The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Apr. 30, 2013

Filed:

Mar. 24, 2011
Applicants:

Yinglian Xie, Cupertino, CA (US);

Fang Yu, Sunnyvale, CA (US);

Martin Abadi, Palo Alto, CA (US);

Eliot C. Gillum, Mountain View, CA (US);

Junxian Huang, Ann Arbor, MI (US);

Zhuoqing Morley Mao, Ann Arbor, MI (US);

Jason D. Walter, San Jose, CA (US);

Krishna Vitaldevara, Fremont, CA (US);

Inventors:

Yinglian Xie, Cupertino, CA (US);

Fang Yu, Sunnyvale, CA (US);

Martin Abadi, Palo Alto, CA (US);

Eliot C. Gillum, Mountain View, CA (US);

Junxian Huang, Ann Arbor, MI (US);

Zhuoqing Morley Mao, Ann Arbor, MI (US);

Jason D. Walter, San Jose, CA (US);

Krishna Vitaldevara, Fremont, CA (US);

Assignee:

Microsoft Corporation, Redmond, WA (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01);
U.S. Cl.
CPC ...
Abstract

Detection of user accounts associated with spammer attacks may be performed by constructing a social graph of email users. Biggest connected components (BCC) of the social graph may be used to identify legitimate user accounts, as the majority of the users in the biggest connected components are legitimate users. BCC users may be used to identify more legitimate users. Using degree-based detection techniques and PageRank based detection techniques, the hijacked user accounts and spammer user accounts may be identified. The users' email sending and receiving behaviors may also be examined, and the subgraph structure may be used to detect stealthy attackers. From the social graph analysis, legitimate user accounts, malicious user accounts, and compromised user accounts can be identified.


Find Patent Forward Citations

Loading…