Email Forensic Analysis Based on k-means clustering

被引:0
作者
Nampoothiri, Arya P. [1 ]
Madhavu, Minu Lalitha [1 ]
机构
[1] Sree Buddha Coll Engn, Dept Comp Sci & Engn, Alappuzha, India
来源
2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI) | 2015年
关键词
Email forensics; betweenness centrality; k-means clustering; spam messages;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Computer crime activities are increasing more and more, which bring great threat to network security. Email is used for several computer crime activities due to its simplicity. In this scenario, email forensics is needed. This paper proposed an email forensic method using k-means clustering. We collect and analyze email data of suspicious users. Then filtering and clustering is done to obtain the email communication network graph. Finally, we apply spam filtering to avoid spam mails in network graph and k-means clustering on email messages to obtain the accurate communication graph. The algorithm can analyze the core members and the structure of criminal organization.
引用
收藏
页码:814 / 817
页数:4
相关论文
共 17 条
  • [1] Applying authorship analysis to extremist-group web forum messages
    Abbasi, A
    Chen, HC
    [J]. IEEE INTELLIGENT SYSTEMS, 2005, 20 (05) : 67 - 75
  • [2] [Anonymous], 2013, International Journal of Advanced Research in Computer Science and Software Engineering
  • [3] [Anonymous], P 2011 IEEE IEEM
  • [4] [Anonymous], 2006, SOC NETWORKS, DOI DOI 10.1016/j.socnet.2005.11.005
  • [5] A faster algorithm for betweenness centrality
    Brandes, U
    [J]. JOURNAL OF MATHEMATICAL SOCIOLOGY, 2001, 25 (02) : 163 - 177
  • [6] de Vel O, 2001, SIGMOD REC, V30, P55, DOI 10.1145/604264.604272
  • [7] NETEST: Estimating a Terrorist Network's Structure—Graduate Student Best Paper Award, CASOS 2002 Conference
    Matthew J. Dombroski
    Kathleen M. Carley
    [J]. Computational & Mathematical Organization Theory, 2002, 8 (3) : 235 - 241
  • [8] Identification of leaders, lurkers, associates and spammers in a social network: context-dependent and context-independent approaches
    Fazeen, Mohamed
    Dantu, Ram
    Guturu, Parthasarathy
    [J]. SOCIAL NETWORK ANALYSIS AND MINING, 2011, 1 (03) : 241 - 254
  • [9] SET OF MEASURES OF CENTRALITY BASED ON BETWEENNESS
    FREEMAN, LC
    [J]. SOCIOMETRY, 1977, 40 (01): : 35 - 41
  • [10] Towards an integrated e-mail forensic analysis framework
    Hadjidj, Rachid
    Debbabi, Mourad
    Lounis, Hakim
    Iqbal, Farkhund
    Szporer, Adam
    Benredjem, Djamel
    [J]. DIGITAL INVESTIGATION, 2009, 5 (3-4) : 124 - 137