While email plays a growingly important role on the In-ternet, we are faced with more severe challenges brought by compromised email accounts, especially for the admin-istrators of institutional email service providers. Inspired by the previous experience on spam filtering and compro-mised accounts detection, we propose several criteria, like Success Outdegree Proportion, Reverse Pagerank, Recipient Clustering Coefficient and Legitimate Recipient Proportion, for compromised email accounts detection from the perspective of graph topology in this paper. Specifically, several widely used social network analysis metrics are used and adapted according to the characteristics of mail log analy-sis. We evaluate our methods on a dataset constructed ...
The Malicious Email Tracking (MET) system, reported in a prior publication, is a behavior-based secu...
Identifying unsolicited email based on their network-level behavior rather than their content have r...
The massive increase of spam is posing a very serious threat to email which has become an important ...
In this paper we present an anomaly detection method that detects abnormal patterns in network-level...
Abstract The illegal use of compromised email accounts by adversaries can have severe consequences f...
Email addresses extracted from secondary storage devices are important to a forensic analyst when co...
Email is a pervasive means of communication on the Internet. Email exchanges between individuals can...
Spam mitigation strategies that aim at detecting spam on the network level, should classify email se...
As Online Social Networks (OSNs) continue to grow in popularity, a spam marketplace has emerged that...
As Online Social Networks (OSNs) continue to grow in popularity, a spam marketplace has emerged that...
Sharing and storing of data in the web world is with the help of social networks. Messages are excha...
As Online Social Networks (OSNs) continue to grow in popularity, a spam marketplace has emerged that...
E-mail is probably the most popular application on the Internet, with everyday busi-ness and persona...
Identifying unsolicited email based on their network-level behavior rather than their content have r...
Abstract. Community detection algorithms are widely used to study the structural properties of real-...
The Malicious Email Tracking (MET) system, reported in a prior publication, is a behavior-based secu...
Identifying unsolicited email based on their network-level behavior rather than their content have r...
The massive increase of spam is posing a very serious threat to email which has become an important ...
In this paper we present an anomaly detection method that detects abnormal patterns in network-level...
Abstract The illegal use of compromised email accounts by adversaries can have severe consequences f...
Email addresses extracted from secondary storage devices are important to a forensic analyst when co...
Email is a pervasive means of communication on the Internet. Email exchanges between individuals can...
Spam mitigation strategies that aim at detecting spam on the network level, should classify email se...
As Online Social Networks (OSNs) continue to grow in popularity, a spam marketplace has emerged that...
As Online Social Networks (OSNs) continue to grow in popularity, a spam marketplace has emerged that...
Sharing and storing of data in the web world is with the help of social networks. Messages are excha...
As Online Social Networks (OSNs) continue to grow in popularity, a spam marketplace has emerged that...
E-mail is probably the most popular application on the Internet, with everyday busi-ness and persona...
Identifying unsolicited email based on their network-level behavior rather than their content have r...
Abstract. Community detection algorithms are widely used to study the structural properties of real-...
The Malicious Email Tracking (MET) system, reported in a prior publication, is a behavior-based secu...
Identifying unsolicited email based on their network-level behavior rather than their content have r...
The massive increase of spam is posing a very serious threat to email which has become an important ...