Can we CAN the email spam

Simi Kamini Bajaj, Josef Pieprzyk

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

4 Citations (Scopus)

Abstract

The purpose of email spam is to advertise to sell, phishing attacks, DDOS attacks and many more. Many solutions of various kinds such as blacklisting, whitelisting, grey-listing, content filtering have been proposed at the sender and receiver levels. There has been some level of success but the email spam still hits the inbox and more so the problem is false positives and false negatives. The current filtering solutions used are mostly a combination of few of the available techniques, the most common being a combination of listing and content filtering techniques. Apart from any attacks, email spam causes a great loss in resources and productivity of the user. Apart from this, this problem of false negatives exists as there is non-existence of filters to address user's preferences and behaviors, timing of the day and year. The filters at the mail servers are trained with spam and ham training data that is generic in nature. Hence, there is need to address this problem. This paper aims to address all of the above i.e. an email that hits a particular users inbox by escaping the mail server spam filtering solutions. To do this, this paper describes the problem of spam, followed by the filtering mechanisms, techniques, learning email filter model and then proposes a model to fine tune the filter to increase the efficiency.

Original languageEnglish
Title of host publication2013 Fourth Cybercrime and Trustworthy Computing Workshop (CTC 2013)
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages36-43
Number of pages8
ISBN (Electronic)9781479930760 , 9781479930753
ISBN (Print)9781479930777
DOIs
Publication statusPublished - 6 Mar 2014
EventCybercrime and Trustworthy Computing Workshop (4th : 2013) - Sydney, NSW, Australia
Duration: 21 Nov 201322 Nov 2013

Other

OtherCybercrime and Trustworthy Computing Workshop (4th : 2013)
Abbreviated titleCTC 2013
CountryAustralia
CitySydney, NSW
Period21/11/1322/11/13

Fingerprint

Dive into the research topics of 'Can we CAN the email spam'. Together they form a unique fingerprint.

Cite this