Anti spam Research Papers - Academia.edu (original) (raw)

The problem with Social networks has been a major issues globally. In recent years, Spam Detection on social networks has been focused. However, Spammer has seen that social networks are vulnerable to attack in order to perpetrate their... more

The problem with Social networks has been a major issues globally. In recent years, Spam Detection on social networks has been focused. However, Spammer has seen that social networks are vulnerable to attack in order to perpetrate their evil. Influx of spam has been a great threat to individual, organization, government, institution if left unchecked, spam threatens to undermine resource sharing, interactivity, and openness. Due to the ubiquitous use of social networks it has generated huge amount of social data which gives the spammer the leverage to performance various forms of malicious attack and spam activities. This paper survey three computational categorization issues on social networks like Size, Noise and Dynamism, due to the issue often experience on social networks data that are complex to analyse. The paper talk on the Various Data mining techniques used in mining diverse aspects of the social networks site analysis over decades going from the inception to the up to date models, include use of novel algorithms likes Porter Stemmer algorithm, TF-IDF algorithms that are proposed. General Terms Porter Stemmer Algorithm (PSA), TF-IDF Algorithm,

There are many social media and messengers in use today, because of the situation with the corona virus pandemic the social media have become an integral part of our daily lives, including work activities. However, there is a lot of... more

There are many social media and messengers in use today, because of the situation with the corona virus pandemic the social media have become an integral part of our daily lives, including work activities. However, there is a lot of unnecessary information that comes to users in large quantities, so the problem of dealing with spam messages on social networks and messengers is now very relevant. By spam we mean any messages that a particular user (person, company, etc.) considers unnecessary in a particular text stream. The project is dedicated to solving the scientific problem of detecting spam messages in the text context of any social network or messenger using anti-spam bot that is based on various spam detection algorithms. Four algorithms were implemented and investigated: an algorithm using naive Bayesian classifier, support vector method, multilayer perceptron neural network and convolutional neural network. The main idea is to develop a complex spam detection algorithm for ...

Today very important means of communication is the e-mail that allows people all over the world to communicate, share data, and perform business. Yet there is nothing worse than an inbox full of spam; i.e., information crafted to be... more

Today very important means of communication is the e-mail that allows people all over the
world to communicate, share data, and perform business. Yet there is nothing worse than an
inbox full of spam; i.e., information crafted to be delivered to a large number of recipients
against their wishes. In this paper, we present a numerous anti-spam methods and solutions that
have been proposed and deployed, but they are not effective because most mail servers rely on
blacklists and rules engine leaving a big part on the user to identify the spam, while others rely
on filters that might carry high false positive rate.

In January 2004, the United States Congress passed and put into effect the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN SPAM). The Act was set forth to regulate bulk commercial email (spam) and set the... more

In January 2004, the United States Congress passed and put into effect the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN SPAM). The Act was set forth to regulate bulk commercial email (spam) and set the limits for what was acceptable. Various sources have since investigated and speculated on the efficacy of the CAN SPAM Act, few of which report a desirable outcome for users of electronic mail. Despite the apparent consensus of anti-spam firms and the community of email users that the Act was less than effective, there is little to no research on the efficacy of the Act that utilizes any significant statistical rigor or accepted scientific practices. The present study seeks to determine what, if any, impact the CAN SPAM Act had on spam messages and to identify areas of improvement to help fight spam that is both fraudulent and dangerous. The data consisted of 2,071,965 spam emails sent between February 1, 1998 and December 31, 2008. The data were aggregated by month and an interrupted time series design was chosen to assess the impact the CAN SPAM Act had on spam. Analyses revealed that the CAN SPAM Act had no observable impact on the amount of spam sent. The Act was found to have no effect on spammer compliance with two out of three spam laws in the CAN SPAM Act. The one law out of the three where there was a noticeable effect resulted in a decrease in compliance following the Act’s passing. Lastly, the Act had no impact on the number of spam emails with IP addresses assumed to be within the United States. Implications of these findings and suggestions for policy are discussed.

–The Spam Emails are regularly causing huge losses to business on a regular basis. The Spam filtering is an automated technique to identity SPAM and HAM (Non-Spam). The Web Spam filters can be categorized as: Content based spam filters... more

–The Spam Emails are regularly causing huge losses to business on a regular basis. The Spam filtering is an automated technique to identity SPAM and HAM (Non-Spam). The Web Spam filters can be categorized as: Content based spam filters and List based spam filters. In this research work, we have studied the spam statistics of a famous Spambot 'Srizbi'. We have also discussed different approaches for Spam Filtering and finally proposed a new algorithm which is made on the basis of behavioral approaches of Spammers and to restrict the budding economical growth of Spam generating company's. We have used the hidden Honeypot and a Honeytrap module to minimize the spam generated from Contact and Feedback forms on public and social networking CMS websites.

Cybercrime and the threat it creates are growing in its reach, in accordance with similar growth in information technology. Some countries account for more of the variation in cybercrime activity than others, which affects less criminally... more

Cybercrime and the threat it creates are growing in its reach, in accordance with similar growth in information technology. Some countries account for more of the variation in cybercrime activity than others, which affects less criminally involved nations as well, considering that cybercrime does not respect national borders over the Internet. Routine activity theory (RAT) has been used to explain cybercrime at the individual level, but not at the national level. Much research has focused on high cybercrime countries, but this research is often conducted by cybersecurity firms and is exclusively descriptive, making no inferences. This research sought to determine what characteristics predict whether a nation is high in either spamming activity or phishing activity. In a sample of 132 countries, it was found that wealthier nations with more Internet users per capita had higher cybercrime activity. Unemployment was also found to interact with Internet users such that the effect of the proportion of Internet users on spam was strongest in nations with higher unemployment. The implications these findings have for policy and suggestions for future research are discussed.

"Les attaques de spams sont désormais plus précises. Les récentes failles en matière de cybersécurité ont permis la capture de nombreuses données... et potentiellement plus d'arnaques. D'autant plus qu'en se focalisant sur... more

"Les attaques de spams sont désormais plus précises. Les récentes failles en matière de cybersécurité ont permis la capture de nombreuses données... et potentiellement plus d'arnaques. D'autant plus qu'en se focalisant sur l'individualisation des contenus, ils parviennent à tromper plus aisément."

Spam is the sending of bulk, commercial, unsolicited electronic marketing messages. Today email spam makes up the majority of all email sent worldwide. The CAN SPAM Act is U.S. federal legislation that was passed in response to the... more

Spam is the sending of bulk, commercial, unsolicited electronic marketing messages. Today email spam makes up the majority of all email sent worldwide. The CAN SPAM Act is U.S. federal legislation that was passed in response to the growing spam problem. However, cybercrime such as email spam does not respect national borders, and spam can be sent from anywhere in the world, so it is questioned whether the CAN SPAM Act simply shifted spam beyond United States jurisdiction. The present research sought to address this question by analyzing the impact that prosecutions of spammers has had on a sample of 5,490,905 spam emails sent between 1998 and 2013. Two measures of spam nation of origin, U.S. IP address and U.S. domain name among spam emails, were created to assess the possible impact that the CAN SPAM Act might have had on the nation of origin associated with spam email messages. Results suggest a possible impact, with more ongoing CAN SPAM Act trials and media attention predicting less spam associated with the United States. CAN SPAM activity appeared to have the largest impact on US domain name registrations. Implications of the findings and suggestions for future research are discussed.

Spam messages are nuisance and huge problem to most users since they clutter their mailboxes and waste their time to delete all the junk mails before reading the legitimate ones. They also cost user money with dial up connections, waste... more

Spam messages are nuisance and huge problem to most users since they clutter their mailboxes and waste their time to delete all the
junk mails before reading the legitimate ones. They also cost user money with dial up connections, waste network bandwidth and disk space and
most importantly make available harmful and offensive materials such as pornographic sites to children. All these problems can be rectified by
using an apt Mail filter. The Mail filter that we have considered here is open source engine widely known as Anti Spam SMTP Proxy.
This paper provides a framework to overcome the limitations of the existing ASSP server engine by restructuring the existing ASSP server
engine. This paper would deal with spam detection as image spam, video spam that come as attachments and a single line message that would
direct to another URL with a trainable fuzzy classifier to build an automatic anti spam filter. Based on the rule, evaluations were done to predict
whether the given mail is a valid or invalid and the report is updated in the database. Finally, our work attempts to improve performance of the
Anti Spam SMTP Proxy Mailfilter by configuring the ASSP server engine with an efficient Mail Transfer Agent based on the analysis done with
leading open source MTAs like Sendmail, Postfix and Qmail.

–The Unsolicited Bulk Email (UBE) or SPAM are regularly causing potential losses to online business and email account holders. The conventional Spam filtering is purely based on automatically identifying SPAM and HAM (Non-Spam). The... more

–The Unsolicited Bulk Email (UBE) or SPAM are regularly causing potential losses to online business and email account holders. The conventional Spam filtering is purely based on automatically identifying SPAM and HAM (Non-Spam). The CATPCHA is one of the popular techniques to detect Web Spamming, which is increasing the complexity of form submission by even the genuine or HAM users. In this research work, we tried to skip filling CAPTCHA and still managing to control the SPAM by a significant margin. We have proposed a modified algorithm for Spam Filtering in which behavioral approach of Spammers is considered to restrict the grown of economical status of Spam generating companies. We have used a special hidden Honeytrap module to minimize the spam generation by the Web forms available on various public and social networking websites for comment, feedback or contact.

In this paper we show an instance-based reasoning e-mail filtering model that outperforms classical machine learning techniques and other successful lazy learners approaches in the domain of anti-spam filtering. The architecture of the... more

In this paper we show an instance-based reasoning e-mail filtering model that outperforms classical machine learning techniques and other successful lazy learners approaches in the domain of anti-spam filtering. The architecture of the learning-based anti-spam filter is based on a ...

There are many social media and messengers in use today, because of the situation with the corona virus pandemic the social media have become an integral part of our daily lives, including work activities. However, there is a lot of... more

There are many social media and messengers in use today, because of the situation with the corona virus pandemic the social media have become an integral part of our daily lives, including work activities. However, there is a lot of unnecessary information that comes to users in large quantities, so the problem of dealing with spam messages on social networks and messengers is now very relevant. By spam we mean any messages that a particular user (person, company, etc.) considers unnecessary in a particular text stream. The project is dedicated to solving the scientific problem of detecting spam messages in the text context of any social network or messenger using anti-spam bot that is based on various spam detection algorithms. Four algorithms were implemented and investigated: an algorithm using naive Bayesian classifier, support vector method, multilayer perceptron neural network and convolutional neural network. The main idea is to develop a complex spam detection algorithm for anti-spam bot, which is fast and easy to implement in a messenger (social network). We propose to use the application of the obtained solutions for IT companies. The developed complex algorithm can be used not only to remove spam, but also, for example, to monitor chats for messages that are important to a particular user.

Cilj ovog rada je izgraditi anti-spam filter, softverski alati koji automatski prepoznaje dolazne neželjene poruke. Dakle, radi se o machine learning sustavu koji na temelju naučenih podataka o tome što je dobar mail, a što loš može... more

Cilj ovog rada je izgraditi anti-spam filter, softverski alati koji automatski prepoznaje dolazne neželjene poruke. Dakle, radi se o machine learning sustavu koji na temelju naučenih podataka o tome što je dobar mail, a što loš može donositi zaključke za buduće mailove. Spomenuto zaključivanje temeljiti će se na Bayesovom teoremu - popularnoj statističkoj tehnici koja se koristi za filtriranje e-pošte za otkrivanje neželjene pošte.

Has someone been sending spam or viruses over eMail with your identity? With identity theft scams of any type, once the forger has your information it's very difficult to do much until they're either caught [by authorities], or their... more

Has someone been sending spam or viruses over eMail with your identity? With identity theft scams of any type, once the forger has your information it's very difficult to do much until they're either caught [by authorities], or their resources are cut off, or they choose to move on to forging someone else's identity.

IntroductionThe advancement of computing today has allowed human beings to automate many tasks that together make life easier. As technology continues to improve, more and more of our everyday activities are similarly improved, with... more

IntroductionThe advancement of computing today has allowed human beings to automate many tasks that together make life easier. As technology continues to improve, more and more of our everyday activities are similarly improved, with better speed, ease, and functionality. Yet technology is a tool, the functionality of which can be given many different meanings. Technology together with information in this age is power, and power can be used for both good and ill.With new ways to exploit technology, the law has always been there to reign in the means by which criminals take advantage of changing tools. The law, like technology, is not static. But in this age science and technology have known an exponential improvement of accelerating returns, where newer inventions emerge faster than they did before. The legal system does not seem to have matched this speed.In the information age, knowledge is power. So too is the fraudulent representation of knowledge similarly powerful. Computers ha...

In this paper we show an instance-based reasoning e-mail filtering model that outperforms classical machine learning techniques and other successful lazy learners approaches in the domain of anti-spam filtering. The architecture of the... more

In this paper we show an instance-based reasoning e-mail filtering model that outperforms classical machine learning techniques and other successful lazy learners approaches in the domain of anti-spam filtering. The architecture of the learning-based anti-spam filter is based on a tuneable enhanced instance retrieval network able to accurately generalize e-mail representations. The reuse of similar messages is carried out by a simple unanimous voting mechanism to determine whether the target case is spam or not. Previous to the final response of the system, the revision stage is only performed when the assigned class is spam whereby the system employs general knowledge in the form of metarules .

Free condamné pour blocage de spam destiné à ses abonnés : quand la justice complique la protection des consommateurs Pour protéger ses utilisateurs de l'inondation de spam et dans le cadre de sa politique de filtrage, Free a décidé, en... more

Free condamné pour blocage de spam destiné à ses abonnés : quand la justice complique la protection des consommateurs Pour protéger ses utilisateurs de l'inondation de spam et dans le cadre de sa politique de filtrage, Free a décidé, en juillet dernier, de bloquer à la source un flux de spam devenant trop opulent. La société émettrice a porté plainte contre Free et la justice lui a donné raison. Le spam n'a, en effet, aucune valeur juridique.

Today very important means of communication is the e-mail that allows people all over the world to communicate, share data, and perform business. Yet there is nothing worse than an inbox full of spam; i.e., information crafted to be... more

Today very important means of communication is the e-mail that allows people all over the world to communicate, share data, and perform business. Yet there is nothing worse than an inbox full of spam; i.e., information crafted to be delivered to a large number of recipients against their wishes. In this paper, we present a numerous anti-spam methods and solutions that have been proposed and deployed, but they are not effective because most mail servers rely on blacklists and rules engine leaving a big part on the user to identify the spam, while others rely on filters that might carry high false positive rate.

This study sought to evaluate the deterrent impact the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN SPAM) Act has had on email spam rates over time. A sample of 5,490,905 spam emails was collected and aggregated... more

This study sought to evaluate the deterrent impact the Controlling the Assault of Non-Solicited Pornography and Marketing (CAN SPAM) Act has had on email spam rates over time. A sample of 5,490,905 spam emails was collected and aggregated into a monthly time series. Thirteen measures of CAN SPAM Act enforcement were coded from news articles and included in a time-series regression. The results suggest a possible deterrent effect of prosecutions, convictions, and lengthy jail sentences for spammers, but an emboldening effect of short jail sentences. The penalties under the CAN SPAM Act focus on fines more than prison terms. The results find no deterrent effect for fines, as spammers tend to earn a large income from sending spam. The Act might be revised to include prison sentences, especially longer ones to avoid the emboldening effect found. A deterrent impact was found for prosecutions, even though the CAN SPAM Act is under-enforced. Expanding enforcement might also be advisable.

E-mail has been considered as one of the most primary communication channels among the users with the rapid extension of internet. Unfortunately e-mail is also one of those tools, if not used properly could bring in irreparable... more

E-mail has been considered as one of the most primary communication channels among the users with the rapid extension of internet. Unfortunately e-mail is also one of those tools, if not used properly could bring in irreparable consequences. But, recently the increasing popularity and fewer cost of sending an email makes it very easy to send unsolicited messages blindly to thousands of people at no cost at all by using easily available bulk mailing software and large lists of e-mail addresses typically harvested, even purchased or rented from web pages and news group archives. The Anti-Spam SMTP Proxy (ASSP) mail server engine is preferred one of the best from all the existing Mail filters as it is a platform independent open source-filtering engine and its file size is 565.5KB, which much less compared to other mail filters.