What is it about?

This study compares various machine learning algorithms and selects two methods, namely the clustering algorithm k-means and bdscan, as well as the decision tree algorithm for data learning. In one approach, normal user login data is integrated with enterprise email log data. The data is first statistically analyzed and filtered, followed by quantifying data characteristics using information entropy. Subsequently, machine learning algorithms are employed for classification, and the results are visualized for display. In another approach, labeled raw data is used to train a model using the decision tree algorithm. By comparing the two analysis results, a more accurate model can be obtained. These analytical methods can help enterprises strengthen email security and defend against low-frequency and distributed brute-force attacks.

Featured Image

Why is it important?

These analytical methods can help enterprises strengthen email security and defend against low-frequency and distributed brute-force attacks.

Perspectives

The paper compares various machine learning algorithms and selects two methods, namely the clustering algorithm k-means and bdscan, as well as the decision tree algorithm for data learning to help enterprises strengthen email security and defend against low-frequency and distributed brute-force attacks.

Liu Xiaomei

Read the Original

This page is a summary of: Research on techniques for detecting brute-force attacks on corporate email, Journal of Computational Methods in Sciences and Engineering, June 2024, IOS Press,
DOI: 10.3233/jcm-247147.
You can read the full text:

Read

Contributors

The following have contributed to this page