Skip to Main Content (Press Enter)

Logo CNR
  • ×
  • Home
  • Persone
  • Pubblicazioni
  • Strutture
  • Competenze

UNI-FIND
Logo CNR

|

UNI-FIND

cnr.it
  • ×
  • Home
  • Persone
  • Pubblicazioni
  • Strutture
  • Competenze
  1. Pubblicazioni

Analysis, Development and Deployment of Statistical Anomaly Detection Techniques for real e-mail Traffic

Capitolo di libro
Data di Pubblicazione:
2011
Abstract:
Even if new interaction paradigms, such as the Voice over IP (VoIP), are becoming popular and widely adopted, the e-mail is still one of the most utilized ways to communicate across the Internet. However, many malicious threats are conveyed via e-mails. Usually, the authors can exploit two different approaches: i) analyzing the logs produced by e-mail servers or ii) reconstruct the e-mail flows by capturing data directly from the network by placing ad-hoc probes. In this vein, this Chapter discusses the analysis, development and deployment of statistical detection techniques aimed at the detection of Internet worms. For what concerns i), they introduce a tool called Log Mail Analyzer (LMA), which allows to overcome the complexity of inspecting multiple logs created from a heterogeneous population of mail servers. In the perspective of ii) they briefly discuss an alternative solution, based on ad-hoc network probes, to be properly placed to collect traffic and then reconstruct the e-mail flow to be monitored. Lastly, the authors introduce a threshold mechanism, based on a simple statistical framework, to automatically detect and identify different worm activities.
Tipologia CRIS:
02.01 Contributo in volume (Capitolo o Saggio)
Elenco autori:
Papaleo, Gianluca; Chiarella, Davide; Aiello, Maurizio; Caviglione, Luca
Autori di Ateneo:
AIELLO MAURIZIO
CAVIGLIONE LUCA
CHIARELLA DAVIDE
Link alla scheda completa:
https://iris.cnr.it/handle/20.500.14243/139482
Titolo del libro:
Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances
  • Dati Generali

Dati Generali

URL

http://www.igi-global.com/chapter/attacks-systems-categories-motives/61218
  • Utilizzo dei cookie

Realizzato con VIVO | Designed by Cineca | 26.5.0.0 | Sorgente dati: PREPROD (Ribaltamento disabilitato)