42 research outputs found
Evaluation of Email Spam Detection Techniques
Email has become a vital form of communication among individuals and organizations in today’s world. However, simultaneously it became a threat to many users in the form of spam emails which are also referred as junk/unsolicited emails. Most of the spam emails received by the users are in the form of commercial advertising, which usually carry computer viruses without any notifications. Today, 95% of the email messages across the world are believed to be spam, therefore it is essential to develop spam detection techniques. There are different techniques to detect and filter the spam emails, but off recently all the developed techniques are being implemented successfully to minimize the threats. This paper describes how the current spam email detection approaches are determining and evaluating the problems. There are different types of techniques developed based on Reputation, Origin, Words, Multimedia, Textual, Community, Rules, Hybrid, Machine learning, Fingerprint, Social networks, Protocols, Traffic analysis, OCR techniques, Low-level features, and many other techniques. All these filtering techniques are developed to detect and evaluate spam emails. Along with classification of the email messages into spam or ham, this paper also demonstrates the effectiveness and accuracy of the spam detection techniques
A protection method against massive error mails caused by sender spoofed spam mails
Wide spread of spam mails is one of the most serious problems on e-mail environment. Particularly, spam mails with a spoofed sender address should not be left alone, since they make the mail server corresponding to the spoofed address be overloaded with massive error mails generated by the spam mails, and since they waste a lot of network and computer resources. In this paper, we propose a protection method of the mail server against such massive error mails. This method introduces an additional mail server that mainly deals with the error mails in order to reduce the load of the original mail server. This method also provide a function that refuses error mails to these two mail servers to save the network and computer resources
Controle de SPAM baseado em pré-detecção da vulnerabilidade de Mail Relay
Este artigo descreve as atividades desenvolvidas junto ao CERT-RS / POP-RS no tratamento de ocorrências de SPAM. Como metodologia de ação, buscou-se criar um sistema de pré-detecção de hosts vulneráveis a mail relay que são os maiores amplificadores de SPAM por toda a Internet. Relatamse aqui as experiências e resultados obtidos ao longo de um ano de utilização deste sistema
A security analysis of email communications
The objective of this report is to analyse the security and privacy risks of email communications and identify
technical countermeasures capable of mitigating them effectively. In order to do so, the report analyses from a
technical point of view the core set of communication protocols and standards that support email
communications in order to identify and understand the existing security and privacy vulnerabilities. On the basis
of this analysis, the report identifies and analyses technical countermeasures, in the form of newer standards,
protocols and tools, aimed at ensuring a better protection of the security and privacy of email communications.
The practical implementation of each countermeasure is evaluated in order to understand its limitations and
identify potential technical and organisational constrains that could limit its effectiveness in practice. The outcome
of the above mentioned analysis is a set of recommendations regarding technical and organisational measures that
when combined properly have the potential of more effectively mitigating the privacy and security risks of today's
email communications.JRC.G.6-Digital Citizen Securit
Inferencia gramatical para la detección de spam
El spam representa un problema de mala utilización de recursos técnicos y una molestia para los usuarios de correo electrónico. Tomando este problema como aplicación práctica, se pretende mostrar, con su justificación teórica, decisiones de diseño de un posible sistema inteligente destinado a controlarlo. El trabajo que se describe está actualmente en curso en el marco de un proyecto de investigación de la Universidad Nacional del Comahue.Eje: Inteligencia Computacional - MetaheurÃsticasRed de Universidades con Carreras en Informática (RedUNCI