CAFE - Collaborative Agents for Filtering s

Size: px
Start display at page:

Download "CAFE - Collaborative Agents for Filtering E-mails"

Transcription

1 CAFE - Collaborative Agents for Filtering s Lorenzo Lazzari, Marco Mari and Agostino Poggi Dipartimento di Ingegneria dell Informazione Università degli Studi di Parma Parco Area delle Scienze 181/A, Parma, Italy {lazzari, mari, poggi}@ce.unipr.it Abstract CAFE (Collaborative Agents for Filtering s) is a multi-agent system to collaboratively filter spam from users mail stream. CAFE associates a proxy agent with each user, and this agent represents a sort of interface between the user s client (i.e. Microsoft Outlook, Eudora, etc.) and the server. With the support of other types of agents, the proxy agent makes a classification of new messages into three categories: ham (good messages), spam and spam-presumed. The system analyzes every single using essentially three kinds of approach: a first approach based on the usage of an hash function, a static approach using DNSBL (DNSbased Black Lists) databases and a dynamic approach based on a Bayesian algorithm. 1. Introduction In the past few years, Internet Technology has affected our daily communication style in a radical way: the electronic mail ( ) concept is used very extensively for communications nowadays. This technology makes it possible to communicate with many people simultaneously in a way so easy and cheap that it s currently considered as the first worldwide medium into business sector. However, the abuse of s has the drawback that the volume of s that show up in mailboxes has been exponentially increasing. Moreover, many s are received by users without their desire: spam mail (or junk mail or bulk mail ) is the general name used to denote these types of . Spam mails, by definition, are the electronic messages posted blindly to thousands of recipients, usually for advertisement, and represent one of the most serious and urgent information overload problems. As time goes on, much more percentage of the s is treated as spam and this increases the seriousness of the problem. In fact, apart from wasting time, spam costs money to users with dial-up connections, wastes bandwidth, and may expose under-aged recipients to unsuitable content. In 1998, Cranor and LaMacchia found that about 10% of the incoming s to the network was spam; in 2000, according to the WorldTalk Corp., over 60 million business people have been overwhelmed since about 30% of total is spam [1]. More recently, Eugene Kaspersky, director of the antivirus research near the Kaspersky Labs Society, estimates that, in the spring of 2004, considering the whole s on the Internet, the percentage of spam was about 70%, while other people estimate a percentage still higher. Spam filtering is a difficult classification task for a variety of reasons. Spam is constantly changing as spam on new topics emerges. Also, spammers attempt to make their messages as indistinguishable from legitimate as possible and change the patterns of spam to foil the antispam filters. Industrial as well as academic research has faced this problem in terms of automated filtering methods in order to distinguish legitimate from spamming. In this paper, we present a multi-agent system, called CAFE (Collaborative Agents for Filtering s), studied to resolve the spamming problem using a collaborative approach. CAFE is developed as an implementation of a more general system, called RAVE (Remote Assistance Virtual Environment) [13][14], supporting communities of users during shared and personal projects. The paper is organized as follows: section 2 gives a survey of the actual anti-spam methods, section 3 presents in a detailed way the CAFE system. Finally, in section 4, we give some concluding remarks and we present some similarity between CAFE and some other existing antispam systems.

2 2. State of the art Many methods have been proposed to solve the problem of spamming, but they are not completely satisfactory. We can group them into two broad categories: static methods and dynamic methods. Static methods base their spam mail identification on a predefined address list or on a comparison of every message with the databases of DNSBL (DNS-based Black Lists) suppliers [2]. For instance, the mail server hot mail allows a person to receive an only if his/her address is one of the recipient addresses, otherwise treats the as spam [3]. Needless to say, most spam mails pass this test and some important mails are treated as spam. Also, some servers try to collect addresses which are reported as spammers (people who send spam messages) and treat the s coming from them as spam. However, spammers are all aware of most of these methods. All these solutions lack the dynamic structure of the problem, which highly limits their effectiveness. Also using the DNSBL databases the results are not satisfactory, because these databases aren t realized considering the type of message sent and, also in this case, every is treated in the same way, independently from its structure and content. Some more complex approaches are dynamic in nature. They take the contents of the s into consideration and adapt their spam filtering decisions with respect to these contents. Most of them use general text categorization techniques by implementing machine learning methods. Several machine learning algorithms have been applied to text categorization (e.g. Lewis, 1992 [4]; Apte and Damerau, 1994 [5]; Dagan et al., 1997 [6]). These algorithms learn to classify documents into fixed categories, based on their content, after being trained on manually categorized documents. Algorithms of this kind have also been used to thread (Lewis and Knowles, 1997), classify into folders (Cohen, 1996 [7]; Payne & Edwards, 1997), identify interesting news articles (Lang, 1995), etc. To the best of our knowledge, however, only one attempt has ever been made to apply a machine learning algorithm to anti-spam filtering (Sahami et al., 1998 [8]). Sahami et al. trained a Naive Bayesian classifier (Duda and Hart, 1973; Mitchell, 1997) on manually categorized legitimate and spam messages, reporting impressive precision and recall on unseen messages. It may be surprising that text categorization can be effective in anti-spam filtering: unlike other text categorization tasks, it is the act of blindly mass-mailing a message that makes it spam, not its actual content. Nevertheless, it seems that the language of spam constitutes a distinctive genre, and that spam messages are often about topics rarely mentioned in legitimate messages, making it possible to train a text classifier for anti-spam filtering. Bayesian algorithms have been often used by training a classifier on manually categorized normal and spam mails (e.g. Androutsopoulos et al., 2000 [9]; McCallum and Nigam, 1998 [10]; Sanchez et al., 2002 [11]), but they present some limitation: a main drawback of Bayesian filters is that they have the hardest time blocking messages that do not lexically look like spam, e.g., messages composed of a single line of text inviting the recipient to check out an URL. Also, the Bayesian techniques may exhibit a latency both in the initial training and in responding to messages built on previously unknown vocabularies. Finally, Bayesian filters can be bypassed introducing noise within the most recognizable terms and adding a relatively high number of random words to reduce detection power. Alternately to the content-based approach described, it s been developing an innovative collaborative approach that does not consider the content of the but depends on the collaboration of groups of users who share information about spam. When a new spam message appears, an early receiver of the spam shares a signature for that spam (typically one or more hash codes) with the rest of the group. If the other users also receive this message their filters can identify it as spam based on the shared signature. In this approach there are two key issues; an effective signature mechanism needs to be devised and a process for sharing these signatures needs to be developed. Spammers insert random characters into messages to foil hash-based signatures so flexible and clever signatures are needed. The sharing of these signatures can be centralised through a clearing-house or it can be truly distributed using peer-to-peer techniques. This solution has achieved considerable success as it overcomes the single point of failure typical of centralized architecture. The dominant system in this area is Vipul s Razor [12], also available as SpamNet. Vipul s Razor uses a centralized clearing-house for sharing signatures and much of the research has focused on developing sophisticated signatures. Starting from this collaborative approach, we introduce a multi agent-system called CAFE (Collaborative Agents for Filtering s) in order to solve information overload problem caused by spam e- mails. CAFE is an implementation of a more general architecture called RAVE (Remote Assistance Virtual Environment) [13][14], a Web and multi-agent based system to support users during common projects or activities.

3 3. CAFE System CAFE is a multi-agent system to collaboratively filter spam from users mail stream. CAFE associates an Proxy Agent (EPA) with each user, this agent represents a sort of interface between the client (i.e. Microsoft Outlook, Eudora etc.) and the server. This agent has a basic role in the whole system, because it is the responsible of the final classification of s downloaded from the server into three categories: ham (good messages), spam and spam-presumed. To take this decision, EPAs are supported by other types of agents, which analyze every single using essentially three kinds of approach: a first approach based on the usage of an hash function, a static approach using the DNSBL databases and a dynamic approach based on a Bayesian algorithm. Also the system users have a fundamental role, because their careful support let the system s efficacy grow System Agents The system is based on eight different kinds of agents: Proxy Agents, Digest Managers, Analysis Managers, DNSBL Agents, Bayesian Filter Agents, User Profile Managers, Starter Agent, Directory Facilitator. Proxy Agents, which are set between the client and the server, represent the proxy entity of the system. An EPA becomes active when the related user is on-line and opens his client software. While in a traditional system the client connects to the server and downloads every new messages present in the user mailbox, here there s not this direct connection, but the new messages are downloaded by the EPA that, after an analysis phase, classifies them into different types and transfer them to the mail client. To classify the s, EPAs are supported by other types of agents, in particular the analysis phase is performed on different levels with the collaboration of Digest Managers, Analysis Managers, Bayesian Filter Agents and DNSBL Agents. Digest Managers are responsible of the first approach in s classification. This approach is based on the comparison of the s digest with the ones known as spam. The spam digests are stored in a database. A digest of an is the representation of the message in the form of a single string of digits, created using a formula called a one-way hash function. Figure 1 gives a graphical representation of this method. Fig. 1. digest. Analysis Managers are responsible of the second level analysis, performed if the passes the first phase (e.g. the digest is not present in the spam digests database). The second level consists in an approach more classic based on a static and on a dynamic method (see section 2). The Analysis Managers receive s from Proxy Agents and forward them to DNSBL Agents, for the static analysis, and to Bayesian Filter Agents, for the dynamic Bayesian algorithm-based analysis. On the base of the results of the two analysis, Analysis Managers give a score to each message that indicates the probability of spamming and communicates it to the related Proxy Agent. DNSBL Agents perform the static analysis of the e- mails. As the agents name says, the analysis is based on a comparison between the s sources and the lists of blacklisted IPs and domains supplied by DNS-based Black Lists databases. After this static analysis, to each message is given a score (we call this score static score ) and it s communicated by DNSBL Agents to Analysis Managers. Static score value for each is 1 if DNSBL Agents finds a match, 0 otherwise. Bayesian Filter Agents are responsible of the dynamic analysis. They take into consideration the contents of the s and adapt their spam filtering decisions with respect to these contents. As every classical Bayesian filter, a Bayesian Filter Agent, specific for one system user, needs an initial training to build a specific vocabulary of terms for the related user, and enriches this vocabulary during the system life. Using Naive Bayes probabilistic algorithms, these agents calculate, for each , a global probability that the message content is spam and, analogously to the previous static analysis, send it to Analysis Managers. We call this value, included between 0 and 1, dynamic score.

4 Fig. 2. CAFE platform architecture. For each analyzed, on the base of the related static and dynamic scores, Analysis Managers calculate a global score and send it to the right EPA for the final classification (see section 3.2 for details). User Profile Managers are responsible of maintaining the users profile updating it in relation to the user choices in received messages rating. Starter Agent is responsible for activating an Proxy Agent and the right Bayesian Filter Agent when a user wants to connect to his mailbox. In the end, Directory Facilitator is responsible to inform an agent about the address of the other agents active in the system (e.g., an Proxy Agent can ask about the address of a Digest Managers, of an Analysis Manager, etc.). Figure 2 gives a graphical representation of the CAFE architecture, focusing on the interactions between agents. Note that a CAFE platform can be distributed on different computation nodes. Moreover, in figure 2 groups of three users or agents mean that there can be one or more users and agents System Behavior A quite complete description of the system behavior can be given showing the analysis and categorization process of a single . Before describing the system behavior, we have to discuss an important consideration: as we said in section 3, the final messages classification consists in three types of messages: ham, spam and spam-presumed. This because we think that a binary classification in ham and spam is too restrictive especially when the message passes the first level analysis and it s necessary a more classical analysis based on static and dynamic methods which frequently give not satisfactory results. For this reason, an is treated as spam only if it doesn t pass the first level analysis, that is the s digest is

5 already present in the spam digests database. Instead, if an is signaled as probable spam only by the Analysis Manager, it s treated by the system as spampresumed. Once the messages are divided into the three types, the user has the fundamental role to control the spam-presumed folder and, for each , he has to notify the system (by a simply forward) on the correct type of the message (spam or not). Similarly, the user has to inform the system if he founds some spam e- mail in the ham folder and vice versa. The description of the system behavior can be divided in the following steps: 1) user log-in and Proxy Agent activation; 2) digest-based analysis; 3) static/dynamic analysis (if necessary); 4) classification and user valuation. User log-in and Proxy Agent activation: when an on-line user, by his client software, requests to download mew messages from his mailbox, the Proxy Agent and the Bayesian Filter Agent are activated by the Starter Agent. The proxy Agent, receiving user s username and password from the client, connects to the server, takes the new (we suppose that user s mailbox contains only one new message), and calculates the message digest. digest-based analysis: the message digest is given to a Digest Manager, which is responsible of the first level analysis. If it s found a match between the e- mail digest and one of spam digests present in database, the message is certainly spam, so the Proxy Agent labels the as spam (e.g. by writing SPAM in the subject) and sends it to the client. Nevertheless, if the Digest Manager agent doesn t report a match, it s necessary to perform the second level analysis. Static/dynamic analysis: the message is sent to an Analysis Manager agent, which is the responsible of the second level analysis of the message. At this point the e- mail is subjected to two different types of analysis methods: a DNSBL-based static method, performed by a DNSBL Agent, and a dynamic method, performed by the Bayesian Filter Agent related to the user. As we briefly said in the previous section, depending to the analysis results, the DNSBL Agent and the Bayesian Filter Agent report to the Analysis Manager a static ad a dynamic score indicating the spamming probability. On the base of these two values, using a threshold-based approach, the Analysis Manager decides if the analyzed message is ham or spam-presumed, and communicates this result to the Proxy Agent responsible of that message. Similarly to the spam case, if the is characterized as spam-presumed, the subject is changed in SPAM-PRESUMED, while if the message analyzed is a legitimate massage, it s send unchanged to the client. classification and user valuation: as we said, the result of the whole analysis is recapitulated on the final message subject, so, in a simple way, the mail client can divide different types of (ham, spam and spam-presumed) into different folders by a simple rule based on the message subject. A basic aspect of the system is the importance of users evaluations. In fact, users have a fundamental role, because if they collaborate to give a good support, the system efficaciousness can become maximum in a very short time. The users role is to notify the system about the messages characterized as spam-presumed and to inform if they find something wrong in the classification. More in detail, we can divide different cases: 4.1) a spam-presumed message is spam; 4.2) a spam-presumed message is ham; 4.3) an ham message is spam; 4.4) a spam message is ham. A spam-presumed message is spam: the message digest is inserted in the spam digests database, so in the future a similar message will be directly treated as spam. Besides, the Bayesian Filter Agent related to the user is consequently trained. A spam-presumed message is ham: the Personal Bayesian Agent related to the user is notified to treat, in the future, a similar as ham. An ham message is spam: as the fist case, the message digest is inserted in the spam digests database and the Bayesian Filter Agent related to the user is consequently trained. A spam message is ham: if a message is treated as spam by the system, it means that its digest is present into the spam digests database, so in this case the message digest is immediately deleted from the database. Also in this case, the Bayesian Filter Agent related to the user is notified. Because the system efficaciousness is highly affected by users behaviour in spam reporting, the system (e.g. User Profile Managers) maintains a profile of system users, in which every user is characterized by a percentage of credibility. This value changes in relation to the number of unreliable spam reports performed by the user (i.e. if a user notifies the system as spam an e- mail that one hundred of other users treat as ham, it s an unreliable report). When this value becomes lower than a certain threshold, every spam report performed by the user is

6 ignored, and the related digest is not inserted in the spam digests database. 4. Conclusions In this paper, we present a system called CAFE (Collaborative Agents for Filtering s) with the aim of filtering s downloaded by the system users from the server to find spam messages. With this multiagent architecture we propose a solution to the spamming problem, that it s becoming one of the most serious information overloading problems, joining together essentially two components: a collaborative approach based on the users spam notifications, and a multi-agent architecture, responsible of messages analysis performed on different levels. Taking a look at some related work, we find other systems that try to resolve the spam problem in a similar way. In particular, Vipul s Razor [12] is a distributed, collaborative, spam detection and filtering network. Similarly to CAFE, Razor, through users contribution, establishes a distributed catalogue of spam in propagation that is consulted by clients to filter out known spam. Another interesting system that presents some similarity with CAFE is the multi-agent architecture described in [15]. Also in this case, we have a multi-agent system studied with the aim to collaboratively filter spam from users mail stream. The multi-agent architecture designed is very simple, there are a personal agent associated to each user ad a facilitator. Personal agents communicate with the others as well as a facilitator in order to share their own knowledge and the facilitator accumulate all pieces of feature information about spam posted by personal agents. Nevertheless, here the shared information is only related to a Beyasian analysis of the messages, it s not used any hash function-based method. In these works, we find the same two components (e.g. collaborative approach and multi-agent architecture) present in CAFE; however, none of them provides the integration of different approaches in s analysis, and none of them presents the advanced level of agents and users collaboration that mark CAFE as a complete and effective anti-spam system. References [1] Internet Corporate Usage Report. Available from 0.html, [2] Information, commentary and opinion on DNSBL spam blacklists. Available from [3] MSN Hotmail. Available from [4] D. Lewis. Feature selection and feature extraction for text categorization. Proceedings of Workshop on Speech and Natural Language, Harriman, New York, pages , [5] C. Apte, F. Damerau, S.M. Weiss. Automated learning of decision rules for text categorization. ACM Trans. Inf. Syst., 12 (3), , [6] I. Dagan, Y. Karov, D. Roth. Mistake-driven learning in text categorization. In C. Cardie, R. Weischedel (Eds.) Proceedings of Conference on Empirical Methods in Natural Language Processing, Rhode Island, pages 55-63, [7] W. Cohen. Learning rules that classify . In M.A. Hearst, H. Hirsh (Eds.) Proceedings of AAAI Spring Symposium on Machine Learning in Information Access, Stanford, CA, pages 18-25, [8] M. Sahami, S. Dumais, D. Heckerman, E. Horvitz. A bayesian approach to filtering junk . AAAI Workshop on Learning for Text Classification, [9] I. Androutsopoulos, J. Koutsias, K.V. Chandrinos, G. Paliouras, D. Spyropoulos. An evaluation of Naive Bayesian anti-spam filtering. In G. Potamias, V. Moustakis, M. Van Someren (Eds.) Proceedings of Workshop on Machine Learning in the New Information Age, Barcelona, pages 9-17, [10] A. McCallum, K Nigam. A comparison of event models for Naive Bayes text classification. In M. Sahami (Ed) Proceedings of AIII Workshop on Learning for Text Categorization, Madison, WI, pages 41-48, [11] S.N. Sanchez, E. Triantaphyllou, D. Kraft. A feature mining based approach for the classification of text documents into disjoint classes. Inf. Process. Manage., 38 (4), pages , [12] Vipul's Razor spam detection and filtering network. Available from [13] M. Mari, A. Negri, A. Poggi. Agent-Based Support for Open Communities. Submitted to AAMAS, Utrecht, the Netherlands, [14] M. Mari, L. Lazzari, A. Negri, A. Poggi, P. Turci. A Multi- Agent System to Support Remote Software Development. WOA, Torino, [15] J. Jung, G. Jo. Collaborative Junk Filtering Based on Multi-agent Systems. Web Communication Technologies and Internet-Related Social Issues - HIS, 2003.

A Case-Based Approach to Spam Filtering that Can Track Concept Drift

A Case-Based Approach to Spam Filtering that Can Track Concept Drift A Case-Based Approach to Spam Filtering that Can Track Concept Drift Pádraig Cunningham 1, Niamh Nowlan 1, Sarah Jane Delany 2, Mads Haahr 1 1 Department of Computer Science, Trinity College Dublin 2 School

More information

A MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM E-MAIL FILTERING 1 2

A MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM E-MAIL FILTERING 1 2 UDC 004.75 A MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM E-MAIL FILTERING 1 2 I. Mashechkin, M. Petrovskiy, A. Rozinkin, S. Gerasimov Computer Science Department, Lomonosov Moscow State University,

More information

Adaptive anti-spam filtering for agglutinative languages: a special case for Turkish

Adaptive anti-spam filtering for agglutinative languages: a special case for Turkish Pattern Recognition Letters 25 (4) 1819 1831 www.elsevier.com/locate/patrec Adaptive anti-spam filtering for agglutinative languages: a special case for Turkish Levent Özgür, Tunga Güngör *, Fikret Gürgen

More information

Bayesian Spam Filtering

Bayesian Spam Filtering Bayesian Spam Filtering Ahmed Obied Department of Computer Science University of Calgary amaobied@ucalgary.ca http://www.cpsc.ucalgary.ca/~amaobied Abstract. With the enormous amount of spam messages propagating

More information

CAS-ICT at TREC 2005 SPAM Track: Using Non-Textual Information to Improve Spam Filtering Performance

CAS-ICT at TREC 2005 SPAM Track: Using Non-Textual Information to Improve Spam Filtering Performance CAS-ICT at TREC 2005 SPAM Track: Using Non-Textual Information to Improve Spam Filtering Performance Shen Wang, Bin Wang and Hao Lang, Xueqi Cheng Institute of Computing Technology, Chinese Academy of

More information

Simple Language Models for Spam Detection

Simple Language Models for Spam Detection Simple Language Models for Spam Detection Egidio Terra Faculty of Informatics PUC/RS - Brazil Abstract For this year s Spam track we used classifiers based on language models. These models are used to

More information

Software Engineering 4C03 SPAM

Software Engineering 4C03 SPAM Software Engineering 4C03 SPAM Introduction As the commercialization of the Internet continues, unsolicited bulk email has reached epidemic proportions as more and more marketers turn to bulk email as

More information

Lan, Mingjun and Zhou, Wanlei 2005, Spam filtering based on preference ranking, in Fifth International Conference on Computer and Information

Lan, Mingjun and Zhou, Wanlei 2005, Spam filtering based on preference ranking, in Fifth International Conference on Computer and Information Lan, Mingjun and Zhou, Wanlei 2005, Spam filtering based on preference ranking, in Fifth International Conference on Computer and Information Technology : CIT 2005 : proceedings : 21-23 September, 2005,

More information

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5

Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5 Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed

More information

Sender and Receiver Addresses as Cues for Anti-Spam Filtering Chih-Chien Wang

Sender and Receiver Addresses as Cues for Anti-Spam Filtering Chih-Chien Wang Sender and Receiver Addresses as Cues for Anti-Spam Filtering Chih-Chien Wang Graduate Institute of Information Management National Taipei University 69, Sec. 2, JianGuo N. Rd., Taipei City 104-33, Taiwan

More information

E-MAIL FILTERING FAQ

E-MAIL FILTERING FAQ V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:

More information

Accelerating Techniques for Rapid Mitigation of Phishing and Spam Emails

Accelerating Techniques for Rapid Mitigation of Phishing and Spam Emails Accelerating Techniques for Rapid Mitigation of Phishing and Spam Emails Pranil Gupta, Ajay Nagrale and Shambhu Upadhyaya Computer Science and Engineering University at Buffalo Buffalo, NY 14260 {pagupta,

More information

IMPROVING SPAM EMAIL FILTERING EFFICIENCY USING BAYESIAN BACKWARD APPROACH PROJECT

IMPROVING SPAM EMAIL FILTERING EFFICIENCY USING BAYESIAN BACKWARD APPROACH PROJECT IMPROVING SPAM EMAIL FILTERING EFFICIENCY USING BAYESIAN BACKWARD APPROACH PROJECT M.SHESHIKALA Assistant Professor, SREC Engineering College,Warangal Email: marthakala08@gmail.com, Abstract- Unethical

More information

An Efficient Spam Filtering Techniques for Email Account

An Efficient Spam Filtering Techniques for Email Account American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-02, Issue-10, pp-63-73 www.ajer.org Research Paper Open Access An Efficient Spam Filtering Techniques for Email

More information

AN E-MAIL SERVER-BASED SPAM FILTERING APPROACH

AN E-MAIL SERVER-BASED SPAM FILTERING APPROACH AN E-MAIL SERVER-BASED SPAM FILTERING APPROACH MUMTAZ MOHAMMED ALI AL-MUKHTAR College of Information Engineering, AL-Nahrain University IRAQ ABSTRACT The spam has now become a significant security issue

More information

Representation of Electronic Mail Filtering Profiles: A User Study

Representation of Electronic Mail Filtering Profiles: A User Study Representation of Electronic Mail Filtering Profiles: A User Study Michael J. Pazzani Department of Information and Computer Science University of California, Irvine Irvine, CA 92697 +1 949 824 5888 pazzani@ics.uci.edu

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

Achieve more with less

Achieve more with less Energy reduction Bayesian Filtering: the essentials - A Must-take approach in any organization s Anti-Spam Strategy - Whitepaper Achieve more with less What is Bayesian Filtering How Bayesian Filtering

More information

Antispam Security Best Practices

Antispam Security Best Practices Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers

More information

Filtering Junk Mail with A Maximum Entropy Model

Filtering Junk Mail with A Maximum Entropy Model Filtering Junk Mail with A Maximum Entropy Model ZHANG Le and YAO Tian-shun Institute of Computer Software & Theory. School of Information Science & Engineering, Northeastern University Shenyang, 110004

More information

Journal of Information Technology Impact

Journal of Information Technology Impact Journal of Information Technology Impact Vol. 8, No., pp. -0, 2008 Probability Modeling for Improving Spam Filtering Parameters S. C. Chiemeke University of Benin Nigeria O. B. Longe 2 University of Ibadan

More information

Kaspersky Anti-Spam 3.0

Kaspersky Anti-Spam 3.0 Kaspersky Anti-Spam 3.0 Whitepaper Collecting spam samples The Linguistic Laboratory Updates to antispam databases Spam filtration servers Spam filtration is more than simply a software program. It is

More information

Filtering Spam Using Search Engines

Filtering Spam Using Search Engines Filtering Spam Using Search Engines Oleg Kolesnikov, Wenke Lee, and Richard Lipton ok,wenke,rjl @cc.gatech.edu College of Computing Georgia Institute of Technology Atlanta, GA 30332 Abstract Spam filtering

More information

Email Filters that use Spammy Words Only

Email Filters that use Spammy Words Only Email Filters that use Spammy Words Only Vasanth Elavarasan Department of Computer Science University of Texas at Austin Advisors: Mohamed Gouda Department of Computer Science University of Texas at Austin

More information

About this documentation

About this documentation Wilkes University, Staff, and Students have a new email spam filter to protect against unwanted email messages. Barracuda SPAM Firewall will filter email for all campus email accounts before it gets to

More information

Remote support for lab activities in educational institutions

Remote support for lab activities in educational institutions Remote support for lab activities in educational institutions Marco Mari 1, Agostino Poggi 1, Michele Tomaiuolo 1 1 Università di Parma, Dipartimento di Ingegneria dell'informazione 43100 Parma Italy {poggi,mari,tomamic}@ce.unipr.it,

More information

Savita Teli 1, Santoshkumar Biradar 2

Savita Teli 1, Santoshkumar Biradar 2 Effective Spam Detection Method for Email Savita Teli 1, Santoshkumar Biradar 2 1 (Student, Dept of Computer Engg, Dr. D. Y. Patil College of Engg, Ambi, University of Pune, M.S, India) 2 (Asst. Proff,

More information

Abstract. Find out if your mortgage rate is too high, NOW. Free Search

Abstract. Find out if your mortgage rate is too high, NOW. Free Search Statistics and The War on Spam David Madigan Rutgers University Abstract Text categorization algorithms assign texts to predefined categories. The study of such algorithms has a rich history dating back

More information

PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1

PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. Why is Panda Cloud Email Protection

More information

Spam detection with data mining method:

Spam detection with data mining method: Spam detection with data mining method: Ensemble learning with multiple SVM based classifiers to optimize generalization ability of email spam classification Keywords: ensemble learning, SVM classifier,

More information

Purchase College Barracuda Anti-Spam Firewall User s Guide

Purchase College Barracuda Anti-Spam Firewall User s Guide Purchase College Barracuda Anti-Spam Firewall User s Guide What is a Barracuda Anti-Spam Firewall? Computing and Telecommunications Services (CTS) has implemented a new Barracuda Anti-Spam Firewall to

More information

Anti Spamming Techniques

Anti Spamming Techniques Anti Spamming Techniques Written by Sumit Siddharth In this article will we first look at some of the existing methods to identify an email as a spam? We look at the pros and cons of the existing methods

More information

AntiSpam QuickStart Guide

AntiSpam QuickStart Guide IceWarp Server AntiSpam QuickStart Guide Version 10 Printed on 28 September, 2009 i Contents IceWarp Server AntiSpam Quick Start 3 Introduction... 3 How it works... 3 AntiSpam Templates... 4 General...

More information

Barracuda Spam Firewall

Barracuda Spam Firewall Barracuda Spam Firewall Overview The Barracuda Spam Firewall is a network appliance that scans every piece of email our organization receives. Its main purposes are to reduce the amount of spam we receive

More information

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. 2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered

More information

Filtering E-mail for Spam: Macintosh

Filtering E-mail for Spam: Macintosh Filtering E-mail for Spam: Macintosh Last Revised: April 2003 Table of Contents Introduction... 1 Objectives... 1 Filtering E-mail for Spam... 2 What Is Spam?... 2 What Is UT Doing About Spam?... 2 What

More information

Spam Filtering Methods for Email Filtering

Spam Filtering Methods for Email Filtering Spam Filtering Methods for Email Filtering Akshay P. Gulhane Final year B.E. (CSE) E-mail: akshaygulhane91@gmail.com Sakshi Gudadhe Third year B.E. (CSE) E-mail: gudadhe.sakshi25@gmail.com Shraddha A.

More information

Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach

Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach Alex Hai Wang College of Information Sciences and Technology, The Pennsylvania State University, Dunmore, PA 18512, USA

More information

700 Fox Glen Barrington, Illinois 60010 ph: [847] 842-9570 fx: [847] 842-0190 www.excaltech.com support@excaltech.com. Webmail System User Guide

700 Fox Glen Barrington, Illinois 60010 ph: [847] 842-9570 fx: [847] 842-0190 www.excaltech.com support@excaltech.com. Webmail System User Guide 700 Fox Glen Barrington, Illinois 60010 ph: [847] 842-9570 fx: [847] 842-0190 www.excaltech.com support@excaltech.com Webmail System User Guide Last Updated November 14, 2013 -2- Table of Contents Welcome

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

A Proposed Algorithm for Spam Filtering Emails by Hash Table Approach

A Proposed Algorithm for Spam Filtering Emails by Hash Table Approach International Research Journal of Applied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 4 (9): 2436-2441 Science Explorer Publications A Proposed Algorithm for Spam Filtering

More information

How To Filter Email From A Spam Filter

How To Filter Email From A Spam Filter Spam Filtering A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction Spam filtering is a catch- all term that describes the steps that happen to an email between a sender and a receiver

More information

Naive Bayes Spam Filtering Using Word-Position-Based Attributes

Naive Bayes Spam Filtering Using Word-Position-Based Attributes Naive Bayes Spam Filtering Using Word-Position-Based Attributes Johan Hovold Department of Computer Science Lund University Box 118, 221 00 Lund, Sweden johan.hovold.363@student.lu.se Abstract This paper

More information

An Overview of Spam Blocking Techniques

An Overview of Spam Blocking Techniques An Overview of Spam Blocking Techniques Recent analyst estimates indicate that over 60 percent of the world s email is unsolicited email, or spam. Spam is no longer just a simple annoyance. Spam has now

More information

Image Spam Filtering Using Visual Information

Image Spam Filtering Using Visual Information Image Spam Filtering Using Visual Information Battista Biggio, Giorgio Fumera, Ignazio Pillai, Fabio Roli, Dept. of Electrical and Electronic Eng., Univ. of Cagliari Piazza d Armi, 09123 Cagliari, Italy

More information

Mailwall Remote Features Tour Datasheet

Mailwall Remote Features Tour Datasheet Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for

More information

Intercept Anti-Spam Quick Start Guide

Intercept Anti-Spam Quick Start Guide Intercept Anti-Spam Quick Start Guide Software Version: 6.5.2 Date: 5/24/07 PREFACE...3 PRODUCT DOCUMENTATION...3 CONVENTIONS...3 CONTACTING TECHNICAL SUPPORT...4 COPYRIGHT INFORMATION...4 OVERVIEW...5

More information

Adaptive Filtering of SPAM

Adaptive Filtering of SPAM Adaptive Filtering of SPAM L. Pelletier, J. Almhana, V. Choulakian GRETI, University of Moncton Moncton, N.B.,Canada E1A 3E9 {elp6880, almhanaj, choulav}@umoncton.ca Abstract In this paper, we present

More information

1 Accessing E-mail accounts on the Axxess Mail Server

1 Accessing E-mail accounts on the Axxess Mail Server 1 Accessing E-mail accounts on the Axxess Mail Server The Axxess Mail Server provides users with access to their e-mail folders through POP3, and IMAP protocols, or OpenWebMail browser interface. The server

More information

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide

eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection

More information

Manual Spamfilter Version: 1.1 Date: 20-02-2014

Manual Spamfilter Version: 1.1 Date: 20-02-2014 Manual Spamfilter Version: 1.1 Date: 20-02-2014 Table of contents Introduction... 2 Quick guide... 3 Quarantine reports...3 What to do if a message is blocked inadvertently...4 What to do if a spam has

More information

Flavio D. Garcia Department of Computer Science, University of Nijmegen, the Netherlands

Flavio D. Garcia Department of Computer Science, University of Nijmegen, the Netherlands SPAM FILTER ANALYSIS Flavio D. Garcia Department of Computer Science, University of Nijmegen, the Netherlands flaviog@cs.kun.nl Jaap-Henk Hoepman Department of Computer Science, University of Nijmegen,

More information

User guide Business Internet e-mail features

User guide Business Internet e-mail features User guide Business Internet e-mail features Page 1 de 1 Table of content Page Introduction 3 1. How do I access my web based e-mail? 3 2. How do I access/alter these enhancements? 3 A. Basic Features

More information

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.

Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail. Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform

More information

Do you need to... Do you need to...

Do you need to... Do you need to... TM Guards your Email. Kills Spam and Viruses. Do you need to... Do you need to... Scan your e-mail traffic for Viruses? Scan your e-mail traffic for Viruses? Reduce time wasted dealing with Spam? Reduce

More information

A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering

A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering A Two-Pass Statistical Approach for Automatic Personalized Spam Filtering Khurum Nazir Junejo, Mirza Muhammad Yousaf, and Asim Karim Dept. of Computer Science, Lahore University of Management Sciences

More information

Detecting E-mail Spam Using Spam Word Associations

Detecting E-mail Spam Using Spam Word Associations Detecting E-mail Spam Using Spam Word Associations N.S. Kumar 1, D.P. Rana 2, R.G.Mehta 3 Sardar Vallabhbhai National Institute of Technology, Surat, India 1 p10co977@coed.svnit.ac.in 2 dpr@coed.svnit.ac.in

More information

1 Introductory Comments. 2 Bayesian Probability

1 Introductory Comments. 2 Bayesian Probability Introductory Comments First, I would like to point out that I got this material from two sources: The first was a page from Paul Graham s website at www.paulgraham.com/ffb.html, and the second was a paper

More information

Developing Methods and Heuristics with Low Time Complexities for Filtering Spam Messages

Developing Methods and Heuristics with Low Time Complexities for Filtering Spam Messages Developing Methods and Heuristics with Low Time Complexities for Filtering Spam Messages Tunga Güngör and Ali Çıltık Boğaziçi University, Computer Engineering Department, Bebek, 34342 İstanbul, Turkey

More information

How does the Excalibur Technology SPAM & Virus Protection System work?

How does the Excalibur Technology SPAM & Virus Protection System work? How does the Excalibur Technology SPAM & Virus Protection System work? All e-mail messages sent to your e-mail address are analyzed by the Excalibur Technology SPAM & Virus Protection System before being

More information

How to Use the KartHost Kloud Mail Service

How to Use the KartHost Kloud Mail Service USING LIVE QUARANTINE SETTING UP YOUR ACCOUNT YOU WILL ONLY BE USING THIS SERVICE IF YOU ARE STILL USING Shared Web Hosting Email. If you are Using KartHost Kloud Mail you will have no need for this service.

More information

Filtering E-mail for Spam: PC

Filtering E-mail for Spam: PC Filtering E-mail for Spam: PC Last Revised: April 2003 Table of Contents Introduction... 1 Objectives... 1 Filtering E-mail for Spam... 2 What Is Spam?... 2 What Is UT Doing About Spam?... 2 What Can You

More information

Version 5.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.

Version 5.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda. Version 5.x Barracuda Spam & Virus Firewall User s Guide Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com? 1 Copyright Copyright 2005-2012, Barracuda Networks

More information

Some fitting of naive Bayesian spam filtering for Japanese environment

Some fitting of naive Bayesian spam filtering for Japanese environment Some fitting of naive Bayesian spam filtering for Japanese environment Manabu Iwanaga 1, Toshihiro Tabata 2, and Kouichi Sakurai 2 1 Graduate School of Information Science and Electrical Engineering, Kyushu

More information

A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior

A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior A Monitor Tool for Anti-spam Mechanisms and Spammers Behavior Danilo Michalczuk Taveira and Otto Carlos Muniz Bandeira Duarte UFRJ - PEE/COPPE/GTA - DEL/POLI P.O. Box 6854-2945-97, Rio de Janeiro, RJ,

More information

the barricademx end user interface documentation for barricademx users

the barricademx end user interface documentation for barricademx users the barricademx end user interface documentation for barricademx users BarricadeMX Plus The End User Interface This short document will show you how to use the end user web interface for the BarricadeMX

More information

Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest?

Introduction. How does email filtering work? What is the Quarantine? What is an End User Digest? Introduction The purpose of this memo is to explain how the email that originates from outside this organization is processed, and to describe the tools that you can use to manage your personal spam quarantine.

More information

SpamNet Spam Detection Using PCA and Neural Networks

SpamNet Spam Detection Using PCA and Neural Networks SpamNet Spam Detection Using PCA and Neural Networks Abhimanyu Lad B.Tech. (I.T.) 4 th year student Indian Institute of Information Technology, Allahabad Deoghat, Jhalwa, Allahabad, India abhimanyulad@iiita.ac.in

More information

Quick Start Policy Patrol Mail Security 9

Quick Start Policy Patrol Mail Security 9 Quick Start Policy Patrol Mail Security 9 This guide will help you start using Policy Patrol Mail Security as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step

More information

More Details About Your Spam Digest & Dashboard

More Details About Your Spam Digest & Dashboard TABLE OF CONTENTS The Spam Digest What is the Spam Digest? What do I do with the Spam Digest? How do I view a message listed in the Spam Digest list? How do I release a message from the Spam Digest? How

More information

Why Bayesian filtering is the most effective anti-spam technology

Why Bayesian filtering is the most effective anti-spam technology Why Bayesian filtering is the most effective anti-spam technology Achieving a 98%+ spam detection rate using a mathematical approach This white paper describes how Bayesian filtering works and explains

More information

ACCURATE KEYWORD BASED SPAMS FILTERING IN SOCIAL NETWORKS.

ACCURATE KEYWORD BASED SPAMS FILTERING IN SOCIAL NETWORKS. ACCURATE KEYWORD BASED SPAMS FILTERING IN SOCIAL NETWORKS. Previous spam filters that parsing keywords Durga Prasad and building JKS, blacklist s, SOAP exploits the social relationships among email Co-Author

More information

Machine Learning in Spam Filtering

Machine Learning in Spam Filtering Machine Learning in Spam Filtering A Crash Course in ML Konstantin Tretyakov kt@ut.ee Institute of Computer Science, University of Tartu Overview Spam is Evil ML for Spam Filtering: General Idea, Problems.

More information

Quick Start Policy Patrol Spam Filter 5

Quick Start Policy Patrol Spam Filter 5 Quick Start Policy Patrol Spam Filter 5 This guide will help you start using Policy Patrol Spam Filter as quickly as possible. For more detailed instructions, consult the Policy Patrol manual. Step 1.

More information

Comprehensive Anti-Spam Service

Comprehensive Anti-Spam Service Comprehensive Anti-Spam Service Chapter 1: Document Scope This document describes how to implement and manage the Comprehensive Anti-Spam Service. This document contains the following sections: Comprehensive

More information

Configuring Your Gateman Email Server

Configuring Your Gateman Email Server Configuring Your Gateman Email Server Your Gateman Lifestyle Server includes an Email Server that provides users access to email via an email client and via your web browser using your laptop and mobile

More information

Spam DNA Filtering System

Spam DNA Filtering System The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,

More information

USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security

USER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security USER S MANUAL Cloud Email Firewall 4.3.2.4 1 Contents 1. INTRODUCTION TO CLOUD EMAIL FIREWALL... 4 1.1. WHAT IS CLOUD EMAIL FIREWALL?... 4 1.1.1. What makes Cloud Email Firewall different?... 4 1.1.2.

More information

Spam Filters Need the Human Touch. Mail-Filters.com, Inc.

Spam Filters Need the Human Touch. Mail-Filters.com, Inc. Spam Filters Need the Human Touch Mail-Filters.com, Inc. October, 2004 Executive Summary Readers of this or any other white paper on spam need no proof that spam is a problem. They know that; they want

More information

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL EmailDirect is an email marketing solution provider (ESP) which serves hundreds of today s top online marketers by providing all the functionality and expertise required to send and track effective email

More information

Version 3.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.

Version 3.x. Barracuda Spam & Virus Firewall User s Guide. Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda. Version 3.x Barracuda Spam & Virus Firewall User s Guide Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com? 1 Copyright Copyright 2005-2009, Barracuda Networks

More information

On Attacking Statistical Spam Filters

On Attacking Statistical Spam Filters On Attacking Statistical Spam Filters Gregory L. Wittel and S. Felix Wu Department of Computer Science University of California, Davis One Shields Avenue, Davis, CA 95616 USA Abstract. The efforts of anti-spammers

More information

Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development

Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Author André Tschentscher Address Fachhochschule Erfurt - University of Applied Sciences Applied Computer Science

More information

MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO THE SENDER MAIL SERVER

MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO THE SENDER MAIL SERVER MINIMIZING THE TIME OF SPAM MAIL DETECTION BY RELOCATING FILTERING SYSTEM TO THE SENDER MAIL SERVER Alireza Nemaney Pour 1, Raheleh Kholghi 2 and Soheil Behnam Roudsari 2 1 Dept. of Software Technology

More information

1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5

1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. What makes Panda Cloud Email Protection different?... 4 1.1.2. Is it secure?... 4 1.2.

More information

COAT : Collaborative Outgoing Anti-Spam Technique

COAT : Collaborative Outgoing Anti-Spam Technique COAT : Collaborative Outgoing Anti-Spam Technique Adnan Ahmad and Brian Whitworth Institute of Information and Mathematical Sciences Massey University, Auckland, New Zealand [Aahmad, B.Whitworth]@massey.ac.nz

More information

Policy Patrol 7 Upgrade Guide

Policy Patrol 7 Upgrade Guide Policy Patrol 7 technical documentation September 4, 2012 www.policypatrol.com If you have Policy Patrol 4, 5 or 6 installed you can upgrade to version 7 and keep your existing configuration. Please follow

More information

Antispam Evaluation Guide. White Paper

Antispam Evaluation Guide. White Paper Antispam Evaluation Guide White Paper Table of Contents 1 Testing antispam products within an organization: 10 steps...3 2 What is spam?...4 3 What is a detection rate?...4 4 What is a false positive rate?...4

More information

Throttling Outgoing SPAM for Webmail Services

Throttling Outgoing SPAM for Webmail Services 2012 2nd International Conference on Industrial Technology and Management (ICITM 2012) IPCSIT vol. 49 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V49.5 5 Throttling Outgoing SPAM for

More information

REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS

REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS REVIEW AND ANALYSIS OF SPAM BLOCKING APPLICATIONS Rami Khasawneh, Acting Dean, College of Business, Lewis University, khasawra@lewisu.edu Shamsuddin Ahmed, College of Business and Economics, United Arab

More information

An Efficient Two-phase Spam Filtering Method Based on E-mails Categorization

An Efficient Two-phase Spam Filtering Method Based on E-mails Categorization International Journal of Network Security, Vol.9, No., PP.34 43, July 29 34 An Efficient Two-phase Spam Filtering Method Based on E-mails Categorization Jyh-Jian Sheu Department of Information Management,

More information

How to keep spam off your network

How to keep spam off your network GFI White Paper How to keep spam off your network What features to look for in anti-spam technology A buyer s guide to anti-spam software, this white paper highlights the key features to look for in anti-spam

More information

Cosdes: A Collaborative Spam Detection System with a Novel E- Mail Abstraction Scheme

Cosdes: A Collaborative Spam Detection System with a Novel E- Mail Abstraction Scheme IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719, Volume 2, Issue 9 (September 2012), PP 55-60 Cosdes: A Collaborative Spam Detection System with a Novel E- Mail Abstraction Scheme

More information

How To Stop Spam From Being A Problem

How To Stop Spam From Being A Problem Solutions to Spam simple analysis of solutions to spam Thesis Submitted to Prof. Dr. Eduard Heindl on E-business technology in partial fulfilment for the degree of Master of Science in Business Consulting

More information

Spam Configuration/Training Guide

Spam Configuration/Training Guide Spam Configuration/Training Guide GWAVA4 Copyright 2007. Beginfinite, Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com CONTENTS OVERVIEW... 4 SECTION OVERVIEW...

More information

Why Bayesian filtering is the most effective anti-spam technology

Why Bayesian filtering is the most effective anti-spam technology GFI White Paper Why Bayesian filtering is the most effective anti-spam technology Achieving a 98%+ spam detection rate using a mathematical approach This white paper describes how Bayesian filtering works

More information

Spam filtering. Peter Likarish Based on slides by EJ Jung 11/03/10

Spam filtering. Peter Likarish Based on slides by EJ Jung 11/03/10 Spam filtering Peter Likarish Based on slides by EJ Jung 11/03/10 What is spam? An unsolicited email equivalent to Direct Mail in postal service UCE (unsolicited commercial email) UBE (unsolicited bulk

More information

Web24 Web Hosting Guide

Web24 Web Hosting Guide Web24 Web Hosting Guide Welcome Dear Web24 customer, We would like to thank you for choosing Web24 as your preferred web hosting provider. To make your experience as enjoyable as possible, we have prepared

More information

Ipswitch IMail Server with Integrated Technology

Ipswitch IMail Server with Integrated Technology Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these

More information