CFP last date
20 June 2024
Reseach Article

A Novel Anti-Spam Solution to Minimize False Positive Alarm Rate in Bulk Spam

by Abdulkareem Al- Alwani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 155 - Number 5
Year of Publication: 2016
Authors: Abdulkareem Al- Alwani

Abdulkareem Al- Alwani . A Novel Anti-Spam Solution to Minimize False Positive Alarm Rate in Bulk Spam. International Journal of Computer Applications. 155, 5 ( Dec 2016), 33-40. DOI=10.5120/ijca2016912318

@article{ 10.5120/ijca2016912318,
author = { Abdulkareem Al- Alwani },
title = { A Novel Anti-Spam Solution to Minimize False Positive Alarm Rate in Bulk Spam },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 155 },
number = { 5 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 33-40 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2016912318 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-07T00:00:29.830783+05:30
%A Abdulkareem Al- Alwani
%T A Novel Anti-Spam Solution to Minimize False Positive Alarm Rate in Bulk Spam
%J International Journal of Computer Applications
%@ 0975-8887
%V 155
%N 5
%P 33-40
%D 2016
%I Foundation of Computer Science (FCS), NY, USA

Spam has emerged to be an impending problem for internet users and operators as the extensive penetration of spam is now affecting almost every entity associated with the internet. Email filtering and blocking efforts by network operators, software vendors and Internet service providers (ISPs) are the key actions that are used to stop spam before it reaches their users. Recent estimates by reliable organization nonetheless indicate that spam makes up between 70% and 80% of email traffic worldwide. Thus, spam can create a significant burden for network operators, and the problems associated with spam are more dominant in developing countries, where high volumes of incoming and outgoing spam can cause a severe drain on the already choked bandwidth that is available in those regions. While providing an overview of the impact caused by spam and the efforts carried out worldwide to fight spam, a novel solution for spam analysis is presented in this study. The main strength of the proposed approach lies in the reduced rate of false positive alarm, i.e. detection and rejection of valid emails. Five functional blocks along with six spam analysis techniques were employed in this anti-spam solution which operated in a sequential manner with intelligently designed rules to minimize false positive emails. The proposed model was tested on 56 email accounts handled by enrolled students in three major departments of a local Saudi Arabian University over a span of one year and results showed a marked decrease in false positive alarm rate. The model proved to be an effective solution for multi-tier anti-spam defense and can be employed in various applications to mitigate spam outreach in online email and messaging services.

  1. Partridge, C., "The Technical Development of Internet Email," in Annals of the History of Computing, IEEE , vol.30, no.2, pp.3-29, April-June 2008
  2. Lei Jin; Takabi, H.; Joshi, J.B.D., "Security and Privacy Risks of Using E-mail Address as an Identity," in Social Computing (SocialCom), 2010 IEEE Second International Conference on , vol., no., pp.906-913, 20-22 Aug. 2010
  3. Aladdin Knowledge Systems, Anti-spam white paper, [Online]. Available: [Retrieved 10-Aug- 2015]
  4. F. Smadja, H. Tumblin, "Automatic spam detection as atext classification task", in: Proc. of Workshop onOperational Text Classification Systems, 2002
  5. S. Hinde, 'Spam, scams, chains, hoaxes and other junk mail', Computers & Security, vol. 21, no. 7, pp. 592-606, 2002.
  6. M. Butler, 'Spam — the meat of the problem', Computer Law & Security Review, vol. 19, no. 5, pp. 388-391, 2003.
  7. S. Ghiam, 'A Survey on Web Spam Detection Methods: Taxonomy', International Journal of Network Security & Its Applications, vol. 4, no. 5, pp. 119-134, 2012.
  8., 'Australian eMarketing Code of Practice | ACMA', 2015. [Online]. Available: [Accessed: 02- Aug- 2015].
  9., ‘An Act to promote the efficiency and adaptability…’ [Online] Available: [Accessed: 18- June- 2015].
  10. European Commission e-Privacy and Electronic Communications Directive. [Online]. Available: 20091219: EN: NOT. [Accessed: 10-July- 2015].
  11., 'U.S. State Anti-Spam Laws: Introduction and Broader Framework | LII / Legal Information Institute', 2015. [Online]. Available: [Accessed: 24- June- 2015].
  12., 'Anti-Spam -', 2015. [Online]. Available: [Accessed: 11- June- 2015].
  13., 'Japanese New Anti-Spam Law | Resources | Morrison Foerster', 2015. [Online]. Available: [Accessed: 01- July- 2015].
  14., 'Spam Control Framework - Policies and Regulations - Infocomm Development Authority of Singapore', 2015. [Online]. Available: [Accessed: 19- July- 2015].
  15., 'OECD Anti-Spam Toolkit of Recommended Policies and Measures - Books - OECD iLibrary', 2015. [Online]. Available: [Accessed: 02-Aug- 2015].
  16., 'APEC Principles for Action against Spam - Asia-Pacific Economic Cooperation', 2015. [Online]. Available: [Accessed: 29- Sep- 2015].
  17., 'ITU Activities on Countering Spam', 2015. [Online]. Available: [Accessed: 18-Aug- 2015].
  18., 'Cyber Security | African Union', 2015. [Online]. Available: [Accessed: 09- Aug- 2015].
  19. HailongHou; Chen, Yan; Beyah, R.; Yan-Qing Zhang, "Filtering Spam by Using Factors Hyperbolic Tree," in Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE , vol., no., pp.1-5, Nov. 30 2008-Dec. 4 2008
  20. Chi-Yuan Yeh; Chih-Hung Wu; Shing-Hwang Doong, "Effective spam classification based on meta-heuristics," in Systems, Man and Cybernetics, 2005 IEEE International Conference on , vol.4, no., pp.3872-3877 Vol. 4, 10-12 Oct. 2005
  21. Yan, J.; Pook Leong Cho, "Enhancing Collaborative Spam Detection with Bloom Filters," in Computer Security Applications Conference, 2006. ACSAC '06. 22nd Annual , vol., no., pp.414-428, Dec. 2006
  22. Issac, B.; Jap, W.J.; Sutanto, J.H., "Improved Bayesian Anti-Spam Filter Implementation and Analysis on Independent Spam Corpuses," in Computer Engineering and Technology, 2009. ICCET '09. International Conference on , vol.2, no., pp.326-330, 22-24 Jan. 2009.
  23. Kandasamy, K.; Koroth, P., "An integrated approach to spam classification on Twitter using URL analysis, natural language processing and machine learning techniques," in Electrical, Electronics and Computer Science (SCEECS), 2014 IEEE Students' Conference on , vol., no., pp.1-5, 1-2 March 2014
  24. Peng Li; Miao Liu; Fan Zhang; Tang Chunming, "An Improved Anti-Spam Method TOMO Based on Challenge-Response Technology," in Intelligent Ubiquitous Computing and Education, 2009 International Symposium on , vol., no., pp.113-116, 15-16 May 2009
  25. Suman Das; Singh, R.; Joshi, R.C.; Toshiwal, D., "Reducing the Effect of Distributed Directory Harvest Attack and Load of Mail Server," in Industrial and Information Systems, 2008. ICIIS 2008. IEEE Region 10 and the Third international Conference on , vol., no., pp.1-6, 8-10 Dec. 2008
  26. Sandford, P.J.; Sandford, J.M.; Parish, D.J., "Analysis of SMTP Connection Characteristics for Detecting Spam Relays," in Computing in the Global Information Technology, 2006. ICCGI '06. International Multi-Conference on , vol., no., pp.68-68, Aug. 2006
  27. Wenxuan Shi; MaoqiangXie; Yalou Huang, "Collaborative spam filtering technique based On MIME fingerprints," in Intelligent Control and Automation (WCICA), 2011 9th World Congress on , vol., no., pp.225-230, 21-25 June 2011
Index Terms

Computer Science
Information Sciences


Spam Anti-Spam Anti-Spam laws Spam Email Spam impact Social networking spam anti-spam strategies