Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2030376.2030388acmotherconferencesArticle/Chapter ViewAbstractPublication PagesceasConference Proceedingsconference-collections
research-article

A rule-based system for end-user e-mail annotations

Published: 01 September 2011 Publication History

Abstract

A new system for spam e-mail annotation by end-users is presented. It is based on the recursive application of handwritten annotation rules by means of an inferential engine based on Logic Programming. Annotation rules allow the user to express nuanced considerations that depend on deobfuscation, word (non-)occurrence and structure of the message in a straightforward, human-readable syntax. We show that a sample collection of annotation rules are effective on a relevant corpus that we have assembled by collecting emails that have escaped detection by the industry-standard SpamAssassin filter. The system presented here is intended as a personal tool enforcing personalized annotation rules that would not be suitable for the general e-mail traffic.

References

[1]
R. Baumgartner, S. Flesca, and G. Gottlob. Visual web information extraction with lixto. In P. M. G. Apers, P. Atzeni, S. Ceri, S. Paraboschi, K. Ramamohanarao, and R. T. Snodgrass, editors, VLDB, pages 119--128. Morgan Kaufmann, 2001.
[2]
G. V. Cormack and T. R. Lynam. Spam corpus creation for trec. In Proc. of the Second Conference on Email and Anti-Spam (CEAS 2005), 2005.
[3]
G. V. Cormack and T. R. Lynam. Online supervised spam filter evaluation. ACM Trans. Inf. Syst., 25(3), 2007.
[4]
E. Denti, A. Omicini, and A. Ricci. Multi-paradigm java-prolog integration in tuprolog. Sci. Comput. Program., 57(2):217--250, 2005.
[5]
G. Fiumara, M. Marchi, R. Pagano, and A. Provetti. Rule-based spam e-mail annotation. In P. Hitzler and T. Lukasiewicz, editors, RR, volume 6333 of Lecture Notes in Computer Science, pages 231--234. Springer, 2010.
[6]
N. A. Fonseca, A. Srinivasan, F. M. A. Silva, and R. Camacho. Parallel ilp for distributed-memory architectures. Machine Learning, 74(3):257--279, 2009.
[7]
G. Gottlob, C. Koch, R. Baumgartner, M. Herzog, and S. Flesca. The lixto data extraction project - back and forth between theory and practice. In A. Deutsch, editor, PODS, pages 1--12. ACM, 2004.
[8]
P. Hayati and V. Potdar. Evaluation of spam detection and prevention frameworks for email and image spam: a state of art. In G. Kotsis, D. Taniar, E. Pardede, and I. K. Ibrahim, editors, iiWAS, pages 520--527. ACM, 2008.
[9]
P. Hayati, V. Potdar, A. Talevski, and W. Smyth. Rule-based on-the-fly web spambot detection using action strings. In CEAS, 2010.
[10]
H. Lee and A. Y. Ng. Spam deobfuscation using a hidden markov model. In Proc. of the Second Conference on Email and Anti-Spam (CEAS 2005), 2005.
[11]
S. Lee, I. Jeong, and S. Choi. Dynamically weighted hidden markov model for spam deobfuscation. In Proc. of IJCAI (IJCAI 2007), 2007.
[12]
V. W. Marek and M. Truszczyński. Stable models and an alternative logic programming paradigm. The Logic Programming Paradigm: a 25-Year Perspective, Springer-Verlag, pages 75--398, 1999.
[13]
S. Muggleton, R. P. Otero, and S. Colton. Editorial: special issue on inductive logic programming. Machine Learning, 70(2--3):119--120, 2008.
[14]
D. Poole, A. Macworth, and R. Goebel. Computational Intelligence: a Logical Approach (2nd ed). Oxford University Press, 2007.
[15]
M. Sergeant. Internet-level spam detection and spamassassin 2.50. In Spam Conference, 2003.
[16]
C. J. van Rijsbergen. Information Retrieval (2nd ed.). Butterworths, London, 1979.
[17]
J. Wielemaker and A. Anjewierden. An architecture for making object-oriented systems available from prolog. In Proc. of the 12th Int'l Workshop on Logic Programming Environments (WLPE2002), 2002.
[18]
W. Yih, R. McCann, and A. Kotcz. Improving spam filtering by detecting gray mail. In Proc. of the fourth Conference on Email and Anti-Spam (CEAS 2007), 2007.

Cited By

View all
  • (2014)Three-Way Decisions Versus Two-Way Decisions on Filtering Spam EmailTransactions on Rough Sets XVIII10.1007/978-3-662-45909-6_5(69-91)Online publication date: 20-Aug-2014
  • (2014)Three-Way Decisions Versus Two-Way Decisions on Filtering Spam EmailTransactions on Rough Sets XVIII10.1007/978-3-662-44680-5_5(69-91)Online publication date: 2014

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
CEAS '11: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
September 2011
230 pages
ISBN:9781450307888
DOI:10.1145/2030376
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 September 2011

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

CEAS '11

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2014)Three-Way Decisions Versus Two-Way Decisions on Filtering Spam EmailTransactions on Rough Sets XVIII10.1007/978-3-662-45909-6_5(69-91)Online publication date: 20-Aug-2014
  • (2014)Three-Way Decisions Versus Two-Way Decisions on Filtering Spam EmailTransactions on Rough Sets XVIII10.1007/978-3-662-44680-5_5(69-91)Online publication date: 2014

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media