Analysis of E-mail Account Probing Attack Based on Graph Mining
نویسندگان
چکیده
منابع مشابه
An e-mail analysis method based on text mining techniques
This paper proposes a method employing text mining techniques to analyze e-mails collected at a customer center. The method uses two kinds of domain-dependent knowledge. One is a key concept dictionary manually provided by human experts. The other is a concept relation dictionary automatically acquired by a fuzzy inductive learning algorithm. The method inputs the subject and the body of an e-m...
متن کاملMining E-mail Authorship
In this paper we report an investigation into the learning of authorship identification or categorisation for the case of e-mail documents. We use various e-mail document features such as structural characteristics and linguistic evidence together with the Support Vector Machine as the learning algorithm. Experiments on a number of e-mail documents give promising results with some e-mail docume...
متن کاملSpam Classification Based on E-Mail Path Analysis
Email spam is the most effective form of online advertising. Unlike telephone marketing, email spamming does not require huge human or financial resources investment. Most existing spam filtering techniques concentrate on the emails’ content. However, most spammers obfuscate their emails’ content to circumvent content-based spam filters. An integrated solution for restricting spam emails is nee...
متن کاملE-Mail Worm Detection Using Data Mining
This work applies data mining techniques to detect e-mail worms. E-mail messages contain a number of different features such as the total number of words in message body/subject, presence/absence of binary attachments, type of attachments, and so on. The goal is to obtain an efficient classification model based on these features. The solution consists of several steps. First, the number of feat...
متن کاملMining E-Mail Messages: Uncovering Interaction Patterns and Processes using E-Mail Logs
Buzzwords such as BAM (Business Activity Monitoring), BOM (Business Operations Management), BPI (Business Process Intelligence) illustrate the interest in closing the business process management loop (van der Aalst and van Hee, 2002; Dumas et al., 2005). This is illustrated by the Figure 1, which shows the increasing level of support for closing the so-called BPM lifecycle. The lifecycle identi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scientific Reports
سال: 2020
ISSN: 2045-2322
DOI: 10.1038/s41598-020-63191-5