Statistical anomaly detection on real e-mail traffic

1Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

There are many recent studies and proposal in Anomaly Detection Techniques, especially in worm and virus detection. In this field it does matter to answer few important questions like at which ISO/OSI layer data analysis is done and which approach is used. Furthermore these works suffer of scarcity of real data due to lack of network resources or privacy problem: almost every work in this sector uses synthetic (e.g. DARPA) or pre-made set of data. Our study is based on layer seven quantities (number of e-mail sent in a chosen period): we analyzed quantitatively our network e-mail traffic (4 SMTP servers, 10 class C networks) and applied our method on gathered data to detect indirect worm infection (worms which use e-mail to spread infection). The method is a threshold method and, in our dataset, it identified various worm activities. In this document we show our data analysis and results in order to stimulate new approaches and debates in Anomaly Intrusion Detection Techniques. © 2009 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Aiello, M., Chiarella, D., & Papaleo, G. (2009). Statistical anomaly detection on real e-mail traffic. In Advances in Soft Computing (Vol. 53, pp. 170–177). https://doi.org/10.1007/978-3-540-88181-0_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free