Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ivan Osipkov is active.

Publication


Featured researches published by Ivan Osipkov.


acm special interest group on data communication | 2008

Spamming botnets: signatures and characteristics

Yinglian Xie; Fang Yu; Kannan Achan; Rina Panigrahy; Geoff Hulten; Ivan Osipkov

In this paper, we focus on characterizing spamming botnets by leveraging both spam payload and spam server traffic properties. Towards this goal, we developed a spam signature generation framework called AutoRE to detect botnet-based spam emails and botnet membership. AutoRE does not require pre-classified training data or white lists. Moreover, it outputs high quality regular expression signatures that can detect botnet spam with a low false positive rate. Using a three-month sample of emails from Hotmail, AutoRE successfully identified 7,721 botnet-based spam campaigns together with 340,050 unique botnet host IP addresses. Our in-depth analysis of the identified botnets revealed several interesting findings regarding the degree of email obfuscation, properties of botnet IP addresses, sending patterns, and their correlation with network scanning traffic. We believe these observations are useful information in the design of botnet detection schemes.


Archive | 2010

ACTIVITY FILTERING BASED ON TRUST RATINGS OF NETWORK ENTITIES

Malcolm H. Davis; Geoffrey J. Hulten; Ivan Osipkov; Milenko Drinic; Eliot C. Gillum; Krishna Vitaldevara; Jason D. Walter; Mehrdad Bidgoli; Robert L. McCann


Archive | 2008

Mining user behavior data for IP address space intelligence

Ivan Osipkov; Geoffrey J. Hulten; John D. Mehr; Yinglian Xie; Fang Yu


Archive | 2008

AUTOMATIC BOTNET SPAM SIGNATURE GENERATION

Yinglian Xie; Fang Yu; Kannan Achan; Rina Panigrahy; Ivan Osipkov; Geoffrey J. Hulten


Archive | 2010

User account behavior techniques

Robert L. McCann; Eliot C. Gillum; Krishna Vitaldevara; Jason D. Walter; Linda A. McColm; Ivan Osipkov


Archive | 2007

Detection and Removal of Undesirable Items in a Data Processing Environment

Geoffrey J. Hulten; John L. Scarrow; Eliot C. Gillum; Kumar S. Srivastava; Anatoliy Panasyuk; Ivan Osipkov


Archive | 2012

VISUAL STYLES FOR TRUST CATEGORIES OF MESSAGES

Ivan Osipkov


Archive | 2010

Spam tracking analysis reporting system

Paul Laudanski; Cynthia Lilly; Ivan Osipkov; Ravi Shankar Srikantasarma; Ramesh Munusamy; David Anselmi


Archive | 2010

Rescuing trusted nodes from filtering of untrusted network entities

Malcolm H. Davis; Geoffrey J. Hulten; Ivan Osipkov; Milenko Drinic; Eliot C. Gillum; Krishna Vitaldevara; Jason D. Walter; Mehrdad Bidgoli; Robert L. McCann


Archive | 2009

Safe file transmission and reputation lookup

Geoff Hulten; John L. Scarrow; Ivan Osipkov; Kristofer N. Iverson

Collaboration


Dive into the Ivan Osipkov's collaboration.

Researchain Logo
Decentralizing Knowledge