Identifying spammers by their resource usage patterns

3Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.

Abstract

Most studies on spam thus far have focused on its content or source. These types of studies, however, reveal little about the behavioral characteristics of spammers. In addition, privacy issues may pre-vent wide access to email content. In this paper, we try to identify spammers by investigating their resource usage patterns. Specifi-cally, we look at usage patterns of harvesters, the bots that are used to acquire email addresses, and spam servers, the email servers be-ing used to send the spam emails. We perform spectral biclustering on both harvesters and servers to reveal groups of resources that are used together, which we believe correspond to individual spammers or groups of spammers. We make several interesting discoveries in-cluding a division into phishing and non-phishing spammers and a group of harvesters with highly correlated behavior that have IP addresses belonging to a known rogue Internet service provider.

Cite

CITATION STYLE

APA

Xu, K. S., Kliger, M., & Hero, A. O. (2010). Identifying spammers by their resource usage patterns. In 7th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS 2010. Conference on Email and Anti-Spam, CEAS.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free