The Email Mining Toolkit (EMT) is a data mining system that computes behavior profiles or models of user email accounts. These models may be used for a variety of forensic analyses and detection tasks. In this paper we focus on the application of these models to detect the early onset of a viral propagation without "contentbased" (or signature-based) analysis in common use in virus scanners. We present several experiments using real email from 15 users with injected simulated viral emails and describe how the combination of different behavior models improves overall detection rates. The performance results vary depending upon parameter settings, approaching 99 % true positive(TP) (percentage of viral emails caught) in gene...
Previous work [1] reported on our research in developing a data mining environment for analyzing ema...
Due to the critical security threats imposed by email-based malware in recent years, modeling the pr...
Due to the critical security threats imposed by email-based malware in recent years, modeling the pr...
The Email Mining Toolkit (EMT) is a data mining system that computes behavior profiles or models of ...
We introduce the Email Mining Toolkit (EMT), a system that implements behavior-based methods to imp...
We introduce the Email Mining Toolkit (EMT), a system that implements behavior-based methods to impr...
The Malicious Email Tracking (MET) system, reported in a prior publication, is a behavior-based secu...
Abstract. This paper describes the forensic and intelligence analysis capabilities of the Email Mini...
This paper describes the forensic and intelligence analysis capabilities of the Email Mining Toolkit...
The analysis of the vast storehouse of email content accumulated or produced by individual users has...
In this paper we present an anomaly detection method that detects abnormal patterns in network-level...
Computer systems continue to be at risk of attack by malicious software that are attached to email. ...
The analysis of the vast storehouse of email content accumulated or produced by individual users has...
Abstract. We present an architecture for detecting “zero-day ” worms and viruses in incoming email. ...
Due to the critical security threats imposed by email-based malware in recent years, modeling the pr...
Previous work [1] reported on our research in developing a data mining environment for analyzing ema...
Due to the critical security threats imposed by email-based malware in recent years, modeling the pr...
Due to the critical security threats imposed by email-based malware in recent years, modeling the pr...
The Email Mining Toolkit (EMT) is a data mining system that computes behavior profiles or models of ...
We introduce the Email Mining Toolkit (EMT), a system that implements behavior-based methods to imp...
We introduce the Email Mining Toolkit (EMT), a system that implements behavior-based methods to impr...
The Malicious Email Tracking (MET) system, reported in a prior publication, is a behavior-based secu...
Abstract. This paper describes the forensic and intelligence analysis capabilities of the Email Mini...
This paper describes the forensic and intelligence analysis capabilities of the Email Mining Toolkit...
The analysis of the vast storehouse of email content accumulated or produced by individual users has...
In this paper we present an anomaly detection method that detects abnormal patterns in network-level...
Computer systems continue to be at risk of attack by malicious software that are attached to email. ...
The analysis of the vast storehouse of email content accumulated or produced by individual users has...
Abstract. We present an architecture for detecting “zero-day ” worms and viruses in incoming email. ...
Due to the critical security threats imposed by email-based malware in recent years, modeling the pr...
Previous work [1] reported on our research in developing a data mining environment for analyzing ema...
Due to the critical security threats imposed by email-based malware in recent years, modeling the pr...
Due to the critical security threats imposed by email-based malware in recent years, modeling the pr...