Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1497308.1497402acmconferencesArticle/Chapter ViewAbstractPublication PagesiiwasConference Proceedingsconference-collections
research-article

Evaluation of spam detection and prevention frameworks for email and image spam: a state of art

Published: 24 November 2008 Publication History

Abstract

In recent years, online spam has become a major problem for the sustainability of the Internet. Excessive amounts of spam are not only reducing the quality of information available on the Internet but also creating concern amongst search engines and web users. This paper aims to analyse existing works in two different categories of spam domains - email spam and mage spam to gain a deeper understanding of this problem. Future reserch directions are also presented in these spam domains.

References

[1]
W. Yi-Min, M. Ming, N. Yuan, and C. Hao, "Spam double-funnel: connecting web spammers with advertisers," in Proceedings of the 16th international conference on World Wide Web Banff, Alberta, Canada: ACM, 2007, pp. 291--300.
[2]
P. Heymann and G. Koutrika, "Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges," in IEEE INTERNET COMPUTING: IEEE Computer Society, 2007, pp. 36--45.
[3]
B. Templeton, "Proper Principles for challenge/response anti-spam system," templetons.com.
[4]
J. Junod, "Servers to spam: drop dead, Computers and Security," Elsevier, vol. 16, pp. 623--623, 1997.
[5]
"Email spam statistic." http://spamnation.info/stats/, 2007. Accessed on August 2008.
[6]
V. Freschi, A. Seraghiti, and A. Bogliolo, "Filtering Obfuscated Email Spam by means of Phonetic String Matching," Advances in Information Retrieval: 28th European Conference on IR Research, ECIR 2006: Proceeding London, UK: Springer, 2006. pp. 505--509.
[7]
C. Tseng, J. Huang, and M. Chen, "ProMail: Using Progressive Email Social Network for Spam Detection," Advances in Knowledge Discovery and Data Mining, LNCS, vol. 4426, pp. 833--840, 2007.
[8]
P. Lieven, B. Scheuermann, M. Stini, and M. Mauve, "Filtering Spam Email Based on Retry Patterns," IEEE International Conference on Communications (ICC'07), Glasgow, Scotland, pp. 1515--15250, 2007.
[9]
H. Y. Lam and D. Y. Yeung, "A Learning Approach to Spam Detection based on Social Networks" in Proceedings of the Fourth Conference on Email and Anti-Spam (CEAS), Mountain View, California, USA, 2007.
[10]
M. Andreolini, A. Bulgarelli, M. Colajanni, and F. Mazzoni, "HoneySpam: Honeypots fighting spam at the source," in Proc. USENIX Steps to Reducing Unwanted Traffic on the Internet Workshop, Cambridge, MA, 2005. pp. 11.
[11]
M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz, "A Bayesian approach to filtering junk e-mail," Learning for Text Categorization, Madison, Wisconsin 1998.
[12]
I. Androutsopoulos, G. Paliouras, V. Karkaletsis, G. Sakkis, C. D. Spyropoulos, and P. Stamatopoulos, "Learning to Filter Spam E-Mail: A Comparison of a Naive Bayesian and a Memory-Based Approach," in Proceedings of the workshop "Machine Learning and Textual Information Access", 4th European Conference on Principles and Practice of Knowledge Discovery in Databases Lyon, France, 2000, pp. 1--13.
[13]
I. Androutsopoulos, J. Koutsias, K. V. Chandrinos, and C. D. Spyropoulos, "An experimental comparison of naive Bayesian and keyword-based anti-spam filtering with personal e-mail messages," in Proceedings of the 23rd annual international ACM SIGIR conference on Research and development in information retrieval, Athens, Greece, 2000, pp. 160--167.
[14]
H. Katirai, "Filtering Junk E-Mail: A Performance Comparison between Genetic Programming and Naive Bayes," 1999.
[15]
Z. Gyongyi, H. Garcia-Molina, and J. Pedersen, "Combating Web spam with TrustRank," in Proc. 30th International Conference on Very Large Databases, Toronto, Canada, 2004, pp. 576--587.
[16]
Z. Le, Z. Jingbo, and Y. Tianshun, "An evaluation of statistical spam filtering techniques," ACM Transactions on Asian Language Information Processing (TALIP), vol. 3, pp. 243--269, 2004.
[17]
M. Dredze, R. Gevaryahu, and A. E. Bachrach, "Learning Fast Classifiers for Image Spam," in Fourth Conference on Email and Anti-Spam (CEAS 2007) Mountain View, California, 2007.
[18]
Z. Wang, W. Josephson, Q. Lv, M. Charikar, and K. Li, "Filtering Image Spam with Near-Duplicate Detection," in Proceedings of the Fourth Conference on Email and Anti-Spam, CEAS, Mountain View, California, 2007.
[19]
M. Bhaskar, N. Saurabh, G. Manish, and N. Wolfgang, "Detecting image spam using visual features and near duplicate detection," in Proceeding of the 17th international conference on World Wide Web Beijing, China: ACM, 2008.
[20]
C. J. C. Burges, "A Tutorial on Support Vector Machines for Pattern Recognition," Data Mining and Knowledge Discovery, Boston. Manufactured in The Netherlands, vol. 2, pp. 121--167, 1998.
[21]
G. Yan, Y. Ming, Z. Xiaonan, B. Pardo, W. Ying, T. N. Pappas, and A. Choudhary, "Image spam hunter," in Acoustics, Speech and Signal Processing, 2008. ICASSP 2008. IEEE International Conference, Las Vegas, Nevada, U.S.A. 2008, pp. 1765--1768.
[22]
B. Biggio, G. Fumera, I. Pillai, and F. Roli, "Image Spam Filtering Using Visual Information," in 14th International Conference on Image Analysis and Processing (ICIAP 2007) Los Alamitos, CA, USA: IEEE Computer Society, 2007, pp. 105--110.
[23]
G. Fumera, I. Pillai, and F. Roli, "Spam Filtering Based On The Analysis Of Text Information Embedded Into Images," The Journal of Machine Learning Research archive, vol. 7, pp. 2699--2720, 2006.
[24]
B. Issac and V. Raman, "Spam Detection Proposal in Regular and Text-based Image Emails," in TENCON 2006. Hong Kong. 2006 IEEE Region 10 Conference, 2006, pp. 1--4.
[25]
B. Biggio, G. Fumera, I. Pillai, and F. Roli, "Image Spam Filtering by Content Obscuring Detection," in Fourth conference on email and antispam, CEAS, Microsoft Research Silicon Valley, Mountain View, California, 2007, pp. 2--3.
[26]
G. Fumera, I. Pillai, F. Roli, and B. Biggio, "Image spam filtering using textual and visual information," in MIT Spam Conference Cambridge, MA, USA, 2007.
[27]
B. Byun, C. Lee, S. Webb, and C. Pu, "A Discriminative Classifier Learning Approach to Image Modeling and Spam Image Identification," in Fourth Conference on Email and Anti-Spam (CEAS 2007), Microsoft Research Silicon Valley, Mountain View, California. 2007.
[28]
S. Krasser, T. Yuchun, J. Gould, D. Alperovitch, and P. Judge, "Identifying Image Spam based on Header and File Properties using C4.5 Decision Trees and Support Vector Machine Learning," in Information Assurance and Security Workshop, 2007. IAW '07. IEEE SMC, United States Military Academy, West Point, New York. 2007, pp. 255--261.
[29]
D. Sculley and M. W. Gabriel, "Relaxed online SVMs for spam filtering," in Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval Amsterdam, The Netherlands: ACM, 2007. pp. 415--422.
[30]
M. Klonowski and T. Strumiński, "Proofs of Communication and Its Application for Fighting Spam," in SOFSEM 2008: Theory and Practice of Computer Science, High Tatras, Slovakia. 2008, pp. 720--730.
[31]
Z. Wang, Y. Hori, and K. Sakurai, "Application and Evaluation of Bayesian Filter for Chinese Spam," in Information Security and Cryptology, Beijing, China. 2006, pp. 253--263.
[32]
D. Sun, Q. A. Tran, H. Duan, and G. Zhang, "A Novel Method for Chinese Spam Detection Based on One-class Support Vector Machine," Journal of Information and Computational Science, vol. 1, pp. 109--114, 2005.

Cited By

View all
  • (2018)[WiP] HTU: An Efficient Hash-Trie Data Structure for URL Matching for Programmable Web Resources2018 IEEE 11th Conference on Service-Oriented Computing and Applications (SOCA)10.1109/SOCA.2018.00041(233-238)Online publication date: Nov-2018
  • (2016)Spammer detection based on comprehensive features in Sina Microblog2016 13th International Conference on Service Systems and Service Management (ICSSSM)10.1109/ICSSSM.2016.7538616(1-6)Online publication date: Jun-2016
  • (2015)Enhancement of spam detection mechanism based on hybrid $$\varvec{k}$$k-mean clustering and support vector machineSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-014-1479-219:11(3237-3248)Online publication date: 1-Nov-2015
  • Show More Cited By

Index Terms

  1. Evaluation of spam detection and prevention frameworks for email and image spam: a state of art

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      iiWAS '08: Proceedings of the 10th International Conference on Information Integration and Web-based Applications & Services
      November 2008
      703 pages
      ISBN:9781605583495
      DOI:10.1145/1497308
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 24 November 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. email spam
      2. image spam
      3. spam

      Qualifiers

      • Research-article

      Conference

      iiWAS08
      Sponsor:

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)9
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 23 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2018)[WiP] HTU: An Efficient Hash-Trie Data Structure for URL Matching for Programmable Web Resources2018 IEEE 11th Conference on Service-Oriented Computing and Applications (SOCA)10.1109/SOCA.2018.00041(233-238)Online publication date: Nov-2018
      • (2016)Spammer detection based on comprehensive features in Sina Microblog2016 13th International Conference on Service Systems and Service Management (ICSSSM)10.1109/ICSSSM.2016.7538616(1-6)Online publication date: Jun-2016
      • (2015)Enhancement of spam detection mechanism based on hybrid $$\varvec{k}$$k-mean clustering and support vector machineSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-014-1479-219:11(3237-3248)Online publication date: 1-Nov-2015
      • (2015)Multi Spatial Resolution for Image Spam FilteringAdvanced Computer and Communication Engineering Technology10.1007/978-3-319-24584-3_103(1209-1217)Online publication date: 29-Dec-2015
      • (2014)Spammer detection and tagging based user generated video search system — A surveyInternational Conference on Information Communication and Embedded Systems (ICICES2014)10.1109/ICICES.2014.7033826(1-5)Online publication date: Mar-2014
      • (2013)Spam 2.0 State of the ArtEmerging Digital Forensics Applications for Crime Detection, Prevention, and Security10.4018/978-1-4666-4006-1.ch008(103-121)Online publication date: 2013
      • (2013)A survey of image spamming and filtering techniquesArtificial Intelligence Review10.1007/s10462-011-9280-440:1(71-105)Online publication date: 1-Jun-2013
      • (2012)Spam 2.0 State of the ArtInternational Journal of Digital Crime and Forensics10.4018/jdcf.20120101024:1(17-36)Online publication date: 1-Jan-2012
      • (2012)Spam 2.0Proceedings of the CUBE International Information Technology Conference10.1145/2381716.2381855(724-731)Online publication date: 3-Sep-2012
      • (2011)A rule-based system for end-user e-mail annotationsProceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference10.1145/2030376.2030388(102-108)Online publication date: 1-Sep-2011
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media