Overview of Anti-spam filtering Techniques
@inproceedings{Wakchaure2017OverviewOA, title={Overview of Anti-spam filtering Techniques}, author={Sushma Laxman Wakchaure and Shailaja Dilip Pawar and Ganesh Dynandev Ghuge}, year={2017} }
Electronic mail (E-mail) is an essential communication tool that has been greatly abused by spammers to disseminate unwanted information (messages) and spread malicious contents to Internet users. Current Internet technologies further accelerated the distribution of spam. Spam-reduction techniques have developed rapidly over the last few years, as spam volumes have increased. We believe that no one anti-spam solution is the “right” answer, and that the best approach is a multifaceted one…
No Paper Link Available
References
SHOWING 1-10 OF 19 REFERENCES
Spam filtering using spam mail communities
- Computer ScienceThe 2005 Symposium on Applications and the Internet
- 2005
The new approach does not base itself on any prejudices about spam and can be used to block nonspam nuisance mails also and support users who would want selective blocking of spam mails based on their interests.
Miracle cures and toner cartridges:finding solutions to the spam problem
- Computer Science19th Annual Computer Security Applications Conference, 2003. Proceedings.
- 2003
The exponential growth in unsolicited commercial email, or spam, over the past several years has resulted in a degradation of e-mail as a useful medium for information interchange. Spam traffic…
Stacking Classifiers for Anti-Spam Filtering of E-Mail
- Computer ScienceEMNLP
- 2001
It is shown that stacking can improve the efficiency of automatically induced anti-spam filters, and that such filters can be used in real- life applications.
Multi Layer Approach to Defend DDoS Attacks Caused by Spam
- Computer Science2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07)
- 2007
A multilayer approach to defend DDoS attack caused by spam mails is proposed, which is a combination of fine tuning of source filters, content filters, strictly implementing mail policies, educating user, network monitoring and logical solutions to the ongoing attack.
SpamCop: A Spam Classification & Organisation Program
- Computer ScienceAAAI 1998
- 1998
We present a simple, yet highly accurate, spam filtering program, called SpamCop, which is able to identify about 92% of the spams while misclassifying only about 1.16% of the nonspam e-mails.…
A Chinese Anti-Spam Filter Approach Based on Support Vector Machine
- Computer Science2007 International Conference on Management Science and Engineering
- 2007
The tri-gram language model is adopted to perform word segmentation in the Chinese email, and the absolute discount smoothing algorithm is applied in order to overcome the sparse data problem.
An empirical study of spam traffic and the use of DNS black lists
- Computer ScienceIMC '04
- 2004
This paper presents quantitative data about SMTP traffic to MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) based on packet traces taken in December 2000 and February 2004.…
Chung-Kwei: a Pattern-discovery-based System for the Automatic Identification of Unsolicited E-mail Messages (SPAM)
- Computer ScienceCEAS
- 2004
The Chung-Kwei system is part of SpamGuru, a collaborative antispam filtering solution that is currently under development at IBM Research and is capable of classifying 214 messages/second, on a 2.2 GHz Intel-Pentium platform.
Managing Customer Opt-Outs in a Complex Global Environment
- Computer ScienceCEAS
- 2004
IBM’s opt-out management application, The Global E-mail Cleansing System (GECS), and the associated business process attempts to control the e-mail communications between the enterprise and its constituencies to increase the satisfaction of its customers while ensuring that customers and others can feel confident that IBM is doing its best to ensure their privacy is respected.
Winnowing: local algorithms for document fingerprinting
- Computer ScienceSIGMOD '03
- 2003
The class of local document fingerprinting algorithms is introduced, which seems to capture an essential property of any finger-printing technique guaranteed to detect copies, and a novel lower bound on the performance of any local algorithm is proved.