Abstract
Email has become an integral part of everyday life. Without a second thought we receive bills, bank statements, and sales promotions all to our inbox. Each email has hidden features that can be extracted. In this paper, we present a new mechanism to characterize an email without using content or context called Email Shape Analysis. We explore the applications of the email shape by carrying out a case study; botnet detection and two possible applications: spam filtering, and social-context based finger printing. Our in-depth analysis of botnet detection leads to very high accuracy of tracing templates and spam campaigns. However, when it comes to spam filtering we do not propose new method but rather a complementing method to the already high accuracy Bayesian spam filter. We also look at its ability to classify individual senders in personal email inbox’s.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ramachandran, A., Feamster, N.: Understanding the network-level behavior of spammers. In: SIGCOMM 2006: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 291–302. ACM Press, New York (2006)
Strayer, W.T., Lapsley, D., Walsh, R., Livadas, C.: Botnet detection based on network behavior. In: Lee, W., Wang, C., Dagon, D. (eds.) Botnet Detection: Countering the Largest Security Threat. Springer, Heidelberg (2007)
Ramachandran, A., Feamster, N., Dagon, D.: Detecting botnet membership with dnsbl counterintelligence. In: Lee, W., Wang, C., Dagon, D. (eds.) Botnet Detection. Advances in Information Security, vol. 36, pp. 131–142. Springer, Heidelberg (2008)
Sinclair, S.: Adapting bayesian statistical spam filters to the server side. J. Comput. Small Coll. 19(5), 344–346 (2004)
Cormack, G.V.: Email spam filtering: A systematic review. Found. Trends Inf. Retr. 1(4), 335–455 (2007)
Cormack, G.V., Gómez Hidalgo, J.M., Sánz, E.P.: Spam filtering for short messages. In: CIKM 2007: Proceedings of the sixteenth ACM conference on Conference on information and knowledge management, pp. 313–320. ACM Press, New York (2007)
Wei, C.-P., Chen, H.-C., Cheng, T.-H.: Effective spam filtering: A single-class learning and ensemble approach. Decis. Support Syst. 45(3), 491–503 (2008)
Parzen, E.: On Estimation of a Probability Density Function and Mode. The Annals of Mathematical Statistics 33(3), 1065–1076 (1962)
Sheather, S.J., Jones, M.C.: A reliable data-based bandwidth selection method for kernel density estimation. Journal of the Royal Statistical Society, Series B (53), 683–690 (1991)
Brownlow, M.: Email and webmail statistics (April 2008), http://www.email-marketing-reports.com/metrics/email-statistics.htm
Paul, R.: Researchers track Ron Paul spam back to Reactor botnet (December 2007), http://www.marshal8e6.com/trace/i/Template-Based-Spam,trace.996~.asp
Stewart, J.: Top Spam Botnets Exposed (April 2008), http://www.secureworks.com/research/threats/topbotnets/?threat=topbotnets
TRACElabs, Template Based Spam (May 2009), http://www.marshal8e6.com/trace/i/Template-Based-Spam,trace.996~.asp
Cam, L.L., Yang, G.L.: Asymptotics in Statistics: Some Basic Concepts. Springer, Heidelberg (2000)
Cormack, G.V., Lynam, T.R.: TREC 2007 Public Corpus (2007), http://plg.uwaterloo.ca/~gvcormac/treccorpus07/about.html
Stolfo, S.J., Hershkop, S., Hu, C.-W., Li, W.-J., Nimeskern, O., Wang, K.: Behavior-based modeling and its application to email analysis. ACM Trans. Internet Technol. 6(2), 187–221 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sroufe, P., Phithakkitnukoon, S., Dantu, R., Cangussu, J. (2010). Email Shape Analysis. In: Kant, K., Pemmaraju, S.V., Sivalingam, K.M., Wu, J. (eds) Distributed Computing and Networking. ICDCN 2010. Lecture Notes in Computer Science, vol 5935. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11322-2_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-11322-2_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11321-5
Online ISBN: 978-3-642-11322-2
eBook Packages: Computer ScienceComputer Science (R0)