CFP last date
20 May 2024
Reseach Article

Spammer Detection by Extracting Message Parameters from Spam Emails

by Acquin Dmello, Gaurang Mhatre, Rohan Lopes, Haince Pen
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 78 - Number 10
Year of Publication: 2013
Authors: Acquin Dmello, Gaurang Mhatre, Rohan Lopes, Haince Pen
10.5120/13526-1232

Acquin Dmello, Gaurang Mhatre, Rohan Lopes, Haince Pen . Spammer Detection by Extracting Message Parameters from Spam Emails. International Journal of Computer Applications. 78, 10 ( September 2013), 21-25. DOI=10.5120/13526-1232

@article{ 10.5120/13526-1232,
author = { Acquin Dmello, Gaurang Mhatre, Rohan Lopes, Haince Pen },
title = { Spammer Detection by Extracting Message Parameters from Spam Emails },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 78 },
number = { 10 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 21-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume78/number10/13526-1232/ },
doi = { 10.5120/13526-1232 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:51:13.330657+05:30
%A Acquin Dmello
%A Gaurang Mhatre
%A Rohan Lopes
%A Haince Pen
%T Spammer Detection by Extracting Message Parameters from Spam Emails
%J International Journal of Computer Applications
%@ 0975-8887
%V 78
%N 10
%P 21-25
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Traditional and present methods to detect spam emails have been working quite well but they take no measures to detect and occlude the malicious actions of the spammers. In this paper a combination of certain parameters of an email is considered to cluster legit emails and spam emails. Initially, this approach tries to cluster spam emails. Based on their sources, the spam emails are clustered using their Message subjects, Attachments, Number of Hyperlinks, Message length, Stylistic and Semantic parameters. Since emails from same source have certain similarities, they are clustered together. These clusters are then mapped to their respective domains and their IP address is retrieved which is then reported to Anti-Spam Agencies.

References
  1. Marios Kokkodis and Ting-Kai Huang. 2006. An empirical study of spam and spammers behaviour, University of California, Riverside.
  2. Anirudh Ramachandran and Nick Feamster. 2006. Understanding the Network Level Behaviour of Spammers.
  3. Soma Halder, Richa Tiwari, Alan Sprague. 2011. Information Extraction from Spam Emails using Stylistic and Semantic Features to Identify Spammers. IEEE.
  4. F. Li, M. Hseieh. 2006. An Empirical Study of Clustering Behavior of Spammers and Group Based Anti-Spam Strategies.
  5. C. Wei, A. P. Sprague, G. Warner and A. Skjellum. 2010. Clustering spam domains and targeting spam origin for forensic analysis, J. Digital Forensics, Security, and Law (Vol: 5), ADFSL.
  6. Pedro H. Calais, Douglas E. V. Pires Dorgival Olavo Guedes, Wagner Meira Jr. , Cristine Hoepers, Klaus Steding-Jessen. 2008. A Campaign-based Characterization of Spamming Strategies.
  7. C. Liu, S. Stamm, 2007. Fighting Unicode Obfuscated Spam, InProc. Of the anti-phishing working groups 2nd annual eCrime Researchers Summit, USA.
  8. M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann,I. H. Witten, 2009. "The WEKA data mining software: An update",SIGKDD Explorations, Volume 11, USA.
  9. Henrik Bäcklund, Anders Hedblom, Niklas Neijman, 2011. A Density-Based Spatial Clustering of Application with Noise.
  10. Sudipto Guha, Rajeev Rastogi, Kyuseok Shim, 2001. Cure: An Efficient Clustering Algorithm For Large Databases
Index Terms

Computer Science
Information Sciences

Keywords

Detection Email Parameters Information Extraction Spam