Security

Understanding Botnet-driven Blog Spam: Motivations and Methods

Authorship: 
Brandon Bevans, Bruce DeBruhl, Foaad Khosmood
Publication: 
Digital Humanities 2017
Conference
Location: 
Montreal, Canada
August, 2017

Tags:

Spam, or unsolicited commercial communication, has evolved from telemarketing schemes to a highly sophisticated and profitable black-market business. Although many users are aware that email spam is prominent, they are less aware of blog spam (Thomason, 2007). Blog spam, also known as forum spam, is spam that is posted to a public or outward facing website. Blog spam can be to accomplish many tasks that email spam is used for like posting links to a malicious executable. Blog spam can also serve some unique purposes.

User identification through command history analysis

Authorship: 
Foaad Khosmood, Phillip L. Nico, Jon Woolery
Publication: 
IEEE Computational Intelligence in Cyber Security
Conference
Location: 
Orlando, Florida
December, 2014
As any veteran of the editor wars can attest, Unix users can be fiercely and irrationally attached to the commands they use and the manner in which they use them. In this work, we investigate the problem of identifying users out of a large set of candidates (25-97) through their command-line histories. Using standard algorithms and feature sets inspired by natural language authorship attribution literature, we demonstrate conclusively that individual users can be identified with a high degree of accuracy through their command-line behavior.
Subscribe to RSS - Security
Global Game Jam