Exploring bad behaviors from email logs

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Human is the weakest factor in organization security and is always the target of attackers. Attackers find vulnerability of human cause by his/her bad behaviors and exploit it. Organization shall proactively detect those bad behaviors and prevent it on the first hand. This paper studied employees with bad habit of sending of corporate file(s) to public email addresses that are not allowed by the organization. By using email log as a source to generate social network graph and collect 2 types of out- degree of each node, regular out-degree and out-degree to “not allowed” public email addresses. We analyze correlation of these 2 numbers and found that people with bad habit tend to send mail to public email addresses when they have to send file outside the company. The result of this paper gave us parameters to calculate risk score for further study using the integration of Social Network-Attack Graph (SN-AG) analysis approach.

Cite

CITATION STYLE

APA

Kanchanapokin, S., & Boonkrong, S. (2015). Exploring bad behaviors from email logs. Lecture Notes in Electrical Engineering, 339, 517–524. https://doi.org/10.1007/978-3-662-46578-3_61

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free