Clustering Spam Domains and Destination Websites: Digital Forensics with Data Mining

نویسندگان

  • Chun Wei
  • Alan Sprague
  • Gary Warner
  • Anthony Skjellum
چکیده

Spam related cyber crimes have become a serious threat to society. Current spam research mainly aims to detect spam more effectively. We believe the identification and disruption of the supporting infrastructure used by spammers is a more effective way of stopping spam than filtering. The termination of spam hosts will greatly reduce the profit a spammer can generate and thwart his ability to send more spam. This research proposes an algorithm for clustering spam domains extracted from spam emails based on the hosting IP addresses and tracing the IP addresses over a period of time. The results show that many seemingly unrelated spam campaigns are actually related if the domain names in the URLs are investigated; spammers have a sophisticated mechanism for combating URL blacklisting by registering many new domain names every day and flushing out old domains; the domains are hosted at different IP addresses Journal of Digital Forensics, Security and Law, Vol. 5(1) 22 across several networks, mostly in China where legislation is not as tight as in the United States; old IP addresses are replaced by new ones from time to time, but still show strong correlation among them. This paper demonstrates an effective use of data mining to relate spam emails for the purpose of identifying the supporting infrastructure used for spamming and other cyber criminal activities.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identification of Web Spam through Clustering of Website Structures

Spam websites are domains whose owners are not interested in using them as gates for their activities but they are parked to be sold in the secondary market of web domains. To transform the costs of the annual registration fees in an opportunity of revenues, spam websites most often host a large amount of ads in the hope that someone who lands on the site by chance clicks on some ads. Since par...

متن کامل

Artificial Intelligence Applied to digital Email for forensic Application

The number of computer security incidents is growing exponentially and society’s collective ability to respond to this crisis is constrained by the lack of trained professionals. The increased use of the Internet and computer technology to commit crimes indicates an abuse of new developments that requires a response by those involved in law enforcement. In this paper we see new research approac...

متن کامل

Recognizing Spam Domains by Extracting Features from Spam Emails using Data Mining

This paper attempts to develop an algorithm to recognize spam domains using data mining techniques with the focus on law enforcement forensic analysis. Spam filtering has been the major weapon against spam, but failed to reduce the number of spam emails sent to an indiscriminate set of recipients. The proposed algorithm accepts as input, spam mails of personal account and extracts features such...

متن کامل

Text Clustering for Digital Forensics Analysis

In the last decades digital forensics has become a prominent activity in modern investigations. Seized digital devices can provide precious information and evidences about facts and/or individuals on which the investigational activity is performed. Due to the complexity of this inquiring activity and to the large amount of the data to be analyzed, the choice of appropriate digital tools to supp...

متن کامل

Subject based Clustering for Digital Forensic Investigation with Subject Suggestion

Recently digital forensics has become a prominent activity in crime investigation since computers are increasingly used as tools to commit crimes. During forensic investigation the digital devices such as desktops, notebooks, smart phones etc. found at the crime scene are collected for further investigation. Investigators have to go through humongous amount of data stored on these devices to ga...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JDFSL

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2010