CFP last date
20 May 2024
Reseach Article

Spam / Junk E-Mail Filter Technique

Published on July 2016 by Hrishikesh P.
International Conference on Advances in Information Technology and Management
Foundation of Computer Science USA
ICAIM2016 - Number 2
July 2016
Authors: Hrishikesh P.
aaa1ddb2-bae6-421b-92ce-2e745f32eb3e

Hrishikesh P. . Spam / Junk E-Mail Filter Technique. International Conference on Advances in Information Technology and Management. ICAIM2016, 2 (July 2016), 18-21.

@article{
author = { Hrishikesh P. },
title = { Spam / Junk E-Mail Filter Technique },
journal = { International Conference on Advances in Information Technology and Management },
issue_date = { July 2016 },
volume = { ICAIM2016 },
number = { 2 },
month = { July },
year = { 2016 },
issn = 0975-8887,
pages = { 18-21 },
numpages = 4,
url = { /proceedings/icaim2016/number2/25509-1653/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Information Technology and Management
%A Hrishikesh P.
%T Spam / Junk E-Mail Filter Technique
%J International Conference on Advances in Information Technology and Management
%@ 0975-8887
%V ICAIM2016
%N 2
%P 18-21
%D 2016
%I International Journal of Computer Applications
Abstract

Most e-mail readers spend a significant amount of time regularly deleting junk e-mail (spam) messages, which are a part of marketing campaigning efforts of various companies wherein users normally signed in and it also results in increasing volume of storage space and consumes network bandwidth. A challenge, therefore, rests with the developers and improvement of automatic classifiers that can differentiate authentic e-mail from spam. Spam detectors normally use Naïve Bayesian approach and large feature sets of binary attributes that determine the existence of common keywords in spam emails. Spammers/Marketers recognize these approaches to impede their messages and have developed tactics to bypass these filters, but these ambiguous tactics are themselves patterns that human readers can often identify quickly. The preliminary study tests an alternative approach using a neural network (NN) classifier to overcome drawbacks of Naïve Bayesian approach. This approach uses a feature set, which uses descriptive characteristics of words and messages similar in the way that users would use to identify spam

References
  1. Androutsopoulos, I; Koutsias, J; Chandrinos, K. V. and Spyropoulos, C. D. 2000. An Experimental Comparison of Naive Bayesian and Keyword-Based Anti-Spam Filtering with Personal E-mail Messages. In Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (Athens, Greece, 2000), pp. 160-167.
  2. Burton, B. 2002. SpamProbe – Bayesian Spam Filtering Tweaks. ttp://spamprobe. sourceforge. net/paper. html; last accessed November 17, 2003.
  3. Cranor, L. F. and LaMacchia, B. A. 1998. Spam! Communications of the ACM, 41(8): pp. 74-83.
  4. Declude, IP Lookup Against a List of All Known DNS-based Spam Databases.
  5. http://www. declude. com/junkmail/support/ip4r. htm; last accessed January 27, 2004.
  6. Graham, P. 2002. A Plan for Spam. http://www. paulgraham. com/spam. html; last accessed November 17, 2003.
  7. Graham, P. 2003. Better Bayesian Filtering. In Proceedings of the 2003 Spam Conference (Cambridge, Massachusetts, 2003). See http://spamconference. org/proceedings2003. html.
  8. Hauser, S. 2002. Statistical Spam Filter Works forMe. http://www. sofbot. com/article/Statistical_spam_filter. html; last accessed November 17, 2003.
  9. Hauser. S. 2003. Statistical Spam Filter Review. http://www. sofbot. com/article/Spam_review. html; last accessed November 17, 2003.
  10. Sahami, M. ; Dumais, S. ; Heckerman, D. and Horvitz, E. 1998. A Bayesian Approach to Filtering Junk E-mail. In Learning for Text Categorization—Papers from the AAAI Workshop (Madison, Wisconsin, 1998), AAAI Technical Report WS-98-05, pp. 55-62.
  11. Sebastiani, F. 2002. Machine Learning in Automatic Text Categorization. ACM Computing Surveys (CSUR), 34(1): pp. 1-47.
  12. Spertus, E. 1997. Smokey: Automatic Recognition of Hostile Messages. In Proceedings of the 14th National Conference on AI and the 9th Conference on Innovative Applications of AI (Providence, Rhode Island, 1997), pp. 10581065.
  13. Weiss, A. 2003. Ending Spam's Free Ride. NetWorker, 7(2): pp. 18-24.
Index Terms

Computer Science
Information Sciences

Keywords

Spam Html Nsl Nls E-mail Url Neural Network