Internet junto con la construcción de autómatas que utilizan direccionamiento IPV4. El estudio tiene tres fases: el desarrollo del modelo a partir de la sintaxis y reglas gramaticales regulares y la construcción y aplicación del mismo.
Resultados: El resultado es una aplicación funcional que válida direcciones de correo electrónico con base en gramáticas regulares y la reglamentación existente. Al ejecutar pruebas de eficiencia, nuestra aplicación obtuvo un margen de validación de correos mayor en comparación con JFLAP. La librería puede funcionar como un gran analizador de estructuras gramaticales o léxicas.
Conclusiones: La herramienta de validación de correos electrónicos basada en gramáticas regulares GR contribuye al uso práctico de algoritmos especializados en la rama de la computación, dado que es posible aplicarla en el reconocimiento de patrones de búsqueda como el análisis de estructuras léxicas (e.g., NITs, códigos alfanuméricos, y URL válidas).
References
K. Dokter, F. Gadducci, B. Lion, and F. Santini, "Soft constraint automata with memory," J. Logical Alg. Meth. Programm., vol. 118, art. 100615, 2021. https://doi.org/10.1016/j.jlamp.2020.100615
T. Yamakami, "Between SC and LOGDCFL: Families of languages accepted by polynomial-time logarithmic-space deterministic auxiliary depth-k storage automata," in Computing and Combinatorics, C. Y. Chen, W. K. Hon, L. J. Hung, and C. W. Lee, Eds., Berlin, Germany: Springer, 2021, pp. 164-175. https://doi.org/10.1007/978-3-030-89543-3_14
K. Shuang, Y. Tan, Z. Cai, and Y. Sun, "Natural language modeling with syntactic structure dependency," IJ Math. Sci. Comp., vol. 523, pp. 220-233, 2020. https://doi.org/10.1016/j.ins.2020.03.022
J. Schwenk, Guide to internet Cryptography, Cham, Germany: Springer, 2022. https://doi.org/10.1007/978-3-031-19439-9
P. R. Chandra, K. Sravan, and M. S. Chakravarthy, "A new approach to the design of a finite automaton that accepts class of IPV4 addresses," IJ Math. Sci. Comp., vol. 5, no. 1, pp. 65-79, 2019. https://doi.org/10.5815/ijmsc.2019.01.06
J. Chen, V. Paxson, and J. Jiang, "Composition kills: A case study of email sender authentication," in 29th USENIX Security Symposium, 2020, pp. 2183-2199.
E. G. Vázquez and T. G. Saiz, Introduction to the theory of automata, grammars and languages, Madrid, Spain: Editorial Universitaria Ramón Areces, 2022.
A. Sharma and R. Kumar, "Imbalanced learning of regular grammar for DFA extraction from LSTM architecture,” in Soft Computing for Problem Solving, M. Thakur, S. Agnihotri, B. S. Rajpurohit, M. Pant, K. Deep, and A. K. Nagar, Eds., Berlin, Germany: Springer, 2023, pp. 85-95. https://doi.org/10.1007/978-981-19-6525-8_8
M. Novo-Lourés,. D. Ruano-Ordás, R. Pavón, R. Laza, S. Gómez-Meire, and J. R. Méndez, "Enhancing representation in the context of multiple-channel spam filtering," Inf. Processing Management, vol. 59, no. 2, art. 6, 2022. https://doi.org/10.1016/j.ipm.2021.102812
G. Howser, Computer networks and the Internet. A hands-on approach, Berlin, Germany: Springer, 2020. https://doi.org/10.1007/978-3-030-34496-2
H. Tschabitscher, "LifeWire," 2021. [Online]. Available: https://www.lifewire.com/are-email-addresses-case-sensitive-1171111
How to Cite
APA
ACM
ACS
ABNT
Chicago
Harvard
IEEE
MLA
Turabian
Vancouver
Download Citation
License
Copyright (c) 2023 Cristian Alejandro Fandiño-Mesa, Marco Javier Suárez-Barón, César Augusto Jaramillo-Acevedo

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
From the edition of the V23N3 of year 2018 forward, the Creative Commons License "Attribution-Non-Commercial - No Derivative Works " is changed to the following:
Attribution - Non-Commercial - Share the same: this license allows others to distribute, remix, retouch, and create from your work in a non-commercial way, as long as they give you credit and license their new creations under the same conditions.