Skip to main content

Email Shape Analysis

  • Conference paper
Distributed Computing and Networking (ICDCN 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5935))

Included in the following conference series:

Abstract

Email has become an integral part of everyday life. Without a second thought we receive bills, bank statements, and sales promotions all to our inbox. Each email has hidden features that can be extracted. In this paper, we present a new mechanism to characterize an email without using content or context called Email Shape Analysis. We explore the applications of the email shape by carrying out a case study; botnet detection and two possible applications: spam filtering, and social-context based finger printing. Our in-depth analysis of botnet detection leads to very high accuracy of tracing templates and spam campaigns. However, when it comes to spam filtering we do not propose new method but rather a complementing method to the already high accuracy Bayesian spam filter. We also look at its ability to classify individual senders in personal email inbox’s.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ramachandran, A., Feamster, N.: Understanding the network-level behavior of spammers. In: SIGCOMM 2006: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 291–302. ACM Press, New York (2006)

    Chapter  Google Scholar 

  2. Strayer, W.T., Lapsley, D., Walsh, R., Livadas, C.: Botnet detection based on network behavior. In: Lee, W., Wang, C., Dagon, D. (eds.) Botnet Detection: Countering the Largest Security Threat. Springer, Heidelberg (2007)

    Google Scholar 

  3. Ramachandran, A., Feamster, N., Dagon, D.: Detecting botnet membership with dnsbl counterintelligence. In: Lee, W., Wang, C., Dagon, D. (eds.) Botnet Detection. Advances in Information Security, vol. 36, pp. 131–142. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  4. Sinclair, S.: Adapting bayesian statistical spam filters to the server side. J. Comput. Small Coll. 19(5), 344–346 (2004)

    Google Scholar 

  5. Cormack, G.V.: Email spam filtering: A systematic review. Found. Trends Inf. Retr. 1(4), 335–455 (2007)

    Article  Google Scholar 

  6. Cormack, G.V., Gómez Hidalgo, J.M., Sánz, E.P.: Spam filtering for short messages. In: CIKM 2007: Proceedings of the sixteenth ACM conference on Conference on information and knowledge management, pp. 313–320. ACM Press, New York (2007)

    Chapter  Google Scholar 

  7. Wei, C.-P., Chen, H.-C., Cheng, T.-H.: Effective spam filtering: A single-class learning and ensemble approach. Decis. Support Syst. 45(3), 491–503 (2008)

    Article  Google Scholar 

  8. Parzen, E.: On Estimation of a Probability Density Function and Mode. The Annals of Mathematical Statistics 33(3), 1065–1076 (1962)

    Article  MathSciNet  MATH  Google Scholar 

  9. Sheather, S.J., Jones, M.C.: A reliable data-based bandwidth selection method for kernel density estimation. Journal of the Royal Statistical Society, Series B (53), 683–690 (1991)

    Google Scholar 

  10. Brownlow, M.: Email and webmail statistics (April 2008), http://www.email-marketing-reports.com/metrics/email-statistics.htm

  11. Paul, R.: Researchers track Ron Paul spam back to Reactor botnet (December 2007), http://www.marshal8e6.com/trace/i/Template-Based-Spam,trace.996~.asp

  12. Stewart, J.: Top Spam Botnets Exposed (April 2008), http://www.secureworks.com/research/threats/topbotnets/?threat=topbotnets

  13. TRACElabs, Template Based Spam (May 2009), http://www.marshal8e6.com/trace/i/Template-Based-Spam,trace.996~.asp

  14. Cam, L.L., Yang, G.L.: Asymptotics in Statistics: Some Basic Concepts. Springer, Heidelberg (2000)

    MATH  Google Scholar 

  15. Cormack, G.V., Lynam, T.R.: TREC 2007 Public Corpus (2007), http://plg.uwaterloo.ca/~gvcormac/treccorpus07/about.html

  16. Stolfo, S.J., Hershkop, S., Hu, C.-W., Li, W.-J., Nimeskern, O., Wang, K.: Behavior-based modeling and its application to email analysis. ACM Trans. Internet Technol. 6(2), 187–221 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sroufe, P., Phithakkitnukoon, S., Dantu, R., Cangussu, J. (2010). Email Shape Analysis. In: Kant, K., Pemmaraju, S.V., Sivalingam, K.M., Wu, J. (eds) Distributed Computing and Networking. ICDCN 2010. Lecture Notes in Computer Science, vol 5935. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11322-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11322-2_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11321-5

  • Online ISBN: 978-3-642-11322-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics