Visible to the public Biblio

Filters: Keyword is Compromised Accounts Detection  [Clear All Filters]
2017-09-19
Hu, Xuan, Li, Banghuai, Zhang, Yang, Zhou, Changling, Ma, Hao.  2016.  Detecting Compromised Email Accounts from the Perspective of Graph Topology. Proceedings of the 11th International Conference on Future Internet Technologies. :76–82.

While email plays a growingly important role on the Internet, we are faced with more severe challenges brought by compromised email accounts, especially for the administrators of institutional email service providers. Inspired by the previous experience on spam filtering and compromised accounts detection, we propose several criteria, like Success Outdegree Proportion, Reverse Pagerank, Recipient Clustering Coefficient and Legitimate Recipient Proportion, for compromised email accounts detection from the perspective of graph topology in this paper. Specifically, several widely used social network analysis metrics are used and adapted according to the characteristics of mail log analysis. We evaluate our methods on a dataset constructed by mining the one month (30 days) mail log from an university with 118,617 local users and 11,460,399 mail log entries. The experimental results demonstrate that our methods achieve very positive performance, and we also prove that these methods can be efficiently applied on even larger datasets.