IJISA Vol. 4, No. 10, 8 Sep. 2012
Cover page and Table of Contents: PDF (size: 547KB)
Full Text (PDF, 547KB), PP.25-34
Views: 0 Downloads: 0
E-mail Spam, Unsolicited Bulk Messages, Filtering, Information Attack, Human Rights, Multilayer Architecture
In this paper the development of anti-spam software detecting information attacks is offered. For this purpose it is considered spam filtration system with the multilayered, multivalent architecture, coordinating all ISP’s in the country. All users and ISPs of this system involved in spam filtration process. After spam filtering process, saved spam templates are analyzed and classified. This parameterizing of spam templates give possibility to define the thematic dependence from geographical. For example, what subjects prevail in spam messages sent from the certain countries? Analyzing origins of spam templates from spam-base, it is possible to define and solve the organized social networks of spammers. Thus, the offered system will be capable to reveal purposeful information attacks if those occur.
Saadat Nazirova, "Anti-Spam Software for Detecting Information Attacks", International Journal of Intelligent Systems and Applications(IJISA), vol.4, no.10, pp.25-34, 2012. DOI:10.5815/ijisa.2012.10.03
[1]A. Taranov, O. Slepov, Email security, http://www.nextmail.ru/hist/security.phtml?t=2 (in russian)
[2]Wikipedia, Spam. http://en.wikipedia.org/wiki/Spam_email
[3]McAfee Threats Report: Fourth Quarter 2011, http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q4-2011.pdf
[4]J. P. Denning, ACM president's letter: electronic junk. Communications of the ACM, Vol. 25, No. 3, March 1982, pp. 163-165.
[5]M. Sahami, Learning limited dependence Bayesian classifiers. Proceedings of the second International conference on knowledge discovery and Data mining, Menlo Park, CA, 1996, pp. 334-338.
[6]M. Sahami, S. Dumais, D. Heckerman, et al., A Bayesian approach to filtering junk email. AAAI Workshop on Learning for Text Categorization, 1998, AAAI Technical Report WS-98-05.
[7]J. R. Hall, How to avoid unwanted email. Communications of the ACM, Vol. 41, no.3, March 1998, pp. 88-95.
[8]E. Gabber, M. Jakobsson, Y. Matias, et al., Curbing junk e-mail via secure classification. Proceedings of the second International conference on financial cryptography, March 23-25, 1998, pp. 198-213.
[9]L.M. Spracklin, L.V. Saxton, Filtering spam using Kolmogorov complexity estimates. 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), Vol. 1, 2007, pp.321-328. (in russian)
[10]P. Boldi, M. Santini, S. Vigna, PageRank as a function of the damping factor. Proceedings of the 14th International conference on World Wide Web, May 10-14, 2005, pp. 557-566.
[11]J. Gordillo, E. Conde, An HMM for detecting spam mail. Expert systems with applications, Vol. 33, no. 3, October 2007, pp. 667-682.
[12]I. Santos, C. Laorden, B. Sanz, et al., Enhanced Topic-based Vector Space Model for semantics-aware spam filtering. Expert Systems with applications, no.39 (2012), 2012, pp. 437-444.
[13]C. H. Li, J. X. Huang, Spam filtering using semantic similarity approach and adaptive BPNN. Neurocomputing, no. 92 (2012), 2012, pp. 88-97.
[14]J. C. Gomez, M.-F. Moens, PCA document reconstruction for email classification. Computational Statistics and Data Analysis, no. 56 (2012), 2012, pp. 741-751.
[15]A. A. Tiago, A. Yamakami, Facing the spammers: A very effective approach to avoid junk e-mails. Expert Systems with Applications, no. 39 (2012), 2012, pp. 6557-6561.
[16]C. Laorden, I. Santos, B. Sanz, et al., Word sense disambiguation for spam filtering. Electronic Commerce Research and Applications, December 2011, pp. 1-3.
[17]F. Salcedo-Campos, J. Dнaz-Verdejo, P. Garcнa-Teodoro, Segmental parameterization and statistical modeling of e-mail headers for spam detection. Information Sciences, no. 195(2012), 2012, pp. 45-61.
[18]N. Perez-Diaz, D. Ruano-Ordos, F. Fdez-Riverola, et al., SDAI: An integral evaluation methodology for content-based spam filtering models. Expert Systems with Applications, 2012, pp. 1-14.
[19]Universal Declaration of human rights, Article 19 http://www.un.org/en/documents/udhr/index.shtml#a19
[20]P. A. Baranov, Review of anti-spam and E-mail viruses. Computer Systems, no.1, 2004, pp. 44-50. (in russian)
[21]B.Y. Sirkov, "Killers" and "consumers" or the fight against spam. Technology and Communications, no. 4, 2004, pp. 102-105. (in russian)
[22]R. Anderson , Get rid of spam. Networks and communication systems, no. 11(117), 2004, pp. 94-104 (in russian)
[23]L. Pelletier, J. Almhana, V. Choulakian, Adaptiv Filtering of SPAM. Proceedings of the Second Annual Conference on Communication Networks and Services Research. IEEE, 2004. pp. 530-537.
[24]R. M. Alguliyev, S. H. Nazirova, Multilayer and Multiagent Automated E-mail Filtration System. Telecommunications and Radioengeneering, Vol.67, no.12, Begell House, 2008, pp. 1089-1095.
[25]R.M. Alguliyev, R.M. Aliguliyev, Classification of Textual E-Mail Spam Using Data Mining Techniques. Applied Computational Intelligence and Soft Computing Vol. 2011, Article ID 416308, 8 pg.
[26]C. James, H. Ray, Tightening the net: A review of current and next generation spam filtering tools. Computers and security, no. 25, 2006, pp. 566-578.
[27]H. Wen-Feng, Ch. Te-Min, An incremental cluster-based approach to spam filtering. Expert Systems with applications, no. 34, 2008, pp. 1599-1608.
[28]M. L. Sang, S. K. Dong, S. P. Jong, Spam Detection Using Feature Selection and Parameters Optimization. IEEE International Conference on Complex Intelligent and Software Intensive Systems, 2010, pp. 883-888.
[29]F. S. Mehrnoush, B. Hamid, Spam detection using dynamic weighted voting based on clustering. Second International Symposium on Intelligent Information Technology Application IEEE, no. 2, 2008, pp. 122-126
[30]S. Minoru, Sh. Hiroyuki, Spam detection using text clustering. IEEE Proceedings of the 2005 International Conference on Cyberwords, 2005, pp. 316-319.
[31]C. Paulo, L. Clotilde, S. Pedro, et al., Symbiotic Data Mining for Personalized Spam Filtering. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2009, pp. 149-156.
[32]Kh. Ahmed, An Overview of Content-Based Spam Filtering Techniques. Informatica, no. 31, 2007, pp. 269-277.
[33]S. Nazirova, Mechanism of classification of text spam messages collected in spam pattern bases. PCI 2010 Third International Conference on Problems of Cybernetics and Informatics, N2, 2010, pp. 206-209.
[34]R. M. Alguliyev, S. H. Nazirova, Mechanism of formation and realisation of anti-spam policy. Telecommunications, Moscow, Vol. 12, 2009, pp. 6-1. (in Russian)