2014 IEEE International Symposium on Software Reliability Engineering Workshops 2014
DOI: 10.1109/issrew.2014.32
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Compromised Email Accounts Used by a Spam Botnet with Country Counting and Theoretical Geographical Travelling Speed Extracted from Metadata

Abstract: Seventy six percent of sent spam and phishing emails have their origins in botnets. They use compromised email accounts to send junk mail through other SMTP servers to their destinations. Commonly, research is focused on the rapid detection of compromised accounts to protect the integrity of other systems. One possible way to do this is to scan the email content or limit the amount of messages that can be sent from an IP address or an account during a specified time period. An anomaly is properly detected if t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…Carlo Schafer [158] has presented two methods for detecting compromised accounts called Country Counting and Theoretical Geographical Travelling Speed which do not need access to email content to detect an abused account since these compromised accounts are primarily used by botnets for sending new spam or phishing emails. The proposed method uses data that is extracted from the log files of the SMTP server and the detection is succeeded by observing the incoming metadata from the from the SMTP connections.…”
Section: Ieee Communications Surveys and Tutorials Accepted For Publicmentioning
confidence: 99%
“…Carlo Schafer [158] has presented two methods for detecting compromised accounts called Country Counting and Theoretical Geographical Travelling Speed which do not need access to email content to detect an abused account since these compromised accounts are primarily used by botnets for sending new spam or phishing emails. The proposed method uses data that is extracted from the log files of the SMTP server and the detection is succeeded by observing the incoming metadata from the from the SMTP connections.…”
Section: Ieee Communications Surveys and Tutorials Accepted For Publicmentioning
confidence: 99%