Skip navigation
Skip navigation

Malicious Spam Emails Developments and Authorship Attribution

Alazab, Mamoun; Layton, Robert; Broadhurst, Roderic; Bouhours, Brigitte

Description

The Internet is a decentralized structure that offers speedy communication, has a global reach and provides anonymity, a characteristic invaluable for committing illegal activities. In parallel with the spread of the Internet, cybercrime has rapidly evolved from a relatively low volume crime to a common high volume crime. A typical example of such a crime is the spreading of spam emails, where the content of the email tries to entice the recipient to click a URL linking to a malicious Web site...[Show more]

dc.contributor.authorAlazab, Mamoun
dc.contributor.authorLayton, Robert
dc.contributor.authorBroadhurst, Roderic
dc.contributor.authorBouhours, Brigitte
dc.coverage.spatialSydney Australia
dc.date.accessioned2015-12-07T22:52:36Z
dc.date.createdNovember 2013
dc.identifier.isbn9781479930753
dc.identifier.urihttp://hdl.handle.net/1885/27493
dc.description.abstractThe Internet is a decentralized structure that offers speedy communication, has a global reach and provides anonymity, a characteristic invaluable for committing illegal activities. In parallel with the spread of the Internet, cybercrime has rapidly evolved from a relatively low volume crime to a common high volume crime. A typical example of such a crime is the spreading of spam emails, where the content of the email tries to entice the recipient to click a URL linking to a malicious Web site or downloading a malicious attachment. Analysts attempting to provide intelligence on spam activities quickly find that the volume of spam circulating daily is overwhelming; therefore, any intelligence gathered is representative of only a small sample, not of the global picture. While past studies have looked at automating some of these analyses using topic-based models, i.e. separating email clusters into groups with similar topics, our preliminary research investigates the usefulness of applying authorship-based models for this purpose. In the first phase, we clustered a set of spam emails using an authorship-based clustering algorithm. In the second phase, we analysed those clusters using a set of linguistic, structural and syntactic features. These analyses reveal that emails within each cluster were likely written by the same author, but that it is unlikely we have managed to group together all spam produced by each group. This problem of high purity with low recall, has been faced in past authorship research. While it is also a limitation of our research, the clusters themselves are still useful for the purposes of automating analysis, because they reduce the work needing to be performed. Our second phase revealed useful information on the group that can be utilized in future research for further analysis of such groups, for example, identifying further linkages behind spam campaigns.
dc.description.sponsorshipThe research is funded by an ARC Discovery Grant on the Evolution of Cybercrime (DP 1096833), the Australian Institute of Criminology (Grant CRG 13/12-13), ARC Centre of Excellence in Policing and Security (CEPS). We also thank the Australian Communications and Media Authority (ACMA) and the Computer Emergency Response Team (CERT) Australia for their assistance in the provision of data and support.
dc.publisherIEEE
dc.relation.ispartofseries4th Cybercrime and Trustworthy Computing Workshop (CTC-2013)
dc.sourceMalicious Spam Emails Developments and Authorship Attribution
dc.titleMalicious Spam Emails Developments and Authorship Attribution
dc.typeConference paper
local.description.notesImported from ARIES
local.description.refereedYes
dc.date.issued2013
local.identifier.absfor160201 - Causes and Prevention of Crime
local.identifier.absfor160299 - Criminology not elsewhere classified
local.identifier.absfor080303 - Computer System Security
local.identifier.ariespublicationu5264698xPUB51
local.type.statusPublished Version
local.contributor.affiliationAlazab, Mamoun, College of Asia and the Pacific, ANU
local.contributor.affiliationLayton, Robert, University of Ballarat
local.contributor.affiliationBroadhurst, Roderic, College of Asia and the Pacific, ANU
local.contributor.affiliationBouhours, Brigitte, College of Asia and the Pacific, ANU
local.description.embargo2037-12-31
local.identifier.doi10.1109/CTC.2013.16
local.identifier.absseo940402 - Crime Prevention
local.identifier.absseo810107 - National Security
local.identifier.absseo970108 - Expanding Knowledge in the Information and Computing Sciences
dc.date.updated2015-12-07T12:31:15Z
local.identifier.scopusID2-s2.0-84898024146
local.identifier.thomsonID000349789400009
CollectionsANU Research Publications

Download

File Description SizeFormat Image
01_Alazab_Malicious_Spam_Emails_2013.pdf320.62 kBAdobe PDF    Request a copy


Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.

Updated:  17 November 2022/ Responsible Officer:  University Librarian/ Page Contact:  Library Systems & Web Coordinator