Analysis, Development and Deployment of Statistical Anomaly Detection Techniques for real e-mail Traffic
Chapter
Publication Date:
2011
abstract:
Even if new interaction paradigms, such as the Voice over IP (VoIP), are becoming popular and widely
adopted, the e-mail is still one of the most utilized ways to communicate across the Internet. However, many
malicious threats are conveyed via e-mails. Usually, the authors can exploit two different approaches:
i) analyzing the logs produced by e-mail servers or ii) reconstruct the e-mail flows by capturing data
directly from the network by placing ad-hoc probes. In this vein, this Chapter discusses the analysis,
development and deployment of statistical detection techniques aimed at the detection of Internet worms.
For what concerns i), they introduce a tool called Log Mail Analyzer (LMA), which allows to overcome
the complexity of inspecting multiple logs created from a heterogeneous population of mail servers. In
the perspective of ii) they briefly discuss an alternative solution, based on ad-hoc network probes, to be
properly placed to collect traffic and then reconstruct the e-mail flow to be monitored. Lastly, the authors
introduce a threshold mechanism, based on a simple statistical framework, to automatically detect and
identify different worm activities.
Iris type:
02.01 Contributo in volume (Capitolo o Saggio)
List of contributors:
Papaleo, Gianluca; Chiarella, Davide; Aiello, Maurizio; Caviglione, Luca
Book title:
Information Assurance and Security Technologies for Risk Assessment and Threat Management: Advances