In this paper we present an anomaly detection method that detects abnormal patterns in network-level communication patterns of email traffic. We show that these anomalies are caused by the excessive amount of unsolicited email (spam) traffic. The deviation in network-level behavior of spam from the normal communication patterns of legitimate email (ham) can be revealed by structural analysis of email networks generated from real email traffic. We derive a time series of distributions based on the structural properties of email networks and spot the anomalies by comparing the feature distributions of current email traffic against baseline distributions generated from legitimate email traffic. Our experimental results on SMTP traffic captured...
Spam is increasingly a core problem affecting network security and performance. Indeed, it has been ...
Spam is no longer just commercial unsolicited email messages that waste our time, it consumes networ...
Abstract. Community detection algorithms are widely used to study the structural properties of real-...
Email is a pervasive means of communication on the Internet. Email exchanges between individuals can...
Identifying unsolicited email based on their network-level behavior rather than their content have r...
Identifying unsolicited email based on their network-levelbehavior rather than their content have re...
Identifying unsolicited email based on their network-level behavior rather than their content have r...
In this paper we present a large-scale measurement study and analysis of e-mail traffic collected on...
In this paper we present a large-scale measurement study and analysis of e-mail traffic collected on...
E-mail is probably the most popular application on the Internet, with everyday busi-ness and persona...
Spam mitigation strategies that aim at detecting spam on the network level, should classify email se...
E-mail is probably the most popular application on the Internet, with everyday busi- ness and person...
While email plays a growingly important role on the In-ternet, we are faced with more severe challen...
Abstract: Spam has become an important problem for computer security because it is a channel for the...
Abstract. Spam is increasingly a core problem affecting network security and performance. Indeed, it...
Spam is increasingly a core problem affecting network security and performance. Indeed, it has been ...
Spam is no longer just commercial unsolicited email messages that waste our time, it consumes networ...
Abstract. Community detection algorithms are widely used to study the structural properties of real-...
Email is a pervasive means of communication on the Internet. Email exchanges between individuals can...
Identifying unsolicited email based on their network-level behavior rather than their content have r...
Identifying unsolicited email based on their network-levelbehavior rather than their content have re...
Identifying unsolicited email based on their network-level behavior rather than their content have r...
In this paper we present a large-scale measurement study and analysis of e-mail traffic collected on...
In this paper we present a large-scale measurement study and analysis of e-mail traffic collected on...
E-mail is probably the most popular application on the Internet, with everyday busi-ness and persona...
Spam mitigation strategies that aim at detecting spam on the network level, should classify email se...
E-mail is probably the most popular application on the Internet, with everyday busi- ness and person...
While email plays a growingly important role on the In-ternet, we are faced with more severe challen...
Abstract: Spam has become an important problem for computer security because it is a channel for the...
Abstract. Spam is increasingly a core problem affecting network security and performance. Indeed, it...
Spam is increasingly a core problem affecting network security and performance. Indeed, it has been ...
Spam is no longer just commercial unsolicited email messages that waste our time, it consumes networ...
Abstract. Community detection algorithms are widely used to study the structural properties of real-...