Intelligent Word-Based Spam Filter Detection Using Multi-Neural Networks
|
|
|
- Angelica Pierce
- 10 years ago
- Views:
Transcription
1 17 Intelligent Word-Based Spam Filter Detection Using Multi-Neural Networks Ann Nosseir 1, Khaled Nagati 1 and Islam Taj-Eddin 1 1 Faculty of Informatics and Computer Sciences British University in Egypt (BUE) El Shorouk City, Cairo, Egypt Abstract SPAM s have a direct cost in terms of time, server storage space, network bandwidth consumptions and indirect costs to protect privacy and security breaches. Efforts have been done to create new filters techniques to block SPAM, however spammers have developed tactics to avoid these filters. A constant update to these techniques is required. This paper proposes a novel approach which is a characters-word-based technique. This approach uses a multi-neural networks classifier. Each neural network is trained based on a normalized weight obtained from the ASCII value of the word characters. Results of the experiment show high false positive and low true negative percentages. Keywords: electronic mail ( ); spam filters; spam detection; Artificial Neural Network; stemming process. 1. Introduction SPAM is defined as an unwanted of electronic message [25] posted blindly to thousands of recipients [12] also known as junk s. They are unsolicited mails sent in bulk (unsolicited bulk ) with a hidden or forged identity of the sender, address, and header information [11][22]defines an electronic message as a "SPAM" if (A) the recipient's personal identity and context are irrelevant because the message is equally applicable to many other potential recipients; and (B) the recipient has not verifiably granted deliberate, explicit, and still-revocable permission for the mail to be sent in the information and message body. The problem is that SPAM imposes direct cost in terms of time, money, and storage space and indirect cost to protect privacy and security breaches. Users are inconvenienced by the SPAM because of the time they spend to filter legitimate from SPAM s. These unproductive hours can be calculated based on the number of SPAM s users read. Users could consume up to 4.33 hours per day dealing with SPAM [6]. For an organization, that could be translated into money terms by calculating the salary per hour. We can incur the operations and helpdesk running costs caused by the SPAM troubles [6]. The cost of computer and network resources consumed. These SPAM messages eat up a tremendous amount of storage space and cause bandwidth losses. There are also indirect costs in managing SPAM and protecting information. These costs are related to criminal acts caused by spamming. For example, financial theft, identity theft, data and intellectual property theft, virus and other malware infection, child pornography, fraud, and deceptive marketing are usually caused by SPAM messages that point to links to collect personal information, open porn Websites, or download virus [6]. These costs are calculated depending on the security strategy the company or the people employ to protect the information or equipment. Some countries such as Denmark, USA, and Canada have realized the economic impact of SPAM and have enacted different laws and legislations to protect businesses and individuals alike against SPAM [23]. For example, the USA CAN-SPAM Act is a law designated to control the assault of non-solicited pornography and marketing. It places restrictions and regulations to control spammers activities. It prohibits spammers from harvesting addresses and creating Bot-nets [3]. Besides the legislative approach, there are different approaches to control SPAM. One approach is to check the message body, IP address, or domain names to filter the legitimate from SPAM messages [19][8][4][9][21][2] for example, black-list and white-list and heuristic approaches. Using white-list and black-list approach, the filter is a content-based technique that recognizes words or patterns of message contents. The message is analyzed against the lists of the one that matches the content in the black-list and blocked while the other are listed in the in white-list and become legitimate s [7][20].
2 18 The heuristic approach examines the s content and compares it against thousands of pre-defined rules [24]. These rules are assigned a numerical score that weight the probability of the message being SPAM. Each received message is verified against the heuristic filtering rules. The score of the weight is then shared among users to filter the s [15]. In spite of the effectiveness of the current SPAM filters techniques used to solve the SPAM problems, spammers bypass these kinds of techniques by periodically changing their practices and behaviors [10]. A continuous enhancement to the current techniques and developing new ones are important to control SPAM. This paper examines related work in the area of Spam filters and gives a detailed description of our proposed solution, including procedures, results, and conclusions. We conclude with a discussion of the findings and some directions for future work. 2. Related Work Most of the techniques applied to reduce SPAM is the content-based filtering. These filters are Origin-Based Filters or Content Filtering. Both filters mainly classify the messages as SPAM by using different approaches. Origin based filters methods use network information such as IP and the address which are the most important pieces of network information available. The major types of origin-based filters are Blacklists, Whitelists, and Challenge/Response systems [5]. Content filters read the text to examine its content. They are called Keyword-Based Filters. There are several popular content filters such as: Bayesian filters, Rule Based Filters, Support Vector Machines (SVM) and Artificial Neural Network (ANN) [5][19]. Bayesian Filters are the most well known commercial machine learning approaches. They calculate and use the probability of certain words/phrases occurring in the known examples (messages) to categorize new examples (messages) [19]. Support Vector Machine SVM has prompted significant research into applying SPAM filtering [19][1][16]. SVMs are kernel methods whose central idea is to embed the data representing the text documents into a vector space where linear algebra and geometry can be performed [19][16]. SVMs attempt to construct a linear separation between two classes in this vector space [19]. Rule-Based Filters use a set of rules on the words included in the entire message (Header, Subject, and Body) [17]. The limitation of Rule- Based filtering is a rule set which is very large and static and not fully effective. The spammers can easily defeat these filters by word obfuscation, for example, the word Free could be modified to be F*R*E*E so it will pass the filters [5][19]. Even with the efforts to reduce the SPAM, it is still considered to be a threat. MessageLabs Intelligence reports that in 2010, the average global SPAM rate for the year was 89.1%, an increase of 1.4% compared with 2009 [13]. One reason could be the increase in the number of Internet users or spammers learn the filters techniques and continue their criminal behavior. This drives research to update their filters techniques and approaches. This work suggests a novel filter technique which is an intelligent content-based filter. It investigates the feasibility of creating a multi-neural network filter at the level of the word and combinations of the letters. 3. Proposed Solution This research looked into junk e- s of several academics within a department and generated three lists of three, four and five characters words. These lists had two categories of words, bad and good, extracted from the junk mails. To produce these lists, the message content has been processed- preprocessing phase- in three steps. In the first step the stop-word removal, a list of stop words such as articles (e.g. a, an and the ), prepositions (e.g. with or beside ) and conjunctions (e.g. and, or or for ) have been generated and compared against the message content to get rid of words that are mapped to the list [24]. In the second step, the stop-word removal, the work has generated another list of noise. Noises such as misspelling, misplaced space or embedding special characters are extracted. For an instance, the word Viagra could be written as V1agra, V iagra or Free into fr33 [23]. The message content has been compared against this list in order to remove the message noise. In the third step, the words in message went into a stemming process which reduces words into their basic form. The process strips the plural from nouns (e.g. apples to apple ), the suffixes from verbs (e.g. measuring to measure ) or other affixes. Originally proposed by Porter in 1980 [14], it defines stemming as a process for removing the commoner morphological and inflexional endings from words in English. A set of rules is applied iteratively to transform words to their roots or stems.
3 19 Afterwards, the words have been classified by its length and by being good or bad words. The bad words are commonly used in the junk messages (See Table 1). Table 1: Example of Good and Bad word in each list List Good word Bad word 3 characters word list AIR SEX 4 characters word list POET SHIT 5 characters word list CLAIM STRIP Using these lists, the research managed to train multineural networks on the bad and good words and test the results. The multi-networks identify the bad and good words in the message. If the message doesn t have bad words, it is classified as a good message i.e., HAMS. Otherwise, a weight is added to the bad words according to its category. We have categorized the words into advertisements, commercial, financial, and pornography category. Advertisements and commercial category gets value 1; financial and pornography categories get value 2. The value of the category could be changed by the users based on their requirements. Some users, for example, get annoyed by pornographic messages than commercials ones. Therefore, they can modify the weight of each category. The identified bad words by the Multi- networks are classified under their categories and then multiplied by their categories weights. A decision function based on the calculated value of the message could be used to decide whether the e- mail message is a SPAM or not (See Figure 1). 4. Multi-Neural Networks Classifier After the pre-processing phase, the data collected are processed. Each character in the word is converted into its ACSII values then, gets a normalized weight which is a value ranging from 0 to 1. We have used the following equation to get the normalized value for each character (See Equation 1). W i Char I ACSII : the normalized weight of the character : character : the character position (from 1- A 26-Z) : ACSII value of the character Classifier We created a network for each list. In other words, we had three characters, four characters, and 5 characters neural networks. All networks are back-propagation neural network. The three characters neural network has threelayers with 3 neurons in an input layer and 3 neurons in a hidden layer and 2 neurons in an output layer. The four characters neural network has three-layers with 4 neurons in an input layer and 4 neurons in a hidden layer and 2 neurons in an output layer. The five characters neural network has three-layers with 5 neurons in an input layer and 5 neurons in a hidden layer and 2 neurons in an output layer. The output neurons of all networks have values 1 and 0 representing bad and good words (see Figure 2). (1) Figure 1. The proposed approach Figure 2. Multi-neural networks classifier
4 Experiments 5.1 Data Test To train the multiple networks, there were three sets of sample data with length of 3, 4, and 5 characters. Each set contains 40 words divided into bad and good words where 50% of the words assigned bad and other 50% assigned good (see Table 1). Each sub network is trained on 80% of the data set and 20% of this data was used to test and validate the network results. 5.2 Results The sensitivity and specificity technique was used to analyze the results. Tables 2, 3, and 4 show the results in confusion matrices. Type I false positive and Type II true negative results were as follow and , and , and for the three, four and five character neural network respectively. The low false positive and high true negative results show the potential of the approach. Techniques such as the black list filter and white list filters treat the word as a black box, i.e., without considering the length of the word [12][20]. In our approach, we analyzed the relationship between the length of the word and its potential acceptance or rejection. We trained each sub-network on a set of words with specific word length. The sub-networks performance could improve the filter performance. Table 2: Three characters neural network t Three characters True False Positive (bad word) (Type I) blocks-legitimate users Negative (good word) (Type II) Table 3: Four characters neural network Four characters True False Positive (bad word) (Type I) Negative (good word) (Type II) Table 4: Five characters neural network Five characters True False Positive (bad word) (Type I) Negative (good word) (Type II) 6. Conclusions and Further Works Our novel approach uses a multi-neural networks classifier to identify bad and good words in the textual content of an . Words in the message are preprocessed before using the multi-neural networks classifier. The word goes through stop words and noise removal steps then stemming process step to extract the word root or stem. The experiment shows positive results. In the future, we would like to use a large sample database to thoroughly test the performance of the classifier. Additionally, consider a feedback from the users about the bad or good and retrain multi-neural networks classifier could improve results. To enhance the decision fusion quality of whether the is SPAM or not, the word category weight could be personalized to adapt with users requirements. Finally, incorporating this classifier as a step before implement a content filter, such as Black and White lists and Bayesian Filters [12][20][18]. References [1] A. Kolcz, J. Alspector, "SVM-based filtering of spam with content-specific misclassification costs", TextDM'2001, IEEE ICDM-2001 Workshop on Text Mining, pp , [2] A. Wiehes, "Comparing Anti Spam Methods", Master Thesis, Master of Science in Information Security, Department of Computer Science and Media Technology, Gjøvik University College, [3] A. Wosotowsky, E. Winkler, "Spam Report McAfee Labs Discovers and Discusses Key Spam Trends" 2009, Retrieved 10th Feb pam_1209.pdf [4] C. Gulyás, "Creation of a Bayesian network- based meta spam filter, using the analysis of different spam filters", Master Thesis, Budapest, 16th May [5] D. Cook, "Catching Spam before it arrives : Domain Specific Dynamic Blacklists", Australian Computer Society, ACM, [6] Ferris Reseacrh, "Spam, Spammers, and Spam Control A White Paper", March 2009, Retrieved 8th Feb ucts/enterprise/interscanmessagingsecuritysuite/wp01_antis pamferris_090311us.pdf [7] G. Dalkilic, D. Sipahi, M.H. Ozcanhan, "A simple yet effective spam blocking method", Proceedings of the 2nd international conference on Security of information and networks, pp , [8] G.R. Weinberg, "A System Analysis Of The Spam Problem", Master Thesis, Submitted To The Engineering Systems Division in Partial Fulfillment Of The Requirements For The Degree Of Master Of Science In Technology, The Massachusetts Institute Of Technology, [9] [10] J. María, G. Cajigas, E. Puertas, "Content Based SMS Spam Filtering", DocEng'06, ACM, Amsterdam, The Netherlands, /06/0010, October 10 13, [11] J. Wu, T. Deng, "Research in Anti-Spam Method Based on Bayesian Filtering", IEEE Pacific-Asia Workshop on
5 21 Computational Intelligence and Industrial Application, pp , [12] L. Lazzari, M. Mari, A. Poggi, "A collaborative and multi agent approach to filtering", IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 05), pp , [13] MessageLabs intelligence, Annual Security Report (2009) Retrieved 8th Feb [14] M.F. Porter, "An Algorithm for suffix Stripping", Available at [15] M. Xie, H. Yin, H. Wang, "An Effective defense against e- mail spam laundering", ACM. Retrieved 2006, from &rep=rep1&type=pdf [16] N. Cristiani, B. Scholkopf, "Support vector machines and kernel methods", The new generation of learning machines, AI Magazine 23(3), 31-41, [17] P. Graham, "better Bayesian Filtering", spam conference, [18] S. Delany, "Using Case-Based Reasoning for Spam Filtering", PhD Thesis, A thesis submitted to the Dublin Institute of Technology in fulfilment of the requirements for the degree of Doctor of Philosophy School of Computing, Dublin Institute of Technology,2006. [19] S.J. Delany, "Using Case-Based Reasoning for Spam Filtering", A PhD Thesis submitted to the Dublin Institute of Technology in fulfillment of the requirements for the degree of Doctor of Philosophy School of Computing, Dublin Institute of Technology, [20] S. Heron, "Technologies for spam detection", Network Security, pp , Jan [21] S. Hershkop, "Behavior-based Analysis with Application to Spam Detection", PhD Thesis, Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences, Columbia University, 2006 [22] Spamhaus, Definition of Spam, Retrieved 8th Feb [23] T.S Guzella, W.M. Caminhas, "A review of machine learning approaches to spam filtering", Expert system with Application, 36: , [24] T. Subramaniam, H.A. Jalab, A.Y. Taqa, "Overview of textual anti-spam filtering techniques", International Journal of the Physical Sciences, Vol. 5(12), pp , 4 October, 2010, Available online at [25] V.N. Vapnik, H. Druck, D. Wu, "Support Vector Machines for Spam Categorization", IEEE Transactions On Neural Networks, 10(5): , Ann Nosseir Ph.D. in Computer Science, University of Strathclyde; currently is a Lecturer at The Faculty of Informatics and Computer Science, The British University in Egypt. Khaled Nagati Ph.D. in Computer Science, Joint supervision: American University in Cairo (AUC) and Cairo University; currently is an Associate Professor at The Faculty of Informatics and Computer Science, The British University in Egypt. Islam Taj-Eddin Ph.D. in computer Science, The Graduate School and University Center, The City University of New York; currently is a Lecturer at The Faculty of Informatics and Computer Science, The British University in Egypt.
Data Pre-Processing in Spam Detection
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 11 May 2015 ISSN (online): 2349-784X Data Pre-Processing in Spam Detection Anjali Sharma Dr. Manisha Manisha Dr. Rekha Jain
Robin Sharma M.Tech, Computer Sci. Engg, RIMT-IET, Mandi Gobindgarh, Punjab, India. Principal Dr. Sushil Garg RIMT-MAEC, Mandigobindgarh Punjab, India
IRACST Engineering Science and Technology: An International Journal (ESTIJ), ISSN: 2250-3498, Spam Detection Using ICNEURO for Enhanced Accuracy Robin Sharma M.Tech, Computer Sci. Engg, RIMT-IET, Mandi
Unmasking Spam in Email Messages
Unmasking Spam in Email Messages Anjali Sharma 1, Manisha 2, Dr. Manisha 3, Dr. Rekha Jain 4 Abstract: Today e-mails have become one of the most popular and economical forms of communication for Internet
Spam detection with data mining method:
Spam detection with data mining method: Ensemble learning with multiple SVM based classifiers to optimize generalization ability of email spam classification Keywords: ensemble learning, SVM classifier,
A Personalized Spam Filtering Approach Utilizing Two Separately Trained Filters
2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology A Personalized Spam Filtering Approach Utilizing Two Separately Trained Filters Wei-Lun Teng, Wei-Chung Teng
SURVEY PAPER ON INTELLIGENT SYSTEM FOR TEXT AND IMAGE SPAM FILTERING Amol H. Malge 1, Dr. S. M. Chaware 2
International Journal of Computer Engineering and Applications, Volume IX, Issue I, January 15 SURVEY PAPER ON INTELLIGENT SYSTEM FOR TEXT AND IMAGE SPAM FILTERING Amol H. Malge 1, Dr. S. M. Chaware 2
A Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering
A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering Khurum Nazir Junejo, Mirza Muhammad Yousaf, and Asim Karim Dept. of Computer Science, Lahore University of Management Sciences
6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET) January- February (2013), IAEME
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976-6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET)
International Journal of Research in Advent Technology Available Online at: http://www.ijrat.org
IMPROVING PEFORMANCE OF BAYESIAN SPAM FILTER Firozbhai Ahamadbhai Sherasiya 1, Prof. Upen Nathwani 2 1 2 Computer Engineering Department 1 2 Noble Group of Institutions 1 [email protected] ABSTARCT:
Anti Spamming Techniques
Anti Spamming Techniques Written by Sumit Siddharth In this article will we first look at some of the existing methods to identify an email as a spam? We look at the pros and cons of the existing methods
Savita Teli 1, Santoshkumar Biradar 2
Effective Spam Detection Method for Email Savita Teli 1, Santoshkumar Biradar 2 1 (Student, Dept of Computer Engg, Dr. D. Y. Patil College of Engg, Ambi, University of Pune, M.S, India) 2 (Asst. Proff,
An Overview of Spam Blocking Techniques
An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now
How To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
AN ENHANCED APPROACH FOR CONTENT FILTERING IN SPAM DETECTION
AN ENHANCED APPROACH FOR CONTENT FILTERING IN SPAM DETECTION Shashi Kant Rathore Department of Computer Science & Engineering, Lovely Professional University, Jalandhar, Punjab [email protected] Jyoti
A Proposed Algorithm for Spam Filtering Emails by Hash Table Approach
International Research Journal of Applied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 4 (9): 2436-2441 Science Explorer Publications A Proposed Algorithm for Spam Filtering
About this documentation
Wilkes University, Staff, and Students have a new email spam filter to protect against unwanted email messages. Barracuda SPAM Firewall will filter email for all campus email accounts before it gets to
Journal of Information Technology Impact
Journal of Information Technology Impact Vol. 8, No., pp. -0, 2008 Probability Modeling for Improving Spam Filtering Parameters S. C. Chiemeke University of Benin Nigeria O. B. Longe 2 University of Ibadan
Who will win the battle - Spammers or Service Providers?
Who will win the battle - Spammers or Service Providers? Pranaya Krishna. E* Spam Analyst and Digital Evidence Analyst, TATA Consultancy Services Ltd. ([email protected]) Abstract Spam is abuse
IMPROVING SPAM EMAIL FILTERING EFFICIENCY USING BAYESIAN BACKWARD APPROACH PROJECT
IMPROVING SPAM EMAIL FILTERING EFFICIENCY USING BAYESIAN BACKWARD APPROACH PROJECT M.SHESHIKALA Assistant Professor, SREC Engineering College,Warangal Email: [email protected], Abstract- Unethical
The Network Box Anti-Spam Solution
NETWORK BOX TECHNICAL WHITE PAPER The Network Box Anti-Spam Solution Background More than 2,000 years ago, Sun Tzu wrote if you know yourself but not the enemy, for every victory gained you will also suffer
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO THE SENDER MAIL SERVER
MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO THE SENDER MAIL SERVER Alireza Nemaney Pour 1, Raheleh Kholghi 2 and Soheil Behnam Roudsari 2 1 Dept. of Software Technology
Spam Filtering and Removing Spam Content from Massage by Using Naive Bayesian
www..org 104 Spam Filtering and Removing Spam Content from Massage by Using Naive Bayesian 1 Abha Suryavanshi, 2 Shishir Shandilya 1 Research Scholar, NIIST Bhopal, India. 2 Prof. (CSE), NIIST Bhopal,
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling. White Paper
When Reputation is Not Enough: Barracuda Spam Firewall Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
A MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM E-MAIL FILTERING 1 2
UDC 004.75 A MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM E-MAIL FILTERING 1 2 I. Mashechkin, M. Petrovskiy, A. Rozinkin, S. Gerasimov Computer Science Department, Lomonosov Moscow State University,
How To Stop Spam From Being A Problem
Solutions to Spam simple analysis of solutions to spam Thesis Submitted to Prof. Dr. Eduard Heindl on E-business technology in partial fulfilment for the degree of Master of Science in Business Consulting
Antispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
ECUE: A Spam Filter that Uses Machine Learning to Track Concept Drift
ECUE: A Spam Filter that Uses Machine Learning to Track Concept Drift Sarah Jane Delany 1 and Pádraig Cunningham 2 and Barry Smyth 3 Abstract. While text classification has been identified for some time
Intent Based Filtering: A Proactive Approach Towards Fighting Spam
Intent Based Filtering: A Proactive Approach Towards Fighting Spam By Priyanka Agrawal Abstract-The cyber security landscape has changed considerably over the past few years. Since 2003, while traditional
Spam Detection and the Types of Email
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Spam Detection
Spam filtering. Peter Likarish Based on slides by EJ Jung 11/03/10
Spam filtering Peter Likarish Based on slides by EJ Jung 11/03/10 What is spam? An unsolicited email equivalent to Direct Mail in postal service UCE (unsolicited commercial email) UBE (unsolicited bulk
Context Adaptive Scanning Engine: Protecting Against the Broadest Range of Blended Threats
Context Adaptive Scanning Engine: Protecting Against the Broadest Range of Blended Threats W h i t e P a p e r Executive Summary The email and Web security problem can no longer be addressed by point solutions
How To Filter Email From A Spam Filter
Spam Filtering A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction Spam filtering is a catch- all term that describes the steps that happen to an email between a sender and a receiver
Overview of textual anti-spam filtering techniques
International Journal of the Physical Sciences Vol. 5(12), pp. 1869-1882, 4 October, 2010 Available online at http://www.academicjournals.org/ijps ISSN 1992-1950 2010 Academic Journals Full Length Research
Machine Learning in Spam Filtering
Machine Learning in Spam Filtering A Crash Course in ML Konstantin Tretyakov [email protected] Institute of Computer Science, University of Tartu Overview Spam is Evil ML for Spam Filtering: General Idea, Problems.
Email Spam Detection A Machine Learning Approach
Email Spam Detection A Machine Learning Approach Ge Song, Lauren Steimle ABSTRACT Machine learning is a branch of artificial intelligence concerned with the creation and study of systems that can learn
Understanding Proactive vs. Reactive Methods for Fighting Spam. June 2003
Understanding Proactive vs. Reactive Methods for Fighting Spam June 2003 Introduction Intent-Based Filtering represents a true technological breakthrough in the proper identification of unwanted junk email,
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling
When Reputation is Not Enough: Barracuda Spam & Virus Firewall Predictive Sender Profiling As spam continues to evolve, Barracuda Networks remains committed to providing the highest level of protection
The Radicati Group, Inc. ...
. The Radicati Group, Inc. 1900 Embarcadero Rd., Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com The Radicati Group, Inc. An Analyst Review of Hotmail Anti-Spam
When Reputation is Not Enough. Barracuda Email Security Gateway s Predictive Sender Profiling. White Paper
When Reputation is Not Enough Barracuda Email Security Gateway s Predictive Sender Profiling White Paper As spam continues to evolve, Barracuda Networks remains committed to providing the highest level
Eiteasy s Enterprise Email Filter
Eiteasy s Enterprise Email Filter Eiteasy s Enterprise Email Filter acts as a shield for companies, small and large, who are being inundated with Spam, viruses and other malevolent outside threats. Spammer
Towards Eradication of SPAM: A Study on Intelligent Adaptive SPAM Filters
Towards Eradication of SPAM: A Study on Intelligent Adaptive SPAM Filters Tarek Hassan (B.Sc. Computer Science, Egypt) This thesis is presented for the degree of Master of Computer Science Murdoch University,
Lan, Mingjun and Zhou, Wanlei 2005, Spam filtering based on preference ranking, in Fifth International Conference on Computer and Information
Lan, Mingjun and Zhou, Wanlei 2005, Spam filtering based on preference ranking, in Fifth International Conference on Computer and Information Technology : CIT 2005 : proceedings : 21-23 September, 2005,
1. INTRODUCTION. Keywords: SPAM, Arabic, Filters, E-Mail, ISPs, English.
Email SPAM Related Issues and Method of Controlling Used by Internet Service Providers [ISPs] in Saudi Arabia Hasan S. Alkahtani Robert Goodwin Paul G. Stephen EMAIL SPAM RELATED ISSUES AND METHODS OF
Combining SVM classifiers for email anti-spam filtering
Combining SVM classifiers for email anti-spam filtering Ángela Blanco Manuel Martín-Merino Abstract Spam, also known as Unsolicited Commercial Email (UCE) is becoming a nightmare for Internet users and
Adaptive Filtering of SPAM
Adaptive Filtering of SPAM L. Pelletier, J. Almhana, V. Choulakian GRETI, University of Moncton Moncton, N.B.,Canada E1A 3E9 {elp6880, almhanaj, choulav}@umoncton.ca Abstract In this paper, we present
REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS
REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS Rami Khasawneh, Acting Dean, College of Business, Lewis University, [email protected] Shamsuddin Ahmed, College of Business and Economics, United Arab
Ipswitch IMail Server with Integrated Technology
Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these
Email Marketing Do s and Don ts A Sprint Mail Whitepaper
Email Marketing Do s and Don ts A Sprint Mail Whitepaper Table of Contents: Part One Email Marketing Dos and Don ts The Right Way of Email Marketing The Wrong Way of Email Marketing Outlook s limitations
SpamNet Spam Detection Using PCA and Neural Networks
SpamNet Spam Detection Using PCA and Neural Networks Abhimanyu Lad B.Tech. (I.T.) 4 th year student Indian Institute of Information Technology, Allahabad Deoghat, Jhalwa, Allahabad, India [email protected]
ECUE: A Spam Filter that Uses Machine Learning to Track Concept Drift
ECUE: A Spam Filter that Uses Machine Learning to Track Concept Drift Sarah Jane Delany 1 and Pádraig Cunningham 2 Abstract. While text classification has been identified for some time as a promising application
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
Identifying Potentially Useful Email Header Features for Email Spam Filtering
Identifying Potentially Useful Email Header Features for Email Spam Filtering Omar Al-Jarrah, Ismail Khater and Basheer Al-Duwairi Department of Computer Engineering Department of Network Engineering &
Emerging Trends in Fighting Spam
An Osterman Research White Paper sponsored by Published June 2007 SPONSORED BY sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone: +1 253 630 5839 Fax: +1 866
Recurrent Patterns Detection Technology. White Paper
SeCure your Network Recurrent Patterns Detection Technology White Paper January, 2007 Powered by RPD Technology Network Based Protection against Email-Borne Threats Spam, Phishing and email-borne Malware
Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education
White Paper Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education Online criminals are constantly looking for new ways to reach their targets
MDaemon configuration recommendations for dealing with spam related issues
Web: Introduction MDaemon configuration recommendations for dealing with spam related issues Without a doubt, our most common support queries these days fall into one of the following groups:- 1. Why did
How to keep spam off your network
GFI White Paper How to keep spam off your network What features to look for in anti-spam technology A buyer s guide to anti-spam software, this white paper highlights the key features to look for in anti-spam
Email Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
Solutions IT Ltd Virus and Antispam filtering solutions 01324 877183 [email protected]
Contents Reduce Spam & Viruses... 2 Start a free 14 day free trial to separate the wheat from the chaff... 2 Emails with Viruses... 2 Spam Bourne Emails... 3 Legitimate Emails... 3 Filtering Options...
COMBATING SPAM. Best Practices OVERVIEW. White Paper. March 2007
COMBATING SPAM Best Practices March 2007 OVERVIEW Spam, Spam, More Spam and Now Spyware, Fraud and Forgery Spam used to be just annoying, but today its impact on an organization can be costly in many different
Achieve more with less
Energy reduction Bayesian Filtering: the essentials - A Must-take approach in any organization s Anti-Spam Strategy - Whitepaper Achieve more with less What is Bayesian Filtering How Bayesian Filtering
Sender and Receiver Addresses as Cues for Anti-Spam Filtering Chih-Chien Wang
Sender and Receiver Addresses as Cues for Anti-Spam Filtering Chih-Chien Wang Graduate Institute of Information Management National Taipei University 69, Sec. 2, JianGuo N. Rd., Taipei City 104-33, Taiwan
Spam Filtering Methods for Email Filtering
Spam Filtering Methods for Email Filtering Akshay P. Gulhane Final year B.E. (CSE) E-mail: [email protected] Sakshi Gudadhe Third year B.E. (CSE) E-mail: [email protected] Shraddha A.
Evios. A Managed, Enterprise Appliance for Identifying and Eliminating Spam
Evios A Managed, Enterprise Appliance for Identifying and Eliminating Spam Introduction Electronic messaging (e-mail) is a mission-critical business tool that has been compromised by the proliferation
Email Filter for Spam Mail: A Review
Email Filter for Spam Mail: A Review Amar V. Sable 1 and Prof. Vijay S. Gulhane 2 1,2 Computer Science & Engineering Department, Sant Gadge Baba University, Amravati SIPNA College of Engineering & Technology,
Government of Canada Managed Security Service (GCMSS) Annex A-5: Statement of Work - Antispam
Government of Canada Managed Security Service (GCMSS) Date: June 8, 2012 TABLE OF CONTENTS 1 ANTISPAM... 1 1.1 QUALITY OF SERVICE...1 1.2 DETECTION AND RESPONSE...1 1.3 MESSAGE HANDLING...2 1.4 CONFIGURATION...2
CAS-ICT at TREC 2005 SPAM Track: Using Non-Textual Information to Improve Spam Filtering Performance
CAS-ICT at TREC 2005 SPAM Track: Using Non-Textual Information to Improve Spam Filtering Performance Shen Wang, Bin Wang and Hao Lang, Xueqi Cheng Institute of Computing Technology, Chinese Academy of
Anti Spam Best Practices
53 Anti Spam Best Practices Anti Spam LIVE Service: Zero-Hour Protection An IceWarp White Paper October 2008 www.icewarp.com 54 Background As discussed in the IceWarp white paper entitled, Anti Spam Engine:
Anti-Spam White Paper
www.ealaddin.com Anti-Spam White Paper 2003 Aladdin Knowledge Systems. All rights reserved 1-14 Table of Content PREFACE... 3 THE EMAIL SPAM PROBLEM... 3 LEGAL ISSUES... 4 HOW CAN SPAM BE STOPPED?... 5
Cosdes: A Collaborative Spam Detection System with a Novel E- Mail Abstraction Scheme
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 9 (September 2012), PP 55-60 Cosdes: A Collaborative Spam Detection System with a Novel E- Mail Abstraction Scheme
GFI Product Comparison. GFI MailEssentials vs Barracuda Spam Firewall
GFI Product Comparison GFI MailEssentials vs Barracuda Spam Firewall GFI MailEssentials Barracuda Spam Firewall Integrates closely with Microsoft Exchange Server 2003/2007/2010 Integrates closely with
A Case-Based Approach to Spam Filtering that Can Track Concept Drift
A Case-Based Approach to Spam Filtering that Can Track Concept Drift Pádraig Cunningham 1, Niamh Nowlan 1, Sarah Jane Delany 2, Mads Haahr 1 1 Department of Computer Science, Trinity College Dublin 2 School
An Anti-Spam Action Plan for Canada. Industry Canada
An Anti-Spam Action Plan for Canada Industry Canada May 2004 The Problem An Anti-Spam Action Plan for Canada In just a few years, unsolicited commercial e-mail -- now generally known as spam 1 -- has gone
