Identifying Spammers by Their Resource Usage Patterns

نویسندگان

  • Kevin S. Xu
  • Mark Kliger
  • Alfred O. Hero
چکیده

Most studies on spam thus far have focused on its content or source. These types of studies, however, reveal little about the behavioral characteristics of spammers. In addition, privacy issues may prevent wide access to email content. In this paper, we try to identify spammers by investigating their resource usage patterns. Specifically, we look at usage patterns of harvesters, the bots that are used to acquire email addresses, and spam servers, the email servers being used to send the spam emails. We perform spectral biclustering on both harvesters and servers to reveal groups of resources that are used together, which we believe correspond to individual spammers or groups of spammers. We make several interesting discoveries including a division into phishing and non-phishing spammers and a group of harvesters with highly correlated behavior that have IP addresses belonging to a known rogue Internet service provider.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bimodal Distribution and Co-Bursting in Review Spam Detection

Online reviews play a crucial role in helping consumers evaluate and compare products and services. This critical importance of reviews also incentivizes fraudsters (or spammers) to write fake or spam reviews to secretly promote or demote some target products and services. Existing approaches to detecting spam reviews and reviewers employed review contents, reviewer behaviors, star rating patte...

متن کامل

Modeling Review Spam Using Temporal Patterns and Co-bursting Behaviors

Online reviews play a crucial role in helping consumers evaluate and compare products and services. However, review hosting sites are often targeted by opinion spamming. In recent years, many such sites have put a great deal of effort in building effective review filtering systems to detect fake reviews and to block malicious accounts. Thus, fraudsters or spammers now turn to compromise, purcha...

متن کامل

Towards Understanding Spammers – Discovering Local Patterns for Concept Description

Concept description is an important task of descriptive data mining: Basically, its aim is to identify and to summarize properties of a selected target population in the form of a set of patterns – in a concise and comprehensible way. In this paper we present an approach for concept description in the social bookmarking domain: We show how subgroup discovery can be utilized for identifying disc...

متن کامل

Spam Blocking with a Dynamically Updated Firewall Ruleset

In this paper, we detail our methods for controlling spam at a small ISP, reducing both resource usage and customer complaints. We will discuss our initial unsuccessful tactics, and the resulting development of our unique spam blocking system. Deny-Spammers classifies hosts as probable spammers and inserts those hosts into a dynamically updated firewall ruleset on our mail server, thereby effec...

متن کامل

Identifying Managers’ Mental Patterns in Relation to Subjective Well-being of Human Resource of Organization, Using the Q-method

Intorduction: It is necessary to notice the subjective well-being  and satisfaction of human resources in organizations and lack of attention to them has deleterious effects on individual and organizational performance. Method: The present study is a mixed (qualitative and quantitative)  research which used the Q approach to examine and explain managers’ mental patterns regarding Subjective We...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010