Test environment running 7.6.3
 

Malicious Spam Emails Developments and Authorship Attribution

dc.contributor.authorAlazab, Mamounen
dc.contributor.authorLayton, Roberten
dc.contributor.authorBroadhurst, Rodericen
dc.contributor.authorBouhours, Brigitteen
dc.date.accessioned2025-05-27T23:20:29Z
dc.date.available2025-05-27T23:20:29Z
dc.date.issued2013en
dc.description.abstractThe Internet is a decentralized structure that offers speedy communication, has a global reach and provides anonymity, a characteristic invaluable for committing illegal activities. In parallel with the spread of the Internet, cybercrime has rapidly evolved from a relatively low volume crime to a common high volume crime. A typical example of such a crime is the spreading of spam emails, where the content of the email tries to entice the recipient to click a URL linking to a malicious Web site or downloading a malicious attachment. Analysts attempting to provide intelligence on spam activities quickly find that the volume of spam circulating daily is overwhelming; therefore, any intelligence gathered is representative of only a small sample, not of the global picture. While past studies have looked at automating some of these analyses using topic-based models, i.e. separating email clusters into groups with similar topics, our preliminary research investigates the usefulness of applying authorship-based models for this purpose. In the first phase, we clustered a set of spam emails using an authorship-based clustering algorithm. In the second phase, we analysed those clusters using a set of linguistic, structural and syntactic features. These analyses reveal that emails within each cluster were likely written by the same author, but that it is unlikely we have managed to group together all spam produced by each group. This problem of high purity with low recall, has been faced in past authorship research. While it is also a limitation of our research, the clusters themselves are still useful for the purposes of automating analysis, because they reduce the work needing to be performed. Our second phase revealed useful information on the group that can be utilized in future research for further analysis of such groups, for example, identifying further linkages behind spam campaigns.en
dc.description.statusPeer-revieweden
dc.format.extent11en
dc.identifier.otherScopus:84898024146en
dc.identifier.otherARIES:u5264698xPUB51en
dc.identifier.urihttp://www.scopus.com/inward/record.url?scp=84898024146&partnerID=8YFLogxKen
dc.identifier.urihttps://dspace-test.anu.edu.au/handle/1885/733758780
dc.language.isoenen
dc.relation.ispartofseries2013 4th Cybercrime and Trustworthy Computing Workshop, CTC 2013en
dc.subjectAttributionen
dc.subjectAuthorshipen
dc.subjectCybercrimeen
dc.subjectData Miningen
dc.subjectMalwareen
dc.subjectSpamen
dc.titleMalicious Spam Emails Developments and Authorship Attributionen
dc.typeConference paperen
local.bibliographicCitation.lastpage68en
local.bibliographicCitation.startpage58en
local.contributor.affiliationAlazab, Mamoun; School of Regulation & Global Governance, ANU College of Law, Governance and Policy, The Australian National Universityen
local.contributor.affiliationLayton, Robert; Federation University Australiaen
local.contributor.affiliationBroadhurst, Roderic; Australian National Universityen
local.contributor.affiliationBouhours, Brigitte; School of Regulation & Global Governance, ANU College of Law, Governance and Policy, The Australian National Universityen
local.identifier.doi10.1109/CTC.2013.16en
local.identifier.pureaf547842-94ae-4725-844c-950b6e0e9be9en
local.type.statusPublisheden

Downloads