Cargando…

Analysis of E-mail Account Probing Attack Based on Graph Mining

E-mail has become the main carrier of spreading malicious software and been widely used for phishing, even high-level persistent threats. The e-mail accounts with high social reputation are primary targets to be attacked and utilized by attackers, suffering a lot of probing attacks for a long time....

Descripción completa

Detalles Bibliográficos
Autores principales: Wen, Yi, Chen, Xingshu, Zeng, Xuemei, Wang, Wei
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7190617/
https://www.ncbi.nlm.nih.gov/pubmed/32350380
http://dx.doi.org/10.1038/s41598-020-63191-5
_version_ 1783527719234961408
author Wen, Yi
Chen, Xingshu
Zeng, Xuemei
Wang, Wei
author_facet Wen, Yi
Chen, Xingshu
Zeng, Xuemei
Wang, Wei
author_sort Wen, Yi
collection PubMed
description E-mail has become the main carrier of spreading malicious software and been widely used for phishing, even high-level persistent threats. The e-mail accounts with high social reputation are primary targets to be attacked and utilized by attackers, suffering a lot of probing attacks for a long time. In this paper, in order to understand the probing pattern of the e-mail account attacks, we analyse the log of email account probing captured in the campus network based on graph mining. By analysing characteristics of the dataset in different dimensions, we find a kind of e-mail account probing attack and give it a new definition. Based on the analysis results, its probing pattern is figured out. From the point of probing groups and individuals, we find definitely opposite characteristics of the attack. Owing to the probing pattern and its characteristics, attacks can escape from the detection of security devices, which has a harmful effect on e-mail users and administrators. The analysis results of this paper provide support for the detection and defence of such distributed attacks.
format Online
Article
Text
id pubmed-7190617
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-71906172020-05-05 Analysis of E-mail Account Probing Attack Based on Graph Mining Wen, Yi Chen, Xingshu Zeng, Xuemei Wang, Wei Sci Rep Article E-mail has become the main carrier of spreading malicious software and been widely used for phishing, even high-level persistent threats. The e-mail accounts with high social reputation are primary targets to be attacked and utilized by attackers, suffering a lot of probing attacks for a long time. In this paper, in order to understand the probing pattern of the e-mail account attacks, we analyse the log of email account probing captured in the campus network based on graph mining. By analysing characteristics of the dataset in different dimensions, we find a kind of e-mail account probing attack and give it a new definition. Based on the analysis results, its probing pattern is figured out. From the point of probing groups and individuals, we find definitely opposite characteristics of the attack. Owing to the probing pattern and its characteristics, attacks can escape from the detection of security devices, which has a harmful effect on e-mail users and administrators. The analysis results of this paper provide support for the detection and defence of such distributed attacks. Nature Publishing Group UK 2020-04-29 /pmc/articles/PMC7190617/ /pubmed/32350380 http://dx.doi.org/10.1038/s41598-020-63191-5 Text en © The Author(s) 2020 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
spellingShingle Article
Wen, Yi
Chen, Xingshu
Zeng, Xuemei
Wang, Wei
Analysis of E-mail Account Probing Attack Based on Graph Mining
title Analysis of E-mail Account Probing Attack Based on Graph Mining
title_full Analysis of E-mail Account Probing Attack Based on Graph Mining
title_fullStr Analysis of E-mail Account Probing Attack Based on Graph Mining
title_full_unstemmed Analysis of E-mail Account Probing Attack Based on Graph Mining
title_short Analysis of E-mail Account Probing Attack Based on Graph Mining
title_sort analysis of e-mail account probing attack based on graph mining
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7190617/
https://www.ncbi.nlm.nih.gov/pubmed/32350380
http://dx.doi.org/10.1038/s41598-020-63191-5
work_keys_str_mv AT wenyi analysisofemailaccountprobingattackbasedongraphmining
AT chenxingshu analysisofemailaccountprobingattackbasedongraphmining
AT zengxuemei analysisofemailaccountprobingattackbasedongraphmining
AT wangwei analysisofemailaccountprobingattackbasedongraphmining