Spam campaign detection, analysis, and investigation

Digital Investigation - Tập 12 - Trang S12-S21 - 2015
Son Dinh1, Taher Azeb1, Francis Fortin2, Djedjiga Mouheb1, Mourad Debbabi1
1NCFTA Canada & Concordia University, 1455 de Maisonneuve Blvd West, Montreal, QC H3G 1M8, Canada
2Centre international de criminologie comparée, École de criminologie, Université de Montréal, Montreal, QC H3C 3J7, Canada

Tài liệu tham khảo

Anderson, 2007, Spamscatter: characterizing internet scam hosting infrastructure Bergholz, 2008, Improved phishing detection using model-based features Bergholz, 2010, New filtering approaches for phishing email, J Comput Secur, 18, 7, 10.3233/JCS-2010-0371 Broder, 1997, Syntactic clustering of the web, Comput Netw ISDN Syst, 29, 1157, 10.1016/S0169-7552(97)00031-7 Calais, 2008, A campaign-based characterization of spamming strategies Cheung, 2003, Incremental mining of frequent patterns without candidate generation or support constraint, 111 CodeFlower Source code visualization Daigle, 2004, WHOIS protocol specification, Internet RFC, 3912 Damiani, 2004, An open digest-based technique for spam detection, 559 Data-Driven Documents, http://d3js.org/. Fette, 2007, Learning to detect phishing emails, 649 Gao, 2010, Detecting and characterizing social spam campaigns, 35 Guerra, 2008, Spam miner: a platform for detecting and characterizing spam campaigns Haider, 2009, Bayesian clustering for email campaign detection, 385 Han, 2000, Mining frequent patterns without candidate generation, ACM SIGMOD Rec, 29, 1, 10.1145/335191.335372 Han, 2004, Mining frequent patterns without candidate generation: a frequent-pattern tree approach, Data Min Knowl Discov, 8, 53, 10.1023/B:DAMI.0000005258.31418.83 Harrenstien, 1985, WHOIS protocol specification, Internet RFC, 954 Heller, 2005, Bayesian hierarchical clustering, 297 John, 2009, Studying spamming botnets using botlab, vol. 9, 291 Kai-Sang Leung, 2004, Interactive constrained frequent-pattern mining system, 49 Kanich, 2009, Spamalytics: an empirical analysis of spam marketing conversion, Commun ACM, 52, 99, 10.1145/1562164.1562190 Konte, 2009, Dynamics of online scam hosting infrastructure, 219 Kornblum, 2006, Identifying almost identical files using context triggered piecewise hashing, Digit Investig, 3, 91, 10.1016/j.diin.2006.06.015 Landauer, 1998, An introduction to latent semantic analysis, Discourse Process, 25, 259, 10.1080/01638539809545028 Lau, 2011, Automatic labelling of topic models, ACL, 2011, 1536 Leung, 2007, Cantree: a canonical-order tree for incremental frequent-pattern mining, Knowl Inform. Syst, 11, 287, 10.1007/s10115-006-0032-8 Li, 2006, An empirical study of clustering behavior of spammers and group-based anti-spam strategies Milne, 2013 Moore, 2009, Temporal correlations between spam and phishing websites Ong, 2003, Fssm: fast construction of the optimized segment support map, 257 OrientDB, http://www.orientdb.org/, last accessed in August 2013. Pathak, 2009, Botnet spam campaigns can be long lasting: evidence, implications, and analysis, 13 Pitsillidis, 2010, Botnet judo: fighting spam with itself Pitsillidis, 2012, Taster's choice: a comparative analysis of spam feeds, 427 Qian, 2010, A case for unsupervised-learning-based spam filtering, ACM SIGMETRICS Perform Eval Rev, 38, 367, 10.1145/1811099.1811090 spamsum, http://www.samba.org/ftp/unpacked/junkcode/spamsum/README, (last accessed in August 2013). Stringhini, 2011, Botmagnifier: locating spambots on the internet Symantec Intelligence Report, 2013 Thonnard, 2011, A strategic analysis of spam botnets operations, in: proceedings of the 8th annual Collaboration, 162 Wei, 2008, Mining spam email to identify common origins for forensic application, 1433 Wei, 2009, Characterization of spam advertised website hosting strategy Xie, 2008, Spamming botnets: signatures and characteristics, ACM SIGCOMM Comput Commun Rev, 38, 171, 10.1145/1402946.1402979 Zhuang, 2008, Characterizing botnets from email spam records, LEET, 8, 1