AN ENHANCED APPROACH FOR CONTENT FILTERING IN SPAM DETECTION
|
|
- Audra Potter
- 8 years ago
- Views:
Transcription
1 AN ENHANCED APPROACH FOR CONTENT FILTERING IN SPAM DETECTION Shashi Kant Rathore Department of Computer Science & Engineering, Lovely Professional University, Jalandhar, Punjab Jyoti Department of Computer Science & Engineering, Lovely Professional University, Jalandhar, Punjab Amrit Kaur Department of Computer Science & Engineering, Lovely Professional University, Jalandhar, Punjab Abstract- Image spam is a recent variant of spam and poses a great threat to communication. Initially spam s contained only textual messages and were easily detected by text based spam filters. To avoid detection, spammer comes with a new approach to send their spam. It consists in including their advertisements as part of an embedded image file attachment (.gif, jpg, png, etc). So this paper concentrates on identifying and avoiding partial image spam. To detect the image spams, new framework will be derived which is based on the features. The classification module classifies the image into the text, image and special character classes. A trained filter will be there to detect image as a SPAM images on the basis of features detection. And Text will be recognizing by Content Scanning technique. By this combined approach we can enhance the detection capability of SPAM filter. Keywords: - spam, image spam, image spam detection, filtering and classification 1. INTRODUCTION The bulk of spam messages is sent on daily basis is disturbing and poses a great threat to the utility of communications. Spam s are usually classified into the following some categories: commercial advertisements, lottery winning announcements, pharmacy and health, online degrees, bank and finance, adult content. To block spam, basically companies and service providers relied on detecting some keywords which are frequently used in spam, such as the word click me or earn money etc. since the text based spam filters are used to detect the text-based spam, the spammer have come up with a new approach to send their spam: the image spam and the text based spam techniques failed to detect the image based spams. The image spam is type of junk that replaces text with the images. The image spam is generally attached into an . User will receive the spam by opening the or by double clicking at the . When the image spam is dispersed over the network, it is a larger drain in the network resource than the literal spam because the image file is larger than the text file and the image spam requires the higher bandwidth. It causes the greater degradation of transfer rates. The image spam should in the different formats such as gif,.bmp, jpg, png, jpeg, etc. In fact, the process of classifying the image spam groups because an image contains many properties. For example brightness, radian, contrast etc. there are many methods for image spam detection and those methods only detect the images of text or humans or body appearances. An image spam can be classified into two categories: pure image and mixed image. The pure image spam is the kind of spam which contains only images; the mix image spam consists of images and a text message attached to an . There are many categories of image spam: advertisement image spam, making money image spam etc. Therefore, this paper proposes a new method that enhances the image spam detection, so, the image spam, not only the images of text or human pictures, but also other images such as images of commercials can also be detected. Every day we are facing new internet spam which is much obfuscated and it becomes a serious problem across the network. Various types of techniques have been recommended to detect the various types of spams. The image spam causes numerous problems 768
2 because there are many varieties of the images to be threatened. (Z he Wang) Suggested a detection technique for an image spam using near-duplicate detection technique. This technique introduces a non-spam image repository. When the user received an with image it will be compared with the image in the image database for spam filtering process. The received image will be eliminated when the features of the image are different from the image in the database. (G.Frencesso) Proposed two different image processing techniques which are used to detect the image spam that composed of with text and images. The component based method on SIFT method is used to detect the image spam. This method detect image spam that was modified from the converted of content text to an image and the embedded spam message through an . Some image spam was identified using the boosting tree which is learning based prototype system. The detection system is called the image spam tracker. (N.Jordan) Introduces a new method which convert.jpeg image to ASCII using JP2A. And which identifies the image using image spam by using properties of an image as attributes. He applied file properties and a histogram algorithm for image spam detection. This method is called as the FH algorithm. This algorithm is the part of 2-step image spam classification while the second part is the comparison part of the histogram, both the gray and color histograms, models are used for image testing. Although the image spam is rapidly grow over the internet, another unwanted image message called HAM also causes the problem to the internet and slow down the bandwidth. (B.Battista)Proposed an image spam filtering mechanism named as content obscuring techniques. This technique is based on the use of image classifiers. The method aims to distinguish between ham and spam images through the low level characteristics of the image texts. Moreover, three types of image text are determined. First, the presence of small fragments around characters; second the presence of large fragments around characters and the third is large background shape overlapping with characters. 2. METHODLOGY ADOPTED This paper proposed the method to detect a spam from the body of the , known as Partial spam image detection using the SVM. The uncertified or spam can be distinguished from the certified . Whenever the arrives at the server, it will be sent to the classification module to separate the content according to its characteristics which can be images and text. The result from the classification module will be terminated up at the evaluation module where should be determined as a certified or the uncertified . There are two types of databases: one which contains the spam keywords and the other contains the spam images. When the image arrives at classification module, the image is stored and converted to the matrices form. On the basis of data in the matrices the classification module classifies the image into the text, image and special character classes. To detect the image spam, the database is maintained which is based on the previous image spams. The features will be compared with the image database and on that basis, spam will be detected. To compare the features of the images we use the traversing algorithms which will traverse the matrices and compare the features with the database stored. The following are the image features: Text spam databa Classification Module Text Character Certified Evaluation module Text Evaluation Coming Special Feature Image Evaluation Uncertified Image Feature Image spam databas Figure 1: System Architecture of the Image Spam Detection A. Extent of text feature: To detect the spam we need to determine the extent of text in the spam image. This could be interpreted as features can be extracted within the text region to that of the whole image. Text may be integrally available in the 769
3 natural scene images in the form of road marks and logos of the synthetic images (such as graphic images) (Bagga, 2004). B. Color saturation features: Color saturation refers to the intensity of a color and number of pixels in an image. The term hue refers to the color of the image itself, while the color saturation describes the color intensity or purity of the image. When the color of the image is fully statured it is considered as the spam image. As the saturation increases the colors appear to be exact and as the saturation decreases the colors appear to be pale (Bagga, 2004) SVM Support Vector Machine, is a field of research in pattern recognition, artificial intelligence and computer vision. SVM is capable of reading while and black pixels on any image and can distinguish the accurate numeric number and alpha character. SVM is a basic technology used in advanced scanning applications. SVM is used to split text and images. SVM is widely used in convert documents into electronic files or to publish a text on website. Figure 2 illustrates the example of an image spam . In this module, when arrives at the sever, the SVM translates or extract the received according to the content based on its features as shown in figure 1. There are two types of outcomes from the SVM, that may be text and images, and then the detail of each type must be separately defined. The text message may contain the special symbols and keywords. Example of the special symbol as a part of the text message are such as(%,!,@,#)etc. examples of keywords are such as win, join now, click me, call anywhere, click here, earn big, easy money etc Database The spam database can be divided into two parts: keywords database and an image spam database. In the keyword database, all the keywords of the advertised spam are recorded. A popular resource to collect those keywords is the internet, such as trash box of web mails, the spam box of the web mails, shopping web site, including the internet site of spam list. And the image spam database stores the only images that are counted as spam. C D E Call anywhere Dating Earn money came up winner Debt free Earn big casino Doctor approved Earn extra money chartroom Doctor prescribed Earn degree click me Click here Career opportunity Degree program Depression Figure 2: Sample of the Image Spam Figure 4: Sample of Keyword Database SVM is electronic translation of scanned images of handwritten, typewritten or printed text into machineencoded text into machine encoded text. Figure 3 shows how when figure 2 is split into text and image using SVM. A 0t :1] MONEY:01 image text Figure 3: shows the isolated text and image when SVM is applied 2.2 Classification Module Figure 5: Sample of Image Spam Database 770
4 This database contains images and its properties such as RGB color, contrast, radian, brightness etc. Figure 4 shows the keyword database sample Evaluation module The evaluation module is the last module in the detection where all the text and images obtained from the will be identified as a certified and uncertified as shown in figure 1. All the converted texts and images will compare with data stored in the database. Linear search algorithm is used searching the images in the database. The search will be analyzed the true contents of the image. Comparison method starts from retrieving images from the database using the linear search algorithm, where all the images are searched and analyzed the content of images by comparing all attributes with the image spam attributes in the database. For example contrast, brightness, radian etc. 3. RESULTS This section shows the several results when uncertified and certified mails sent to the receiver by the sender. 3.1 Result when the Non-SPAM mails are sent: In the experiment, when the certified mails are sent in group and outcome showing details of each group of mails in the table1: Probability Result True /False 1 st mails.70 SPAM TRUE 2 nd mail.41 HAM FALSE 3 rd mail.53 HAM FALSE 4 th mail.80 SPAM TRUE 5 th mail.39 HAM FALSE 6 th mail.78 SPAM TRUE 7 th mail.88 SPAM TRUE 8 th mail.74 SPAM TRUE 9 th mail.77 SPAM TRUE 10 th mail.81 SPAM TRUE Table 1: Result when the Non-SPAM mails are sent. Total number of Certified s are sent=10 Number of s found SPAM positive is =3 Number of s found SPAM negative is=7 Overall throughput for certified Mails= 76% 3.2 Result when SPAM mails are sent: In second experiment, when system has been simulated with some Non-SPAMs mails. Results are shown in below table. Table2 shows the result, when the spam mails are sent. Probabil ity of whole mail Result True/Fals e 1st mail.82 SPAM TRUE 2nd mail.96 SPAM TRUE 3rd mail.73 SPAM TRUE 4th mail.78 SPAM TRUE 5th mail.56 HAM FALSE 6th mail.60 SPAM FALSE 7th mail.77 SPAM TRUE 8th mail.91 SPAM TRUE 9th mail.43 HAM FALSE 10thmail.69 SPAM TRUE Table 2: Result when SPAM mails are sent. Total number of certified mails are sent=10 Number of s found spam positive =2 Number of s found spam negative=8 Overall throughput for certified mails=85% 4. CONCLUSION Spam is critical problem across the network because it is progressed from text to images. Some of the spam filtering software could not identify the image spam. Image spam erodes the limited network resources and creates trouble for people. So this paper proposed a new technique to identify and avoid the received image spam across the network by using the feature extraction and classification framework to target the image spam currently seen on the internet. 5. REFERENCES [1]. B.Battista, F. a. (2011). Improving Image Spam Filtering Using Image Text Features. in proc.7th INternational Conference on and Anti- Spam(CEAS). California,U.S.A. 771
5 [2.] Bagga, J. A. (2004). Categorizing images in web Documents. IEEE multimedia, pp [3]. Belding-Royer, I. D. (2004). AODV Routing Protocol Implemantation Design. In C.E. Perkins,Ad hoc Netwoking, [4]. Botvich, J. M. (2008). A Trust Based System for Enhanced Spam Filtering. Journal of Sotware,VOL.3,No.5. [11]. Jan Gobel, T. H. (2008). Towards Proactive Spam Filtering. [12]. Khosri, A. (31,2007). An Overview of Content BAsed Spam Filtering Techniques. Informatica. [13]. N.Jordan, M. N. (2011). Image Spam ASCII to the Rescue! 3rd INternational Conferrence on Milicious and Unwanted Software, (pp ). [5]. Christina V, K. S. (2010). A Study on Spam Filtering Techniques. International Journal of Computer Applications. [6].Commnunity Workshop Series. (n.d.). Retrieved from basics.pdf [7]. E.Damiani, S. D. (2003). An Open Digest Based Technique For Spam Detection. [8]. G.Frencesso, P. a. (2009). Using heterogeneous features for anti spam filters. 19th Internayional conference on database and Expert System Application, (pp ). [9]. Hasaan T., C. P. (n.d.). Towards Eradiction of spam: development and evaluation of an intelligent SPAM filter. Edith Cowan University,Perth, western Austalia. [10]. intro . (n.d.). Retrieved from nts/pcc/intro .pdf [14]. Pour, A. N. (2012). Miniminzing the Time of Spam Mail Detection by Relocating Filtering System to the Sender Mail Server. International JOurnal of Network Security and Its applications. [15]. Shashi Kant Rathore, P. J. (August 2011). A New Probability based Analysis for Recogonition of Unwanted s. International Journal of Computer Applications, 4. [16]. Sheu, J.-J. (2009). An Efficient Two- Phase Spam Filtering Method BAsed on E- Mails Catergorization. International Journal of Network Security. [17]. Sunil Taneja, D. A. (2011). End to End Delay Analyasis of Prominent On-Demand Routing Protocols. IJCST Vol.2,Issue 1. [18]. Tech-FAQ. (n.d.). Retrieved from [19]. Thamarai Subramaniam, H. A. (2010). Overview of textual Anti-Spam Filtering Techniques. International Journal of the Physical Science Vol5,pp
6 [20]. V Sathiya, M. T. (2011). Partial Image Spam Detection using OCR. IJETT, june. [21]. Vinit Garg, M. K. (2011). Advanced Survey of Mobile Ad-hoc Network. IJCST Vol2. [23]. W., s. (2004). Data and Computer Communications. Prentics Hall,7th Edition. [24]. Z he Wang, W. J. (n.d.). Filtering Image spam with near duplicate detection. Computer Science Department, Princeton University. 773
PARTIAL IMAGE SPAM E-MAIL DETECTION USING OCR
PARTIAL IMAGE SPAM E-MAIL DETECTION USING OCR V. Sathiya *1 M.Divakar #2 T.S. Sumi *3 1 Faculty, Department of M.C.A, Panimalar Engineering College, Anna University, Chennai, India 2 PG Scholar, Department
More informationHow To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
More informationPANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1
PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. Why is Panda Cloud Email Protection
More informationInternational Journal of Research in Advent Technology Available Online at: http://www.ijrat.org
IMPROVING PEFORMANCE OF BAYESIAN SPAM FILTER Firozbhai Ahamadbhai Sherasiya 1, Prof. Upen Nathwani 2 1 2 Computer Engineering Department 1 2 Noble Group of Institutions 1 firozsherasiya@gmail.com ABSTARCT:
More informationImage Based Spam: White Paper
The Rise of Image-Based Spam No matter how you slice it - the spam problem is getting worse. In 2004, it was sufficient to use simple scoring mechanisms to determine whether email was spam or not because
More informationUSER S MANUAL Cloud Email Firewall 4.3.2.4 1. Cloud Email & Web Security
USER S MANUAL Cloud Email Firewall 4.3.2.4 1 Contents 1. INTRODUCTION TO CLOUD EMAIL FIREWALL... 4 1.1. WHAT IS CLOUD EMAIL FIREWALL?... 4 1.1.1. What makes Cloud Email Firewall different?... 4 1.1.2.
More information1.1.1. What makes Panda Cloud Email Protection different?... 4. 1.1.2. Is it secure?... 4. 1.2.1. How messages are classified... 5
Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. What makes Panda Cloud Email Protection different?... 4 1.1.2. Is it secure?... 4 1.2.
More informationSavita Teli 1, Santoshkumar Biradar 2
Effective Spam Detection Method for Email Savita Teli 1, Santoshkumar Biradar 2 1 (Student, Dept of Computer Engg, Dr. D. Y. Patil College of Engg, Ambi, University of Pune, M.S, India) 2 (Asst. Proff,
More informationData Pre-Processing in Spam Detection
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 11 May 2015 ISSN (online): 2349-784X Data Pre-Processing in Spam Detection Anjali Sharma Dr. Manisha Manisha Dr. Rekha Jain
More informationA Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
More informationArtificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing and Developing E-mail Classifier
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-1, Issue-6, January 2013 Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing
More informationCombining Optical Character Recognition (OCR) and Edge Detection Techniques to Filter Image-Based Spam
Combining Optical Character Recognition (OCR) and Edge Detection Techniques to Filter Image-Based Spam B. Fadiora Department of Computer Science The Polytechnic Ibadan Ibadan, Nigeria tundefadiora@yahoo.com
More informationescan Anti-Spam White Paper
escan Anti-Spam White Paper Document Version (esnas 14.0.0.1) Creation Date: 19 th Feb, 2013 Preface The purpose of this document is to discuss issues and problems associated with spam email, describe
More informationKaspersky Anti-Spam 3.0
Kaspersky Anti-Spam 3.0 Whitepaper Collecting spam samples The Linguistic Laboratory Updates to antispam databases Spam filtration servers Spam filtration is more than simply a software program. It is
More informationEmail Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
More informationSpam detection with data mining method:
Spam detection with data mining method: Ensemble learning with multiple SVM based classifiers to optimize generalization ability of email spam classification Keywords: ensemble learning, SVM classifier,
More informationWhy Content Filters Can t Eradicate spam
WHITEPAPER Why Content Filters Can t Eradicate spam About Mimecast Mimecast () delivers cloud-based email management for Microsoft Exchange, including archiving, continuity and security. By unifying disparate
More informationImplementation of OCR Based on Template Matching and Integrating it in Android Application
International Journal of Computer Sciences and EngineeringOpen Access Technical Paper Volume-04, Issue-02 E-ISSN: 2347-2693 Implementation of OCR Based on Template Matching and Integrating it in Android
More informationEmerging Trends in Fighting Spam
An Osterman Research White Paper sponsored by Published June 2007 SPONSORED BY sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone: +1 253 630 5839 Fax: +1 866
More informationFace Recognition For Remote Database Backup System
Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM
More informationSPAM FILTER Service Data Sheet
Content 1 Spam detection problem 1.1 What is spam? 1.2 How is spam detected? 2 Infomail 3 EveryCloud Spam Filter features 3.1 Cloud architecture 3.2 Incoming email traffic protection 3.2.1 Mail traffic
More informationTowards Eradication of SPAM: A Study on Intelligent Adaptive SPAM Filters
Towards Eradication of SPAM: A Study on Intelligent Adaptive SPAM Filters Tarek Hassan (B.Sc. Computer Science, Egypt) This thesis is presented for the degree of Master of Computer Science Murdoch University,
More informationDATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
More information6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET) January- February (2013), IAEME
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976-6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET)
More informationMachine Learning CS 6830. Lecture 01. Razvan C. Bunescu School of Electrical Engineering and Computer Science bunescu@ohio.edu
Machine Learning CS 6830 Razvan C. Bunescu School of Electrical Engineering and Computer Science bunescu@ohio.edu What is Learning? Merriam-Webster: learn = to acquire knowledge, understanding, or skill
More informationIs Spam Bad For Your Mailbox?
Whitepaper Spam and Ham Spam and Ham A Simple Guide Fauzi Yunos 12 Page2 Executive Summary People tend to be much less bothered by spam slipping through filters into their mail box (false negatives), than
More informationHow To Send Email From A Netbook To A Spam Box On A Pc Or Mac Or Mac (For A Mac) On A Mac Or Ipo (For An Ipo) On An Ipot Or Ipot (For Mac) (For
INSTITUTE of TECHNOLOGY CARLOW Intelligent Anti-Spam Technology User Manual Author: CHEN LIU (C00140374) Supervisor: Paul Barry Date: 16 th April 2010 Content 1. System Requirement... 3 2. Interface and
More informationCAS-ICT at TREC 2005 SPAM Track: Using Non-Textual Information to Improve Spam Filtering Performance
CAS-ICT at TREC 2005 SPAM Track: Using Non-Textual Information to Improve Spam Filtering Performance Shen Wang, Bin Wang and Hao Lang, Xueqi Cheng Institute of Computing Technology, Chinese Academy of
More informationAN EFFECTIVE SPAM FILTERING FOR DYNAMIC MAIL MANAGEMENT SYSTEM
ISSN: 2229-6956(ONLINE) ICTACT JOURNAL ON SOFT COMPUTING, APRIL 212, VOLUME: 2, ISSUE: 3 AN EFFECTIVE SPAM FILTERING FOR DYNAMIC MAIL MANAGEMENT SYSTEM S. Arun Mozhi Selvi 1 and R.S. Rajesh 2 1 Department
More information2. Distributed Handwriting Recognition. Abstract. 1. Introduction
XPEN: An XML Based Format for Distributed Online Handwriting Recognition A.P.Lenaghan, R.R.Malyan, School of Computing and Information Systems, Kingston University, UK {a.lenaghan,r.malyan}@kingston.ac.uk
More informationHigh-Speed Detection of Unsolicited Bulk Email
High-Speed Detection of Unsolicited Bulk Email Sheng-Ya Lin, Cheng-Chung Tan, Jyh-Charn (Steve) Liu, Computer Science Department, Texas A&M University Michael Oehler National Security Agency Dec, 4, 2007
More informationData Warehousing and Data Mining in Business Applications
133 Data Warehousing and Data Mining in Business Applications Eesha Goel CSE Deptt. GZS-PTU Campus, Bathinda. Abstract Information technology is now required in all aspect of our lives that helps in business
More informationOn Attacking Statistical Spam Filters
On Attacking Statistical Spam Filters Gregory L. Wittel and S. Felix Wu Department of Computer Science University of California, Davis One Shields Avenue, Davis, CA 95616 USA Paper review by Deepak Chinavle
More informationFusion of Text and Image Features: A New Approach to Image Spam Filtering
Fusion of Text and Image Features: A New Approach to Image Spam Filtering Congfu Xu 1, Kevin Chiew 2, Yafang Chen 1,andJuxinLiu 1 1 Institute of Artificial Intelligence, Zhejiang University, Hangzhou,
More informationSURVEY PAPER ON INTELLIGENT SYSTEM FOR TEXT AND IMAGE SPAM FILTERING Amol H. Malge 1, Dr. S. M. Chaware 2
International Journal of Computer Engineering and Applications, Volume IX, Issue I, January 15 SURVEY PAPER ON INTELLIGENT SYSTEM FOR TEXT AND IMAGE SPAM FILTERING Amol H. Malge 1, Dr. S. M. Chaware 2
More informationEmail Marketing Glossary of Terms
Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to
More informationIntelligent Word-Based Spam Filter Detection Using Multi-Neural Networks
www.ijcsi.org 17 Intelligent Word-Based Spam Filter Detection Using Multi-Neural Networks Ann Nosseir 1, Khaled Nagati 1 and Islam Taj-Eddin 1 1 Faculty of Informatics and Computer Sciences British University
More informationFireEye Email Threat Prevention Cloud Evaluation
Evaluation Prepared for FireEye June 9, 2015 Tested by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com Table of Contents Executive Summary... 1 Introduction... 1 About
More informationLan, Mingjun and Zhou, Wanlei 2005, Spam filtering based on preference ranking, in Fifth International Conference on Computer and Information
Lan, Mingjun and Zhou, Wanlei 2005, Spam filtering based on preference ranking, in Fifth International Conference on Computer and Information Technology : CIT 2005 : proceedings : 21-23 September, 2005,
More informationInternational Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
More informationImage Spam Filtering Using Visual Information
Image Spam Filtering Using Visual Information Battista Biggio, Giorgio Fumera, Ignazio Pillai, Fabio Roli, Dept. of Electrical and Electronic Eng., Univ. of Cagliari Piazza d Armi, 09123 Cagliari, Italy
More informationEmail Spam Detection A Machine Learning Approach
Email Spam Detection A Machine Learning Approach Ge Song, Lauren Steimle ABSTRACT Machine learning is a branch of artificial intelligence concerned with the creation and study of systems that can learn
More informationAntispam Security Best Practices
Antispam Security Best Practices First, the bad news. In the war between spammers and legitimate mail users, spammers are winning, and will continue to do so for the foreseeable future. The cost for spammers
More informationPrevention of Spam over IP Telephony (SPIT)
General Papers Prevention of Spam over IP Telephony (SPIT) Juergen QUITTEK, Saverio NICCOLINI, Sandra TARTARELLI, Roman SCHLEGEL Abstract Spam over IP Telephony (SPIT) is expected to become a serious problem
More informationAnti Spamming Techniques
Anti Spamming Techniques Written by Sumit Siddharth In this article will we first look at some of the existing methods to identify an email as a spam? We look at the pros and cons of the existing methods
More informationWho will win the battle - Spammers or Service Providers?
Who will win the battle - Spammers or Service Providers? Pranaya Krishna. E* Spam Analyst and Digital Evidence Analyst, TATA Consultancy Services Ltd. (pranaya.enugulapally@tcs.com) Abstract Spam is abuse
More informationImage Spam: The Email Epidemic of 2006
S e c u r i t y T r e n d s Overview Image Spam: The Email Epidemic of 2006 S E C U R I T Y T R E N D S O v e r v i e w End-users around the world are reporting an increase in spam. Much of this increase
More informationSIPAC. Signals and Data Identification, Processing, Analysis, and Classification
SIPAC Signals and Data Identification, Processing, Analysis, and Classification Framework for Mass Data Processing with Modules for Data Storage, Production and Configuration SIPAC key features SIPAC is
More informationTypical programme structures for MSc programmes in the School of Computing Science
Typical programme structures for MSc programmes in the School of Computing Science 1 If you have a good degree in a subject other than computing: MSc Information Technology MSc Software Development 2 MSc
More informationSpam Testing Methodology Opus One, Inc. March, 2007
Spam Testing Methodology Opus One, Inc. March, 2007 This document describes Opus One s testing methodology for anti-spam products. This methodology has been used, largely unchanged, for four tests published
More informationLearning Fast Classifiers for Image Spam
Learning Fast Classifiers for Image Spam Mark Dredze Computer and Information Sciences Dept. University of Pennsylvania Philadelphia, PA 19104 mdredze@seas.upenn.edu Reuven Gevaryahu Philadelphia, PA 19104
More informationEmail Guidelines. The following guidelines are for companies who develop email HTML design/creative and copy.
The following guidelines are for companies who develop email HTML design/creative and copy. In today s email environment it is imperative that mailers consider the limitations presented by email readers
More informationSoftware Engineering 4C03 SPAM
Software Engineering 4C03 SPAM Introduction As the commercialization of the Internet continues, unsolicited bulk email has reached epidemic proportions as more and more marketers turn to bulk email as
More informationDesign of Standard VoIP Spam Report Format Supporting Various Spam Report Methods
보안공학연구논문지 (Journal of Security Engineering), 제 10권 제 1호 2013년 2월 Design of Standard VoIP Spam Report Format Supporting Various Spam Report Methods Ji-Yeon Kim 1), Hyung-Jong Kim 2) Abstract VoIP (Voice
More informationTracking and Recognition in Sports Videos
Tracking and Recognition in Sports Videos Mustafa Teke a, Masoud Sattari b a Graduate School of Informatics, Middle East Technical University, Ankara, Turkey mustafa.teke@gmail.com b Department of Computer
More informationIMF Tune Opens Exchange to Any Anti-Spam Filter
Page 1 of 8 IMF Tune Opens Exchange to Any Anti-Spam Filter September 23, 2005 10 th July 2007 Update Include updates for configuration steps in IMF Tune v3.0. IMF Tune enables any anti-spam filter to
More informationBayesian Spam Filtering
Bayesian Spam Filtering Ahmed Obied Department of Computer Science University of Calgary amaobied@ucalgary.ca http://www.cpsc.ucalgary.ca/~amaobied Abstract. With the enormous amount of spam messages propagating
More informationImproving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
More informationAnti-Spam Configuration in Outlook 2003 INDEX. Webmail settings Page 2. Client settings Page 6. Creation date 12.12.06 Version 1.2
Anti-Spam Configuration in Outlook 2003 INDEX Webmail settings Page 2 Client settings Page 6 Creation date 12.12.06 Version 1.2 Webmail settings In this section, you will learn how to activate and configure
More informationRobin Sharma M.Tech, Computer Sci. Engg, RIMT-IET, Mandi Gobindgarh, Punjab, India. Principal Dr. Sushil Garg RIMT-MAEC, Mandigobindgarh Punjab, India
IRACST Engineering Science and Technology: An International Journal (ESTIJ), ISSN: 2250-3498, Spam Detection Using ICNEURO for Enhanced Accuracy Robin Sharma M.Tech, Computer Sci. Engg, RIMT-IET, Mandi
More informationA Survey on Spam Filtering for Online Social Networks
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationSetting up Junk Email Filters By Louise Ryan, NW District IT Expert
The email servers on campus are no longer set up to filter junk emails from your inbox. If you are getting a significant number of junk emails in your inbox you can set up your own filters in Outlook.
More informationOpus One PAGE 1 1 COMPARING INDUSTRY-LEADING ANTI-SPAM SERVICES RESULTS FROM TWELVE MONTHS OF TESTING INTRODUCTION TEST METHODOLOGY
Joel Snyder Opus One February, 2015 COMPARING RESULTS FROM TWELVE MONTHS OF TESTING INTRODUCTION The following analysis summarizes the spam catch and false positive rates of the leading anti-spam vendors.
More informationThe Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
More informationLess naive Bayes spam detection
Less naive Bayes spam detection Hongming Yang Eindhoven University of Technology Dept. EE, Rm PT 3.27, P.O.Box 53, 5600MB Eindhoven The Netherlands. E-mail:h.m.yang@tue.nl also CoSiNe Connectivity Systems
More informationRobust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET
Robust Security Solution to Countermeasure of Malicious Nodes for the Security of MANET Kritika Sharma M.tech(CSE) Doon Valley Insttitute of Enggineering & Technology, Karnal Parikshit Singla Assistant
More informationCosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme
IJCSET October 2012 Vol 2, Issue 10, 1447-1451 www.ijcset.net ISSN:2231-0711 Cosdes: A Collaborative Spam Detection System with a Novel E-Mail Abstraction Scheme I.Kalpana, B.Venkateswarlu Avanthi Institute
More informationA Proposed Algorithm for Spam Filtering Emails by Hash Table Approach
International Research Journal of Applied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 4 (9): 2436-2441 Science Explorer Publications A Proposed Algorithm for Spam Filtering
More informationSearch and Information Retrieval
Search and Information Retrieval Search on the Web 1 is a daily activity for many people throughout the world Search and communication are most popular uses of the computer Applications involving search
More informationOnline Spam Filter for Duplicate or Near Duplicate Message Content Detection Scheme
Online Spam Filter for Duplicate or Near Duplicate Message Content Detection Scheme 1 Rahul Verma, 2 Joydip Dhar ABV- Indian Institute of Information Technology and Management, Gwalior-474015, India, 1,
More informationFormat 999-99-9999 OCR ICR. ID Protect From Vanguard Systems, Inc.
OCR/ICR 12 3-45. 76 79 12 3-45-7679 OCR Format 999-99-9999 Valid? Image Correction and Syntax search ICR 12 3-45. 76 79 12 3-45-76 79 Export Cancel ID Protect From Vanguard Systems, Inc. Integrated with
More informationCOAT : Collaborative Outgoing Anti-Spam Technique
COAT : Collaborative Outgoing Anti-Spam Technique Adnan Ahmad and Brian Whitworth Institute of Information and Mathematical Sciences Massey University, Auckland, New Zealand [Aahmad, B.Whitworth]@massey.ac.nz
More informationRecognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature
3rd International Conference on Multimedia Technology ICMT 2013) Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature Qian You, Xichang Wang, Huaying Zhang, Zhen Sun
More informationIdentifying Image Spam based on Header and File Properties using C4.5 Decision Trees and Support Vector Machine Learning
Identifying Image Spam based on Header and File Properties using C4.5 Decision Trees and Support Vector Machine Learning Sven Krasser, Yuchun Tang, Jeremy Gould, Dmitri Alperovitch, Paul Judge Abstract
More informationA MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM E-MAIL FILTERING 1 2
UDC 004.75 A MACHINE LEARNING APPROACH TO SERVER-SIDE ANTI-SPAM E-MAIL FILTERING 1 2 I. Mashechkin, M. Petrovskiy, A. Rozinkin, S. Gerasimov Computer Science Department, Lomonosov Moscow State University,
More informationProtecting your business from spam
Protecting your business from spam What is spam? Spam is the common term for electronic junk mail unwanted messages sent to a person s email account or mobile phone. Spam messages vary: some simply promote
More informationSender and Receiver Addresses as Cues for Anti-Spam Filtering Chih-Chien Wang
Sender and Receiver Addresses as Cues for Anti-Spam Filtering Chih-Chien Wang Graduate Institute of Information Management National Taipei University 69, Sec. 2, JianGuo N. Rd., Taipei City 104-33, Taiwan
More informationPurchase College Barracuda Anti-Spam Firewall User s Guide
Purchase College Barracuda Anti-Spam Firewall User s Guide What is a Barracuda Anti-Spam Firewall? Computing and Telecommunications Services (CTS) has implemented a new Barracuda Anti-Spam Firewall to
More informationIBM Express Managed Security Services for Email Security. Anti-Spam Administrator s Guide. Version 5.32
IBM Express Managed Security Services for Email Security Anti-Spam Administrator s Guide Version 5.32 Table of Contents 1. Service overview... 3 1.1 Welcome... 3 1.2 Anti-Spam (AS) features... 3 1.3 How
More informationANALYSIS OF THE EFFECTIVENESS IN IMAGE COMPRESSION FOR CLOUD STORAGE FOR VARIOUS IMAGE FORMATS
ANALYSIS OF THE EFFECTIVENESS IN IMAGE COMPRESSION FOR CLOUD STORAGE FOR VARIOUS IMAGE FORMATS Dasaradha Ramaiah K. 1 and T. Venugopal 2 1 IT Department, BVRIT, Hyderabad, India 2 CSE Department, JNTUH,
More informationAbout this documentation
Wilkes University, Staff, and Students have a new email spam filter to protect against unwanted email messages. Barracuda SPAM Firewall will filter email for all campus email accounts before it gets to
More informationImage Spam Filtering by Content Obscuring Detection
Image Spam Filtering by Content Obscuring Detection Battista Biggio, Giorgio Fumera, Ignazio Pillai, Fabio Roli Dept. of Electrical and Electronic Eng., University of Cagliari Piazza d Armi, 09123 Cagliari,
More informationOUTLOOK SPAM TUTORIAL
OUTLOOK SPAM TUTORIAL MS Outlook MS Outlook Express Programs Links Purpose: This tutorial is designed to provide a quick and easy way to filter your unwanted junk email, often referred to as SPAM (Self
More informationImage Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
More informationIntroduction. SonicWALL Email Security
SonicWALL Email Security Configuration Tips Introduction SonicWALL Email Security is designed to install quickly and be easy to maintain while protecting a company from email threats. The out-of-the-box
More informationIpswitch IMail Server with Integrated Technology
Ipswitch IMail Server with Integrated Technology As spammers grow in their cleverness, their means of inundating your life with spam continues to grow very ingeniously. The majority of spam messages these
More informationRepresentation of Electronic Mail Filtering Profiles: A User Study
Representation of Electronic Mail Filtering Profiles: A User Study Michael J. Pazzani Department of Information and Computer Science University of California, Irvine Irvine, CA 92697 +1 949 824 5888 pazzani@ics.uci.edu
More informationHow to Send Video Images Through Internet
Transmitting Video Images in XML Web Service Francisco Prieto, Antonio J. Sierra, María Carrión García Departamento de Ingeniería de Sistemas y Automática Área de Ingeniería Telemática Escuela Superior
More informationOIS. Update on the anti spam system at CERN. Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010
OIS Update on the anti spam system at CERN Pawel Grzywaczewski, CERN IT/OIS HEPIX fall 2010 OIS Current mail infrastructure Mail service in numbers: ~18 000 mailboxes ~ 18 000 mailing lists (e-groups)
More informationFiltering Email with Microsoft Outlook
Filtering Email with Microsoft Outlook Microsoft Outlook is an email client that can retrieve and send email from various types of mail servers. It includes some advanced functionality that allows you
More informationEvaluation of Bayesian Spam Filter and SVM Spam Filter
Evaluation of Bayesian Spam Filter and SVM Spam Filter Ayahiko Niimi, Hirofumi Inomata, Masaki Miyamoto and Osamu Konishi School of Systems Information Science, Future University-Hakodate 116 2 Kamedanakano-cho,
More informationIntroduction. How does email filtering work? What is the Quarantine? What is an End User Digest?
Introduction The purpose of this memo is to explain how the email that originates from outside this organization is processed, and to describe the tools that you can use to manage your personal spam quarantine.
More informationPANDA CLOUD EMAIL PROTECTION 3.3.0 / Administrator s Manual / 1
PANDA CLOUD EMAIL PROTECTION 3.3.0 / Administrator s Manual / 1 Contents 1 INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 5 1.1 WHAT IS PANDA CLOUD EMAIL PROTECTION?... 5 1.2 FUNCTIONALITIES... 5 2 PANDA
More informationGuidelines for the submission of invoices
Guidelines for the submission of invoices For CGI Vendors (North America Only) Contents 1. Introduction... 1 2. Scope... 1 3. Invoice Scanning and Submission Guidelines... 1 4 Frequently asked questions
More informationROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS
International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan
More informationRecognization of Satellite Images of Large Scale Data Based On Map- Reduce Framework
Recognization of Satellite Images of Large Scale Data Based On Map- Reduce Framework Vidya Dhondiba Jadhav, Harshada Jayant Nazirkar, Sneha Manik Idekar Dept. of Information Technology, JSPM s BSIOTR (W),
More informationHandwritten Character Recognition from Bank Cheque
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 Handwritten Character Recognition from Bank Cheque Siddhartha Banerjee*
More informationComputer Vision. Color image processing. 25 August 2014
Computer Vision Color image processing 25 August 2014 Copyright 2001 2014 by NHL Hogeschool and Van de Loosdrecht Machine Vision BV All rights reserved j.van.de.loosdrecht@nhl.nl, jaap@vdlmv.nl Color image
More informationIntegrating Multi-Modal Messages across Heterogeneous Networks.
Integrating Multi-Modal Messages across Heterogeneous Networks. Ramiro Liscano, Roger Impey, Qinxin Yu * and Suhayya Abu-Hakima Institute for Information Technology, National Research Council Canada, Montreal
More informationOUTLOOK SPAM TUTORIAL
OUTLOOK SPAM TUTORIAL You can find this at http://www.sitedeveloper.ws/tutorials/spam.htm. Look for the yellow highlighting and red text in this article below to know where to add the EXODUSNetwork domain
More information