Academia.eduAcademia.edu

Outline

Anti-Spam Software for Detecting Information Attacks

2012, International Journal of Intelligent Systems and Applications

https://doi.org/10.5815/IJISA.2012.10.03

Abstract

In this paper the develop ment of anti-spam software detecting information attacks is offered. For this purpose it is considered spam filtrat ion system with the multilayered, mu ltivalent architecture, coordinating all ISP's in the country. All users and ISPs of this system involved in spam filtration p rocess. After spam filtering process, saved spam templates are analyzed and classified. This parameterizing of spam temp lates give possibility to define the thematic dependence from geographical. For example, what subjects prevail in spam messages sent from the certain countries? Analyzing origins of spam temp lates fro m spam-base, it is possible to define and solve the organized social networks of spammers. Thus, the offered system will be capable to reveal purposeful in formation attacks if those occur.

References (36)

  1. A. Taranov, O. Slepov, Email security, http://www.next mail.ru/hist/security.phtml?t=2 (in russian)
  2. Wikipedia, Spam. http://en.wikipedia.org/wiki/ Spam_email
  3. McAfee Threats Report: Fourth Quarter 2011, http://www.mcafee.co m/us/resources/reports/rp- quarterly-threat-q4-2011.pdf
  4. J. P. Denning, ACM president's letter: electronic junk. Co mmunications of the A CM, Vo l. 25, No. 3, March 1982, pp. 163-165.
  5. M. Sahami, Learn ing limited dependence Bayesian classifiers. Proceedings of the second International conference on knowledge d iscovery and Data mining, Menlo Park, CA, 1996, pp. 334-338.
  6. M. Sahami, S. Du mais, D. Heckerman, et al., A Bayesian approach to filtering junk email. AAAI Workshop on Learning for Text Categorization, 1998, AAAI Technical Report WS-98-05.
  7. J. R. Hall, How to avoid unwanted email. Co mmunicat ions of the ACM, Vo l. 41, no.3, March 1998, pp. 88-95.
  8. E. Gabber, M. Jakobsson, Y. Matias, et al., Curbing junk e-mail via secure classification. Proceedings of the second International conference on financial cryptography, March 23-25, 1998, pp. 198-213.
  9. L.M . Sp racklin, L.V. Saxton, Filtering spam using Kolmogorov co mplexity estimates .
  10. International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), Vol. 1, 2007, pp.321-328. (in russian)
  11. P. Bold i, M. Santini, S. Vigna, PageRan k as a function of the damping factor. Proceedings of the 14th International conference on World Wide Web, May 10-14, 2005, pp. 557-566.
  12. J. Go rdillo, E. Conde, An HMM for detecting spam mail. Expert systems with applications, Vol. 33, no. 3, October 2007, pp. 667-682.
  13. I. Santos, C. Laorden, B. San z, et al., Enhanced Topic-based Vector Space Model for semantics - aware spam filtering. Expert Systems with applications, no.39 (2012), 2012, pp. 437-444.
  14. C. H. Li, J. X. Huang, Spam filtering using semantic similarity approach and adaptive BPNN . Neurocomputing, no. 92 (2012), 2012, pp. 88-97.
  15. J. C. Go mez, M .-F. Moens, PCA docu ment reconstruction for e mail classification.
  16. Co mputational Statistics and Data Analysis, no. 56 (2012), 2012, pp. 741-751.
  17. A. A. Tiago, A. Yamakami, Facing the spammers: A very effect ive approach to avoid junk e -mails. Expert Systems with Applications, no. 39 (2012), 2012, pp. 6557-6561.
  18. C. Laorden, I. Santos, B. San z, et al., Word sense disambiguation for spam filtering. Electronic Co mmerce Research and Applications, December 2011, pp. 1-3.
  19. F. Salcedo-Campos, J. Dнaz-Verdejo, P. Garcнa - Teodoro, Segmental parameterization and statistical modeling of e-mail headers for spam detection. Information Sciences, no. 195(2012), 2012, pp. 45-61.
  20. N. Perez-Diaz, D. Ruano-Ordos, F. Fdez-Rivero la, et al., SDAI: An integral evaluation methodology for content-based spam filtering models . Expert Systems with Applications, 2012, pp. 1-14.
  21. Universal Declarat ion of human rights, Article 19 http://www.un.org/en/documents/udhr/index.shtml #a19
  22. P. A. Baranov, Review of anti-spam and E- mail viruses. Co mputer Systems, no.1, 2004, pp. 44-50. (in russian)
  23. B.Y. Sirkov, "Killers" and "consumers" or the fight against spam. Technology and Co mmunicat ions, no. 4, 2004, pp. 102-105. (in russian)
  24. R. Anderson , Get rid of spam. Net works and communicat ion systems, no. 11(117), 2004, pp. 94-104 (in russian)
  25. L. Pelletie r, J. Almhana, V. Choulakian, Adaptiv Filtering of SPAM. Proceedings of the Second Annual Conference on Co mmun ication Networks and Services Research. IEEE, 2004. pp. 530-537.
  26. R. M. Alguliyev, S. H. Nazirova, Multilayer and Multiagent Automated E-mail Filtrat ion System. Teleco mmunications and Rad ioengeneering, Vol.67, no.12, Begell House, 2008, pp. 1089-1095.
  27. R.M. Alguliyev, R.M. Aliguliyev, Classificat ion of Textual E-Mail Spam Using Data Mining Techniques. Applied Co mputational Intelligence and Soft Co mputing Vol. 2011, Art icle ID 416308, 8 pg.
  28. C. James, H. Ray, Tightening the net: A review of current and next generation spam filtering tools . Computers and security, no. 25, 2006, pp. 566-578.
  29. H. Wen-Feng, Ch. Te-M in, An incremental cluster-based approach to spam filtering. Expert Systems with applications, no. 34, 2008, pp. 1599- 1608.
  30. M. L. Sang, S. K. Dong, S. P. Jong, Spam Detection Using Feature Selection and Parameters Optimization. IEEE International Conference on Co mplex Intelligent and So ftware Intensive Systems, 2010, pp. 883-888.
  31. F. S. Mehrnoush, B. Hamid, Spam detection using dynamic weighted voting based on clustering. Second International Symposium on Intelligent Information Technology Application IEEE, no. 2, 2008, pp. 122-126
  32. S. M inoru, Sh. Hiroyuki, Spam detection using text clustering. IEEE Proceedings of the 2005 International Conference on Cyberwords, 2005, pp. 316-319.
  33. C. Pau lo, L. Clotilde, S. Pedro, et al., Sy mb iotic Data Min ing for Personalized Spam Filtering. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2009, pp. 149-156.
  34. Kh. Ah med, An Overview o f Content-Based Spam Filtering Techniques. Informatica, no. 31, 2007, pp. 269-277.
  35. S. Nazirova, Mechanism of classification of text spam messages collected in spam pattern bases . PCI 2010 Th ird International Conference on Problems of Cybernetics and Informat ics, N2, 2010, pp. 206-209.
  36. R. M. A lguliyev, S. H. Nazirova, Mechanism of formation and realisation of anti-spam policy. Teleco mmunications, Moscow, Vo l. 12, 2009, pp. 6-1. (in Russian)