2009 6th IEEE Consumer Communications and Networking Conference 2009
DOI: 10.1109/ccnc.2009.4784781
|View full text |Cite
|
Sign up to set email alerts
|

Email Shape Analysis for Spam Botnet Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 3 publications
0
9
0
Order By: Relevance
“…Sroufe et al [44] presented a mechanism which detects botnet by analyzing the shape of an Email. They have developed an Email Shape based Botnet Detector called EsBod which inputs spam Emails to a Shape Generator which results in extracting its skeleton.…”
Section: 13mentioning
confidence: 99%
See 1 more Smart Citation
“…Sroufe et al [44] presented a mechanism which detects botnet by analyzing the shape of an Email. They have developed an Email Shape based Botnet Detector called EsBod which inputs spam Emails to a Shape Generator which results in extracting its skeleton.…”
Section: 13mentioning
confidence: 99%
“…The anomaly based detection techniques detect spamming bot activities based on several network behavior anomalies like unexpected network latencies, network traffic on unusual and unused ports, high volumes of traffic for a mid-class network or unusual system behaviors, anomalies in statistical features of Email spam and spam bots that could indicate the existence of spamming bots in the network. A number of approaches appeared in this context [44] [47][48][49][50][51][52][53][54].…”
Section: 13mentioning
confidence: 99%
“…Regarding attacker profiling from the viewpoint of botnet, Gu, G., M. Feily, et al conducted a study on analyzing the attack resources possessed by the same attacker by detecting botnets and analyzing the command and control channel [5,6]. H. Choi, P. Sroufe, et al performed research on the detection of the botnet group infected by the same malicious code by analyzing the spam bot that sends spam e-mails [7,8,9]. Regarding profiling from the viewpoint of the cyber-attacker, Watters studied cyber-attacker models from the viewpoint of social and economic relation [10], whereas Kapetanakis performed research on case-based reasoning using characteristics that can identify the attacker such as technical standard, purpose, anti-forensic, and grammatical error [11].…”
Section: Related Workmentioning
confidence: 99%
“…The proposed signature generation framework, called AutoRE, automatically generates regular expression signatures that detect botnet‐based spam with low false positive rates. Sroufe et al (2009) proposed a method for detecting botnet‐generated spam by extracting and analyzing the shape of the spam mail, such as lines and character count of each line, using a Gaussian kernel density estimator.…”
Section: Responses To the Botnet Threatsmentioning
confidence: 99%