Análise e modelagem do comportamento de SPAMMERS e dos usuários legítimos em redes de email

نویسنده

  • Luiz Henique Gomes
چکیده

Email is an increasingly important and ubiquitous mean of communication, both facilitating contact between individuals and enabling rises in the productivity of organizations. However, the relentless rising of automatic unauthorized emails, also known as spam, is eroding away much of the attractiveness of email communication. Most of the attention dedicated to spam detection has focused on the content of the emails or on the addresses or domains associated with spam senders. This thesis takes an innovative approach towards addressing the problems caused by spam. Our goal is to develop a deep understanding of the fundamental characteristics of spam traffic, spammers’ behavior and the way spammers and non-spam (i.e., legitimate) users develop their relations in email networks, in hoping that such knowledge can be used, in the future, to drive the design of more effective techniques for detecting and combating spams. First we present an extensive characterization of a spam-infected email workload, which aims at identifying and quantifying the characteristics that significantly distinguish spam from legitimate traffic, assessing the impact of spam on the aggregate traffic and providing data for creating synthetic workload models. Next, we present a comprehensive graph theoretical analysis of email traffic that captures the fundamental characteristics of relations among spammers and their peers, which is very different from the normal mutual relations between senders and recipients of legitimate email. Third, we use the above properties of spammers and legitimate users behavior, in order to propose two new spam detection algorithms that use structural relationships between senders and recipients of email as the basis for spam detection. Our algorithms are used to correct misclassification from an auxiliary algorithm and its classification precision is evaluated using an actual and a synthetic workloads. Finally, as the majority of email traffic, represented by spam traffic, exhibits opportunistic, rather than symbiotic social relations, we use this traffic to quantify the differences between social and antisocial (here represented by spammers behavior) behaviors in networks of communication. Although no single behavioral or traffic metric studied can unequivocally differentiate legitimate emails from spam, the combination of several of them paint a clear picture of the processes, whereby legitimate and spam email vii are created. For this reason, we suppose, they can be used to augment the effectiveness, as our proposed algorithms do, of mechanisms to detect illegitimate emails as well as to better understand malicious behavior in network of communications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Uma análise empírica de interações em redes sociais

Resumo. Redes sociais online se tornaram extremamente populares e vêm causando o surgimento e a crescente popularização de uma nova onda de aplicações na Web. Com uma enorme quantidade de conteúdo criado a cada dia e por permitir o registro de diversos tipos de interações entre os usuários, redes sociais online se tornaram alvo de diversas áreas de pesquisa, não só relacionadas à computação, ma...

متن کامل

Uma Proposta de Caracterização da Mobilidade de Usuários Sem Fio Através de Medição Real

This paper presents a new proposal for the motion characterization of users in wireless environments, through the space-time microscopic analysis of mobility. This analysis has the objective of investigating the movement components and other measures of interest, in both a qualitative and quantitative way, which are utilized to get a better knowledge of the users motion behavior. In addition, a...

متن کامل

A More Realistic System Modeling for Multiuser Two-Hop Cooperative Relay Wireless Networks

Resumo—Uma discussão acurada baseada no modelo de sistema apresentado em [1] é realizada. Mais especificamente, uma modelagem de sistema mais realı́stica para redes sem fio multiusuário com relay é proposta. A partir dessa nova modelagem, expressões exatas e em forma fechada para as probabilidades de outage de protocolos fixos decodifica-e-encaminha (F-DF) e protolocos seletivos DF (S-DF) são ob...

متن کامل

Avaliação de usabilidade das funcionalidades assíncronas de privacidade do Facebook

Atualmente, a questão da privacidade nas redes sociais é um tema em grande discussão, visto a quantidade de informações compartilhadas entre os seus usuários em diferentes tipos de dispositivos. Este trabalho tem como objetivo realizar a avaliação de usabilidade das configurações de privacidade presentes em ferramentas assíncronas da rede social Facebook. Para tanto, contou com a realização de ...

متن کامل

Modelagem Informacional de Requisitos

RESUMO. Vários autores têm apontado problemas na modelagem de requisitos com casos de uso, relacionados com o detalhamento excessivo do comportamento, incompatibilidade com o enfoque de orientação a objetos, e o alcance da análise do domínio do problema. Parte desses problemas podem ser solucionados evitando-se excesso no detalhamento do comportamento através de regras mais objetivas capazes de...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006