Visible to the public Detecting Compromised Email Accounts from the Perspective of Graph Topology

TitleDetecting Compromised Email Accounts from the Perspective of Graph Topology
Publication TypeConference Paper
Year of Publication2016
AuthorsHu, Xuan, Li, Banghuai, Zhang, Yang, Zhou, Changling, Ma, Hao
Conference NameProceedings of the 11th International Conference on Future Internet Technologies
Date PublishedJune 2016
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4181-3
Keywordsadaptive filtering, Compromised Accounts Detection, Human Behavior, Metrics, pubcrawl, Scalability, social network analysis, spam detection, spam filtering
Abstract

While email plays a growingly important role on the Internet, we are faced with more severe challenges brought by compromised email accounts, especially for the administrators of institutional email service providers. Inspired by the previous experience on spam filtering and compromised accounts detection, we propose several criteria, like Success Outdegree Proportion, Reverse Pagerank, Recipient Clustering Coefficient and Legitimate Recipient Proportion, for compromised email accounts detection from the perspective of graph topology in this paper. Specifically, several widely used social network analysis metrics are used and adapted according to the characteristics of mail log analysis. We evaluate our methods on a dataset constructed by mining the one month (30 days) mail log from an university with 118,617 local users and 11,460,399 mail log entries. The experimental results demonstrate that our methods achieve very positive performance, and we also prove that these methods can be efficiently applied on even larger datasets.

URLhttp://doi.acm.org/10.1145/2935663.2935672
DOI10.1145/2935663.2935672
Citation Keyhu_detecting_2016