Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Eliot C. Gillum is active.

Publication


Featured researches published by Eliot C. Gillum.


acm special interest group on data communication | 2007

How dynamic are IP addresses

Yinglian Xie; Fang Yu; Kannan Achan; Eliot C. Gillum; Moises Goldszmidt; Ted Wobber

This paper introduces a novel algorithm, UDmap, to identify dynamically assigned IP addresses and analyze their dynamics pattern. UDmap is fully automatic, and relies only on application-level server logs. We applied UDmap to a month-long Hotmail user-login trace and identified a significant number of dynamic IP addresses - more than 102 million. This suggests that the fraction of IP addresses that are dynamic is by no means negligible. Using this information in combination with a three-month Hotmail email server log, we were able to establish that 95.6% of mail servers setup on the dynamic IP addresses in our trace sent out solely spam emails. Moreover, these mail servers sent out a large amount of spam - amounting to 42.2% of all spam emails received by Hotmail. These results highlight the importance of being able to accurately identify dynamic IP addresses for spam filtering. We expect similar benefits to arise for phishing site identification and botnet detection. To our knowledge, this is the first successful attempt to automatically identify and understand IP address dynamics.


computer and communications security | 2012

Innocent by association: early recognition of legitimate users

Yinglian Xie; Fang Yu; Qifa Ke; Martín Abadi; Eliot C. Gillum; Krish Vitaldevaria; Jason D. Walter; Junxian Huang; Zhuoqing Morley Mao

This paper presents the design and implementation of Souche, a system that recognizes legitimate users early in online services. This early recognition contributes to both usability and security. Souche leverages social connections established over time. Legitimate users help identify other legitimate users through an implicit vouching process, strategically controlled within vouching trees. Souche is lightweight and fully transparent to users. In our evaluation on a real dataset of several hundred million users, Souche can efficiently identify 85% of legitimate users early, while reducing the percentage of falsely admitted malicious users from 44% to 2.4%. Our evaluation further indicates that Souche is robust in the presence of compromised accounts. It is generally applicable to enhance usability and security for a wide class of online services.


computer and communications security | 2013

SocialWatch: detection of online service abuse via large-scale social graphs

Junxian Huang; Yinglian Xie; Fang Yu; Qifa Ke; Martín Abadi; Eliot C. Gillum; Z. Morley Mao

In this paper, we present a framework, SocialWatch, to detect attacker-created accounts and hijacked accounts for online services at a large scale. SocialWatch explores a set of social graph properties that effectively model the overall social activity and connectivity patterns of online users, including degree, PageRank, and social affinity features. These features are hard to mimic and robust to attacker counter strategies. We evaluate SocialWatch using a large, real dataset with more than 682 million users and over 5.75 billion directional relationships. SocialWatch successfully detects 56.85 million attacker-created accounts with a low false detection rate of 0.75% and a low false negative rate of 0.61%. In addition, SocialWatch detects 1.95 million hijacked accounts---among which 1.23 million were not detected previously---with a low false detection rate of 2%. Our work demonstrates the practicality and effectiveness of using large social graphs with billions of edges to detect real attacks.


networked systems design and implementation | 2009

BotGraph: large scale spamming botnet detection

Yao Zhao; Yinglian Xie; Fang Yu; Qifa Ke; Yuan Yu; Yan Chen; Eliot C. Gillum


Archive | 2003

Prevention of outgoing spam

Joshua T. Goodman; Robert L. Rounthwaite; Eliot C. Gillum


Archive | 2008

Leveraging communications to identify social network friends

Jennifer Shen; Omar H. Shahine; Steven D. Kafka; Jennie Park Telehowski; Eliot C. Gillum; Sara Liu Yang


Archive | 2003

Advanced spam detection techniques

Bryan T. Starbuck; Robert L. Rounthwaite; David Heckerman; Joshua T. Goodman; Eliot C. Gillum; Nathan D. Howell; Kenneth R. Aldinger


Archive | 2005

Delivery confirmation for e-mail

Imran I. Qureshi; Thomas A. Leung; Pablo M. Stern; William R. Hoffman; Eliot C. Gillum; Omar H. Shahine; Michael D. Schackwitz; Roberto F. Figueroa; Vikram Sardesai; Robin L. Boyea; Charles Reeves Little


Archive | 2008

Graph based bot-user detection

Eliot C. Gillum; Qifa Ke; Yinglian Xie; Fang Yu; Yao Zhao


Archive | 2005

Email address verification

Jason D. Walter; Aditya Bansod; Eliot C. Gillum

Collaboration


Dive into the Eliot C. Gillum's collaboration.

Researchain Logo
Decentralizing Knowledge