2010 Fourth International Conference on Emerging Security Information, Systems and Technologies 2010
DOI: 10.1109/securware.2010.34
|View full text |Cite
|
Sign up to set email alerts
|

Cascaded Simple Filters for Accurate and Lightweight Email-Spam Detection

Abstract: Accurate spam filters, such as the Bayesian filter, need a large cost for off-line training (or learning) based on the analysis of a large corpus of email. This paper presents cascaded simple, i.e., rule-based, filters for accurate and lightweight detection of email spam. We cascade three filters that classify email based on respectively the fingerprints of message bodies, the white and black lists of email addresses in the From header, and the words specific to spam and legitimate email in the Subject header.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Therefore, even if the full-blown level I implementation has a false negative rate FN1, and the weak level II implementation only FN2, the overall false rate is improved as FN1*FN2. Indeed, improving false negative rates with lightweight cascaded classifiers found its way into practical implementations with e-mail spam filters more than a decade ago [16].…”
Section: A Architectural Approachmentioning
confidence: 99%
“…Therefore, even if the full-blown level I implementation has a false negative rate FN1, and the weak level II implementation only FN2, the overall false rate is improved as FN1*FN2. Indeed, improving false negative rates with lightweight cascaded classifiers found its way into practical implementations with e-mail spam filters more than a decade ago [16].…”
Section: A Architectural Approachmentioning
confidence: 99%
“…Email Signatures; Trojans can spoof sender's address to reflect well known organisations such as banks, power companies and post office. A signature based on these known malicious trends can be created along with a blocking rule on an IDS to prevent users from receiving such emails [111], [112]. Although this strategy can be easily bypassed by adversaries, it is still effective in the absence of adversaries' knowledge of being shunned.…”
Section: Host Based Detectionmentioning
confidence: 99%
“…As Trojans are mostly delivered though unsolicited emails (referred to as spam) [125], analysis of these emails can lead to establishment of a pattern or a detection matrix . Filters can be set to scan for specific fingerprints from subject headers, message bodies, white and even black lists email addresses [111], [112].…”
Section: Analysis Of Spam Records;mentioning
confidence: 99%