2010 eCrime Researchers Summit 2010
DOI: 10.1109/ecrime.2010.5706696
|View full text |Cite
|
Sign up to set email alerts
|

Feature selection for Spam and Phishing detection

Abstract: Unsolicited Bulk Email (UBE) has become a large problem in recent years. The number of mass mailers in existence is increasing dramatically. Automatically detecting UBE has become a vital area of current research. Many email clients (such as Outlook and Thunderbird) already have junk filters built in. Mass mailers are continually evolving and overcoming some of the junk filters. This means that the need for research in the area is ongoing. Many existing techniques seem to randomly choose the features that will… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
68
0
1

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 88 publications
(73 citation statements)
references
References 9 publications
2
68
0
1
Order By: Relevance
“…We used 4 phishing dataset files as presented in Table 3. These phishing datasets have been used in phishing detection research including work by [3], [4], [5], [6], [9], [10], [12], and [16]. In order to provide non-phishing datasets, we used the SpamAssassin Project [17] from the easy ham directory.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…We used 4 phishing dataset files as presented in Table 3. These phishing datasets have been used in phishing detection research including work by [3], [4], [5], [6], [9], [10], [12], and [16]. In order to provide non-phishing datasets, we used the SpamAssassin Project [17] from the easy ham directory.…”
Section: Methodsmentioning
confidence: 99%
“…If not, we set the value 1 to indicate the email is abnormal. This feature has been proposed by [5].…”
Section: Feature Defines In Emailmentioning
confidence: 99%
See 2 more Smart Citations
“…Despite good anti-techniques such as content-based [5][6][7] and behavior-based [8][9][10][11] ones, the attacks are still a serious problem because phishes continually change their ways to defeat the anti-phishing techniques. Also, most existing emails filtering approaches are static easy to defeat by modifying emails content and link strings.…”
Section: Introductionmentioning
confidence: 99%