Visualizing Geolocation of Spam Email

被引:0
|
作者
Muallem, Asmah [1 ]
Shetty, Sachin [1 ]
Hargrove, S. K. [1 ]
机构
[1] Tennessee State Univ, Coll Engn, Nashville, TN 37203 USA
关键词
Network Visualization; Security Visualization; Spam Analysis; IP Geolocation;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
With the recent surge in cyber attacks, there is a growing demand for effective security analytics tools. Though, there are advanced data collection techniques in the form of honeypots and malware collectors, the value of data are only as useful as the analysis technique used. One of the primary drawbacks of current security analytic tools is the lack of visualization controls to effectively analyze the data. In this paper, we develop a visualization tool to analyze the geographical locations of spammers based on the integration of MaxMind and WhoIS databases with Google Maps API. The visualization tool provides an insight into spam origins, along with patterns of spammers identified from spam activity. A key component in the development of this tool is its extensible framework allowing for the addition of resources to retrieve more information about a spammer and analyze additional patterns of spammers for spam analysis.
引用
收藏
页码:63 / 68
页数:6
相关论文
共 50 条
  • [1] Email Spam Filtering
    Puertas Sanz, Enrique
    Gomez Hidalgo, Jose Maria
    Cortizo Perez, Jose Carlos
    [J]. ADVANCES IN COMPUTERS, VOL 74: SOFTWARE DEVELOPMENT, 2008, 74 : 45 - 114
  • [2] An Inquiry into Localized Email Spam
    Rauti, Sampsa
    [J]. COMPUTER SYSTEMS AND TECHNOLOGIES, 2019, : 42 - 48
  • [3] An empirical study of spam and spam vulnerable email accounts
    Dhinakaran, Cynthia
    Chae, Cheol-Joo
    Lee, Jae-Kwang
    Nagamalai, Dhinaharan
    [J]. PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, MAIN CONFERENCE PAPERS, VOL 1, 2007, : 407 - +
  • [4] IP geolocation suspicious email messages
    Butkovic, Asmir
    Mrdovic, Sasa
    Mujacic, Samra
    [J]. 2013 21ST TELECOMMUNICATIONS FORUM (TELFOR), 2013, : 881 - +
  • [5] Email spam and the CAN-SPAM Act: A qualitative analysis
    Yu, Szde
    [J]. INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2011, 5 (01): : 715 - 735
  • [6] Inexpensive Email Addresses An Email Spam-Combating System
    Yegenian, Aram
    Dimitriou, Tassos
    [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, 2010, 50 : 35 - 52
  • [7] Identification of Spam Email Based on Information from Email Header
    bin Abd Razak, Shukor
    Bin Mohamad, Ahmad Fahrulrazie
    [J]. 2013 13TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2013, : 347 - 353
  • [8] The Unintended Consequences of Email Spam Prevention
    Scheffler, Sarah
    Smith, Sean
    Gilad, Yossi
    Goldberg, Sharon
    [J]. PASSIVE AND ACTIVE MEASUREMENT, PAM 2018, 2018, 10771 : 158 - 169
  • [9] Selected methods of spam filtering in email
    Miszalska, Izabella
    Zabierowski, Wojciech
    Napieralski, Andrzej
    [J]. 2007 PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON THE EXPERIENCE OF DESIGNING AND APPLICATION OF CAD SYSTEMS IN MICROELECTRONICS, 2007, : 507 - 513
  • [10] Symbiotic filtering for spam email detection
    Lopes, Clotilde
    Cortez, Paulo
    Sousa, Pedro
    Rocha, Miguel
    Rio, Miguel
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (08) : 9365 - 9372