Clustering Spam Domains and Destination Websites: Digital Forensics with Data Mining
Spam related cyber crimes have become a serious threat to society. Current spam research mainly aims to detect spam more effectively. We believe the prosecution of spammers is a more effective way of stopping spam emails than filtering, therefore more research is needed to help forensic investigat...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Association of Digital Forensics, Security and Law
2010-03-01
|
Series: | Journal of Digital Forensics, Security and Law |
Online Access: | http://ojs.jdfsl.org/index.php/jdfsl/article/view/7 |
id |
doaj-1975c907830347bfa71f6f903e5d27d7 |
---|---|
record_format |
Article |
spelling |
doaj-1975c907830347bfa71f6f903e5d27d72020-11-25T01:34:51ZengAssociation of Digital Forensics, Security and LawJournal of Digital Forensics, Security and Law1558-72151558-72232010-03-0151214831Clustering Spam Domains and Destination Websites: Digital Forensics with Data MiningChun Wei0Alan Sprague1Gary Warner2Anthony Skjellum3Univ. of Alabama at BirminghamUniv. of Alabama at BirminghamUniv. of Alabama at BirminghamUniv. of Alabama at BirminghamSpam related cyber crimes have become a serious threat to society. Current spam research mainly aims to detect spam more effectively. We believe the prosecution of spammers is a more effective way of stopping spam emails than filtering, therefore more research is needed to help forensic investigators to collect useful evidence. This research proposes an algorithm for clustering spam domains extracted from spam emails based on the hosting IP addresses and tracing the domains over a period of time. The results reveal several facts that merit law enforcement attention: many seemingly unrelated spam campaigns are actually related; spammers have a sophisticated mechanism for combating URL blacklisting by registering many new domain names every day and flushing out old domains; the domains are hosted at different IP addresses across several networks, mostly in China where legislation is not as tight as in US; old IP addresses are replaced by new ones from time to time, but still show strong correlation among them. These facts lead to the conclusion that spam-related cyber crimes are operated by well-organized criminal syndicates that have sufficient manpower to distribute a huge volume of spam through bots, purchase a large number of domain names and hosting servers and maintain websites to sell counterfeit products online. Traditional law enforcements technology has not scaled well in cases involving millions of data elements. This paper demonstrates an effective use of data mining to respond to this challenge.http://ojs.jdfsl.org/index.php/jdfsl/article/view/7 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Chun Wei Alan Sprague Gary Warner Anthony Skjellum |
spellingShingle |
Chun Wei Alan Sprague Gary Warner Anthony Skjellum Clustering Spam Domains and Destination Websites: Digital Forensics with Data Mining Journal of Digital Forensics, Security and Law |
author_facet |
Chun Wei Alan Sprague Gary Warner Anthony Skjellum |
author_sort |
Chun Wei |
title |
Clustering Spam Domains and Destination Websites: Digital Forensics with Data Mining |
title_short |
Clustering Spam Domains and Destination Websites: Digital Forensics with Data Mining |
title_full |
Clustering Spam Domains and Destination Websites: Digital Forensics with Data Mining |
title_fullStr |
Clustering Spam Domains and Destination Websites: Digital Forensics with Data Mining |
title_full_unstemmed |
Clustering Spam Domains and Destination Websites: Digital Forensics with Data Mining |
title_sort |
clustering spam domains and destination websites: digital forensics with data mining |
publisher |
Association of Digital Forensics, Security and Law |
series |
Journal of Digital Forensics, Security and Law |
issn |
1558-7215 1558-7223 |
publishDate |
2010-03-01 |
description |
Spam related cyber crimes have become a serious threat to society. Current spam research mainly aims to detect spam more effectively. We believe the prosecution of spammers is a more effective way of stopping spam emails than filtering, therefore more research is needed to help forensic investigators to collect useful evidence. This research proposes an algorithm for clustering spam domains extracted from spam emails based on the hosting IP addresses and tracing the domains over a period of time. The results reveal several facts that merit law enforcement attention: many seemingly unrelated spam campaigns are actually related; spammers have a sophisticated mechanism for combating URL blacklisting by registering many new domain names every day and flushing out old domains; the domains are hosted at different IP addresses across several networks, mostly in China where legislation is not as tight as in US; old IP addresses are replaced by new ones from time to time, but still show strong correlation among them. These facts lead to the conclusion that spam-related cyber crimes are operated by well-organized criminal syndicates that have sufficient manpower to distribute a huge volume of spam through bots, purchase a large number of domain names and hosting servers and maintain websites to sell counterfeit products online. Traditional law enforcements technology has not scaled well in cases involving millions of data elements. This paper demonstrates an effective use of data mining to respond to this challenge. |
url |
http://ojs.jdfsl.org/index.php/jdfsl/article/view/7 |
work_keys_str_mv |
AT chunwei clusteringspamdomainsanddestinationwebsitesdigitalforensicswithdatamining AT alansprague clusteringspamdomainsanddestinationwebsitesdigitalforensicswithdatamining AT garywarner clusteringspamdomainsanddestinationwebsitesdigitalforensicswithdatamining AT anthonyskjellum clusteringspamdomainsanddestinationwebsitesdigitalforensicswithdatamining |
_version_ |
1725070056915730432 |