Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2030376.2030378acmotherconferencesArticle/Chapter ViewAbstractPublication PagesceasConference Proceedingsconference-collections
research-article

Enhancing scalability in anomaly-based email spam filtering

Published: 01 September 2011 Publication History

Abstract

Spam has become an important problem for computer security because it is a channel for the spreading of threats such as computer viruses, worms and phishing. Currently, more than 85% of received emails are spam. Historical approaches to combat these messages, including simple techniques such as sender blacklisting or the use of email signatures, are no longer completely reliable. Many solutions utilise machine-learning approaches trained using statistical representations of the terms that usually appear in the emails. However, these methods require a time-consuming training step with labelled data. Dealing with the situation where the availability of labelled training instances is limited slows down the progress of filtering systems and offers advantages to spammers. In a previous work, we presented the first spam filtering method based on anomaly detection that reduces the necessity of labelling spam messages and only employs the representation of legitimate emails. We showed that this method achieved high accuracy rates detecting spam while maintaining a low false positive rate and reducing the effort produced by labelling spam. In this paper, we enhance that system applying a data reduction algorithm to the labelled dataset, finding similarities among legitimate emails and grouping them to form consistent clusters that reduce the amount of needed comparisons. We show that this improvement reduces drastically the processing time, while maintaining detection and false positive rates stable.

References

[1]
I. Androutsopoulos, J. Koutsias, K. Chandrinos, G. Paliouras, and C. Spyropoulos. An evaluation of naive bayesian anti-spam filtering. In Proceedings of the workshop on Machine Learning in the New Information Age, pages 9--17, 2000.
[2]
R. A. Baeza-Yates and B. Ribeiro-Neto. Modern Information Retrieval. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1999.
[3]
C. Bishop. Pattern recognition and machine learning. Springer New York., 2006.
[4]
A. Bratko, B. Filipič, G. Cormack, T. Lynam, and B. Zupan. Spam filtering using statistical data compression models. The Journal of Machine Learning Research, 7:2673--2698, 2006.
[5]
B. Burton. Spamprobe-bayesian spam filtering tweaks. In Proceedings of the Spam Conference, 2003.
[6]
P. Chirita, J. Diederich, and W. Nejdl. MailRank: using ranking for spam detection. In Proceedings of the 14th ACM international conference on Information and knowledge management, pages 373--380. ACM, 2005.
[7]
Y. Chiu, C. Chen, B. Jeng, and H. Lin. An Alliance-Based Anti-spam Approach. In Natural Computation, 2007. ICNC 2007. Third International Conference on, volume 4, pages 203--207. IEEE, 2007.
[8]
G. Cormack. TREC 2007 spam track overview. In Sixteenth Text REtrieval Conference (TREC-2007), 2007.
[9]
L. Heyer, S. Kruglyak, and S. Yooseph. Exploring expression data: identification and analysis of coexpressed genes. Genome research, 9(11):1106--1115, 1999.
[10]
T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Communications of the ACM, 50(10):94--100, 2007.
[11]
J. Kent. Information gain and a general measure of correlation. Biometrika, 70(1):163, 1983.
[12]
R. Kohavi. A study of cross-validation and bootstrap for accuracy estimation and model selection. In International Joint Conference on Artificial Intelligence, volume 14, pages 1137--1145, 1995.
[13]
V. Kumar. An introduction to cluster analysis for data mining. Computer Science Department, University of Minnesota, USA, 2000.
[14]
J. Mason. Filtering spam with spamassassin. In HEANet Annual Conference, 2002.
[15]
E. Raymond. Bogofilter: A fast open source bayesian spam filters, 2005.
[16]
G. Robinson. A statistical approach to the spam problem. Linux J., 2003:3, March 2003.
[17]
G. Sakkis, I. Androutsopoulos, G. Paliouras, V. Karkaletsis, C. Spyropoulos, and P. Stamatopoulos. A memory-based approach to anti-spam filtering for mailing lists. Information Retrieval, 6(1):49--73, 2003.
[18]
G. Salton and M. McGill. Introduction to modern information retrieval. McGraw-Hill New York, 1983.
[19]
G. Salton, A. Wong, and C. Yang. A vector space model for automatic indexing. Communications of the ACM, 18(11):613--620, 1975.
[20]
I. Santos, C. Laorden, X. Ugarte-Pedrero, B. Sanz, and P. G. Bringas. Anomaly-based spam filtering. In Proceedings of the 6 th International Conference on Security and Cryptography (SECRYPT), pages 5--14, 2011.
[21]
G. Schryen. A formal approach towards assessing the effectiveness of anti-spam procedures. In System Sciences, 2006. HICSS'06. Proceedings of the 39th Annual Hawaii International Conference on, volume 6, pages 129--138. IEEE, 2006.
[22]
W. Wilbur and K. Sirotkin. The automatic identification of stop words. Journal of information science, 18(1):45--55, 1992.
[23]
L. Zhang, J. Zhu, and T. Yao. An evaluation of statistical spam filtering techniques. ACM Transactions on Asian Language Information Processing (TALIP), 3(4):243--269, 2004.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
CEAS '11: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
September 2011
230 pages
ISBN:9781450307888
DOI:10.1145/2030376
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 September 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. anomaly detection
  2. computer security
  3. dataset clustering
  4. email spam

Qualifiers

  • Research-article

Conference

CEAS '11

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)1
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media