Behind phishing: an examination of phisher modi operandi

  • Authors:
  • D. Kevin McGrath;Minaxi Gupta

  • Affiliations:
  • Computer Science Department, Indiana University, Bloomington, IN;Computer Science Department, Indiana University, Bloomington, IN

  • Venue:
  • LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

We develop new techniques to map botnet membership using traces of spam email. To group bots into botnets we look for multiple bots participating in the same spam email campaign. We have applied our technique against a trace of spam email from Hotmail ...