publication . Conference object . Part of book or chapter of book . 2010

Email Shape Analysis

Paul Sroufe; Santi Phithakkitnukoon; Ram Dantu; João Cangussu;
Open Access English
  • Published: 01 Jan 2010
Abstract
Email has become an integral part of everyday life. Without a second thought we receive bills, bank statements, and sales promotions all to our inbox. Each email has hidden features that can be extracted. In this paper, we present a new mechanism to characterize an email without using content or context called Email Shape Analysis. We explore the applications of the email shape by carrying out a case study; botnet detection and two possible applications: spam filtering, and social-context based finger printing. Our in-depth analysis of botnet detection leads to very high accuracy of tracing templates and spam campaigns. However, when it comes to spam filtering w...
Subjects
ACM Computing Classification System: InformationSystems_INFORMATIONSYSTEMSAPPLICATIONS
free text keywords: Tracing, Email authentication, Email spoofing, Botnet, Social spam, Email address harvesting, Bag-of-words model, HTML email, World Wide Web, Computer science
Funded by
NSF| MRI: Development of a Flexible Platform for Experimental Research in Secure IP Multimedia Communication Services
Project
  • Funder: National Science Foundation (NSF)
  • Project Code: 0619871
  • Funding stream: Directorate for Computer & Information Science & Engineering | Division of Computer and Network Systems
,
NSF| CT-ER: Collaborative Research: Detecting Spam in IP Multimedia Communication Services
Project
  • Funder: National Science Foundation (NSF)
  • Project Code: 0627754
  • Funding stream: Directorate for Computer & Information Science & Engineering | Division of Computer and Network Systems
,
NSF| Colloborative Research: CRI: A Testbed for Research and Development of Secure IP Multimedia Communication Services
Project
  • Funder: National Science Foundation (NSF)
  • Project Code: 0551694
  • Funding stream: Directorate for Computer & Information Science & Engineering | Division of Computer and Network Systems
Download fromView all 2 versions
http://oro.open.ac.uk/35095/1/...
Part of book or chapter of book
Provider: UnpayWall
http://www.springerlink.com/in...
Part of book or chapter of book
Provider: Crossref
16 references, page 1 of 2

1. A. Ramachandran and N. Feamster, \Understanding the network-level behavior of spammers," in SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications. New York, NY, USA: ACM, 2006, pp. 291{302. [OpenAIRE]

2. W. T. Strayer, D. Lapsley, R. Walsh, and C. Livadas, \Botnet detection based on network behavior," in Botnet Detection: Countering the Largest Security Threat, W. Lee, C. Wang, and D. Dagon, Eds. Springer-Verlag, 2007. [OpenAIRE]

3. A. Ramachandran, N. Feamster, and D. Dagon, \Detecting botnet membership with dnsbl counterintelligence." in Botnet Detection, ser. Advances in Information Security, W. Lee, C. Wang, and D. Dagon, Eds. Springer, 2008, vol. 36, pp. 131{142.

4. S. Sinclair, \Adapting bayesian statistical spam ¯lters to the server side," J. Comput. Small Coll., vol. 19, no. 5, pp. 344{346, 2004.

5. G. V. Cormack, \Email spam ¯ltering: A systematic review," Found. Trends Inf. Retr., vol. 1, no. 4, pp. 335{455, 2007.

6. G. V. Cormack, J. M. Go¶mez Hidalgo, and E. P. S¶anz, \Spam ¯ltering for short messages," in CIKM '07: Proceedings of the sixteenth ACM conference on Conference on information and knowledge management. New York, NY, USA: ACM, 2007, pp. 313{320.

7. C.-P. Wei, H.-C. Chen, and T.-H. Cheng, \E®ective spam ¯ltering: A single-class learning and ensemble approach," Decis. Support Syst., vol. 45, no. 3, pp. 491{503, 2008.

8. E. Parzen, \On Estimation of a Probability Density Function and Mode," The Annals of Mathematical Statistics, vol. 33, no. 3, pp. 1065{1076, 1962.

9. S. J. Sheather and M. C. Jones, \A reliable data-based bandwidth selection method for kernel density estimation," Journal of the Royal Statistical Society, Series B, no. 53, pp. 683{690, 1991. [OpenAIRE]

10. M. Brownlow, \Email and webmail statistics," April 2008. [Online]. Available: fhttp://www.email-marketing-reports.com/metrics/email-statistics.htmg

11. R. Paul, \Researchers track Ron Paul spam back to Reactor botnet," December 2007. [Online]. Available: fhttp://www.marshal8e6.com/trace/i/ Template-Based-Spam,trace.996».aspg

12. J. Stewart, \Top Spam Botnets Exposed," April 2008. [Online]. Available: fhttp: //www.secureworks.com/research/threats/topbotnets/?threat=topbotnetsg

13. TRACElabs, \Template Based Spam," May 2009. [Online]. Available: fhttp: //www.marshal8e6.com/trace/i/Template-Based-Spam,trace.996».aspg

14. L. L. Cam and G. L. Yang, Asymptotics in Statistics: Some Basic Concepts. Springer-Verlag, 2000.

15. G. V. Cormack and T. R. Lynam, \TREC 2007 Public Corpus," 2007. [Online]. Available: fhttp://plg.uwaterloo.ca/»gvcormac/treccorpus07/about.htmlg

16 references, page 1 of 2
Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue