2006
DOI: 10.1145/1149121.1149125
|View full text |Cite
|
Sign up to set email alerts
|

Behavior-based modeling and its application to Email analysis

Abstract: The Email Mining Toolkit (EMT) is a data mining system that computes behavior profiles or models of user email accounts. These models may be used for a multitude of tasks including forensic analyses and detection tasks of value to law enforcement and intelligence agencies, as well for as other typical tasks such as virus and spam detection. To demonstrate the power of the methods, we focus on the application of these models to detect the early onset of a viral propagation without "content-based" (or signature-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0
1

Year Published

2007
2007
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 88 publications
(37 citation statements)
references
References 19 publications
(16 reference statements)
0
36
0
1
Order By: Relevance
“…• When a system is attacked its workload may be significantly different from the normal workload [96,664,708,117]. For example, this happens with distributed denial-of-service (DDoS) attacks, and may also happen when it is infected by a computer virus.…”
Section: Modeling For Anomaly Detectionmentioning
confidence: 99%
See 3 more Smart Citations
“…• When a system is attacked its workload may be significantly different from the normal workload [96,664,708,117]. For example, this happens with distributed denial-of-service (DDoS) attacks, and may also happen when it is infected by a computer virus.…”
Section: Modeling For Anomaly Detectionmentioning
confidence: 99%
“…An alternative is to devise several independent tests for abnormality and use them together. In the context of virus spreading by email, these tests can include user cliques (the sets of users that typically communicate with each other), the relative popularity of different users (not all users receive the same amount of email), and the rates at which emails are sent (again different users have different profiles) [664]. If several of these change, virus activity may be suspected.…”
Section: Modeling For Anomaly Detectionmentioning
confidence: 99%
See 2 more Smart Citations
“…Intrusion Detection System (IDS) is a mature technology that detects intrusion by monitoring activities in several aspects of the network or operating systems, piecing scattered information together for some insights [1]. Likewise, emails could be traced and related to the user profiles for modeling behavior [2]. A lot of research effort has been devoted to intrusion detection on virtual platform.…”
Section: Introductionmentioning
confidence: 99%