• DocumentCode
    1968476
  • Title

    Behavior analysis of spam botnets

  • Author

    Husna, Husain ; Phithakkitnukoon, Santi ; Palla, Srikanth ; Dantu, Ram

  • Author_Institution
    Dept. of Comput. Sci. & Eng., North Texas Univ., Denton, TX
  • fYear
    2008
  • fDate
    6-10 Jan. 2008
  • Firstpage
    246
  • Lastpage
    253
  • Abstract
    Compromised computers, known as bots, are the major source of spamming and their detection helps greatly improve control of unwanted traffic. In this work we investigate the behavior patterns of spammers based on their underlying similarities in spamming. To our knowledge, no work has been reported on identifying spam botnets based on spammerspsila temporal characteristics. Our study shows that the relationship among spammers demonstrates highly clustering structures based on features such as content length, time of arrival, frequency of email, active time, inter-arrival time, and content type. Although the dimensions of the collected feature set is low, we perform principal component analysis (PCA) on feature set to identify the features which account for the maximum variance in the spamming patterns. Further, we calculate the proximity between different spammers and classify them into various groups. Each group represents similar proximity. Spammers in the same group inherit similar patterns of spamming a domain. For classification into Botnet groups, we use clustering algorithms such as Hierarchical and K-means.We identify Botnet spammers into a particular group with a precision of 90%.
  • Keywords
    information filtering; invasive software; pattern classification; pattern clustering; principal component analysis; unsolicited e-mail; Botnets; PCA; behavior pattern analysis; clustering algorithm; feature set; maximum variance; pattern classification; principal component analysis; spam filtering; unwanted traffic control; Communication system traffic control; Computer networks; Computer science; Computer security; Filtering; Frequency; Laboratories; Pattern analysis; Principal component analysis; Unsolicited electronic mail;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008. 3rd International Conference on
  • Conference_Location
    Bangalore
  • Print_ISBN
    978-1-4244-1796-4
  • Electronic_ISBN
    978-1-4244-1797-1
  • Type

    conf

  • DOI
    10.1109/COMSWA.2008.4554418
  • Filename
    4554418