2003
DOI: 10.1007/978-3-540-45215-7_5
|View full text |Cite
|
Sign up to set email alerts
|

A Behavior-Based Approach to Securing Email Systems

Abstract: The Malicious Email Tracking (MET) system, reported in a prior publication, is a behavior-based security system for email services. The Email Mining Toolkit (EMT) presented in this paper is an offline email archive data mining analysis system that is designed to assist computing models of malicious email behavior for deployment in an online MET system. EMT includes a variety of behavior models for email attachments, user accounts and groups of accounts. Each model computed is used to detect anomalous and erran… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2006
2006
2017
2017

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 32 publications
(15 citation statements)
references
References 10 publications
0
15
0
Order By: Relevance
“…Outlier detection is the task of identifying anomalous data and is a widely used paradigm in fault detection [40], intrusion detection [23], and virus detection [33,34]. We find the smallest region that contains some fixed percentage of the observed data, which is called the support of the data's distribution.…”
Section: Theoretical Resultsmentioning
confidence: 99%
“…Outlier detection is the task of identifying anomalous data and is a widely used paradigm in fault detection [40], intrusion detection [23], and virus detection [33,34]. We find the smallest region that contains some fixed percentage of the observed data, which is called the support of the data's distribution.…”
Section: Theoretical Resultsmentioning
confidence: 99%
“…In [64], the authors highlight the requirements and challenges facing user modeling systems, such as dataset labeling and computational complexity, and summarize the existing user modeling approaches. Stolfo et al [59] propose a histogram-based method for modeling the behavior of users' email accounts. Histograms are compared to find similar and abnormal behaviors in the same user's account.…”
Section: Related Workmentioning
confidence: 99%
“…In most work on user profile construction, such as [64,13,59,71,33], behavior-based profiles are built using machine learning and data mining techniques. In [64], the authors highlight the requirements and challenges facing user modeling systems, such as dataset labeling and computational complexity, and summarize the existing user modeling approaches.…”
Section: Related Workmentioning
confidence: 99%
“…In particular, a lot of research has been done in vocabulary analysis and profiling of plain text [25,32,33], emails [54,61] and source code [51,19,14]. Written text or spoken word, once transcribed, can be analyzed in terms of vocabulary and style to determine its authorship.…”
Section: Behavioral Authenticationmentioning
confidence: 99%