Detecting Compromised Email Accounts from the Perspective of Graph Topology
Title | Detecting Compromised Email Accounts from the Perspective of Graph Topology |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Hu, Xuan, Li, Banghuai, Zhang, Yang, Zhou, Changling, Ma, Hao |
Conference Name | Proceedings of the 11th International Conference on Future Internet Technologies |
Date Published | June 2016 |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4181-3 |
Keywords | adaptive filtering, Compromised Accounts Detection, Human Behavior, Metrics, pubcrawl, Scalability, social network analysis, spam detection, spam filtering |
Abstract | While email plays a growingly important role on the Internet, we are faced with more severe challenges brought by compromised email accounts, especially for the administrators of institutional email service providers. Inspired by the previous experience on spam filtering and compromised accounts detection, we propose several criteria, like Success Outdegree Proportion, Reverse Pagerank, Recipient Clustering Coefficient and Legitimate Recipient Proportion, for compromised email accounts detection from the perspective of graph topology in this paper. Specifically, several widely used social network analysis metrics are used and adapted according to the characteristics of mail log analysis. We evaluate our methods on a dataset constructed by mining the one month (30 days) mail log from an university with 118,617 local users and 11,460,399 mail log entries. The experimental results demonstrate that our methods achieve very positive performance, and we also prove that these methods can be efficiently applied on even larger datasets. |
URL | http://doi.acm.org/10.1145/2935663.2935672 |
DOI | 10.1145/2935663.2935672 |
Citation Key | hu_detecting_2016 |