342 research outputs found

    On the use of Locality for Improving SVM-Based Spam Filtering

    Get PDF
    Recent growths in the use of email for communication and the corresponding growths in the volume of email received have made automatic processing of emails desirable. In tandem is the prevailing problem of Advance Fee fraud E-mails that pervades inboxes globally. These genres of e-mails solicit for financial transactions and funds transfers from unsuspecting users. Most modern mail-reading software packages provide some forms of programmable automatic filtering, typically in the form of sets of rules that file or otherwise dispose mails based on keywords detected in the headers or message body. Unfortunately programming these filters is an arcane and sometimes inefficient process. An adaptive mail system which can learn its users’ mail sorting preferences would therefore be more desirable. Premised on the work of Blanzieri & Bryl (2007), we proposes a framework dedicated to the phenomenon of locality in email data analysis of advance fee fraud e-mails which engages Support Vector Machines (SVM) classifier for building local decision rules into the classification process of the spam filter design for this genre of e-mails

    Identifying spam e-mail messages using an intelligence algorithm

    Get PDF
    During the past few years, there have been growing interests in using email for delivering various types of messages such as social, financial, etc. There are also people who use email messages to promote products and services or even to do criminal activities called Spam email. These unwanted messages are sent to different target population for different purposes and there is a growing interest to develop methods to filter such email messages. This paper presents a method to filter Spam email messages based on the keyword pattern. In this article, a multi-agent filter trade based on the Bayes rule, which has benefit of using the users’ interest, keywords and investigation the message content according to its topic, has been used. Then Nested Neural Network has been used to detect the spam messages. To check the authenticity of this proposed method, we test it for a couple of email messages, so that it could determine spams and hams from each other, effectively. The result shows the superiority of this method over the previous ones including filters with Multi-Layer Perceptron that detect spams

    Stability and Effective Process Control for Secure Email Filtering

    Get PDF
    A fantastic tool for both commercial and personal communication is electronic mail. It has increasingly become a necessary component of our working life since it is straightforward, available, and simple to use. Spam emails have started to tarnish internet experiences and threaten the integrity of email. Due to the exponential growth of spam, both people and organisations are under a great deal of financial and other strain. In order to prevent the future of email itself from being in jeopardy, a solution to the spam problem must be discovered. There is an urgent need to solve the Email spam issue since spam volume has been rising over the last several decades. As part of this effort, many effects of spam emails on businesses and people were noted and thoroughly examined. In order to properly assess current technologies, solutions, and methods, a comprehensive literature review was conducted throughout the procedures. The goals of this work is to develop new methodologies for the implementation of new strategies for the efficient management of email spam and to construct a proof-of-concept software system for the Process controlled assessment of such strategies

    Hybrid Models Of Fuzzy Artmap And Qlearning For Pattern Classification

    Get PDF
    Pengelasan corak adalah salah satu isu utama dalam pelbagai tugas pencarian data. Dalam kajian ini, fokus penyelidikan tertumpu kepada reka bentuk dan pembinaan model hibrid yang menggabungkan rangkaian neural Teori Resonan Adaptif (ART) terselia dan model Pembelajaran Pengukuhan (RL) untuk pengelasan corak. Secara khususnya, rangkaian ARTMAP Kabur (FAM) dan Pembelajaran-Q dijadikan sebagai tulang belakang dalam merekabentuk dan membina model-model hibrid. Satu model QFAM baharu terlebih dahulu diperkenalkan bagi menambahbaik prestasi pengelasan rangkaian FAM. Strategi pruning dimasukkan bagi mengurangkan kekompleksan QFAM. Bagi mengatasi isu ketidak-telusan, Algoritma Genetik (GA) digunakan bagi mengekstrak hukum kabur if-then daripada QFAM. Model yang terhasil iaitu QFAM-GA, dapat memberi ramalan berserta dengan huraian dengan hanya menggunakan bilangan antisiden yang sedikit. Bagi menambahkan lagi kebolehtahanan model-model Q-FAM, penggunaan sistem agenpelbagai telah dicadangkan. Hasilnya, model gugusan QFAM berasaskan agen dengan ukuran percaya dan kaedah rundingan baharu telah dicadangkan. Pelbagai jenis masalah tanda-aras telah digunakan bagi penilaian model-model gugusan dan individu berasaskan QFAM. Hasilnya telah dianalisa dan dibandingkan dengan FAM serta model-model yang dilaporkan dalam kajian terdahulu. Sebagai tambahan, dua daripada masalah dunia-nyata digunakan bagi menunjukkan kebolehan praktikal model hibrid. Keputusan akhir menunjukkan keberkesanan modul berasaskan QFAM dalam menerajui tugas-tugas pengelasan corak. ________________________________________________________________________________________________________________________ Pattern classification is one of the primary issues in various data mining tasks. In this study, the main research focus is on the design and development of hybrid models, combining the supervised Adaptive Resonance Theory (ART) neural network and Reinforcement Learning (RL) models for pattern classification. Specifically, the Fuzzy ARTMAP (FAM) network and Q-learning are adopted as the backbone for designing and developing the hybrid models. A new QFAM model is first introduced to improve the classification performance of FAM network. A pruning strategy is incorporated to reduce the complexity of QFAM. To overcome the opaqueness issue, a Genetic Algorithm (GA) is used to extract fuzzy if-then rules from QFAM. The resulting model, i.e. QFAM-GA, is able to provide predictions with explanations using only a few antecedents. To further improve the robustness of QFAM-based models, the notion of multi agent systems is employed. As a result, an agent-based QFAM ensemble model with a new trust measurement and negotiation method is proposed. A variety of benchmark problems are used for evaluation of individual and ensemble QFAM-based models. The results are analyzed and compared with those from FAM as well as other models reported in the literature. In addition, two real-world problems are used to demonstrate the practicality of the hybrid models. The outcomes indicate the effectiveness of QFAM-based models in tackling pattern classification tasks

    Co-producing neighbourhood resilience

    Get PDF

    An approach to preventing spam using Access Codes with a combination of anti-spam mechanisms

    Get PDF
    Spam is becoming a more and more severe problem for individuals, networks, organisations and businesses. The losses caused by spam are billions of dollars every year. Research shows that spam contributes more than 80% of e-mails with an increased in its growth rate every year. Spam is not limited to emails; it has started affecting other technologies like VoIP, cellular and traditional telephony, and instant messaging services. None of the approaches (including legislative, collaborative, social awareness and technological) separately or in combination with other approaches, can prevent sufficient of the spam to be deemed a solution to the spam problem. The severity of the spam problem and the limitations of the state-of-the-Art solutions create a strong need for an efficient anti-spam mechanism that can prevent significant volumes of spam without showing any false positives. This can be achieved by an efficient anti-spam mechanism such as the proposed anti-spam mechanism known as "Spam Prevention using Access Codes", SPAC. SPAC targets spam from two angles i.e. to prevent/block spam and to discourage spammers by making the infrastructure environment very unpleasant for them. In addition to the idea of Access Codes, SPAC combines the ideas behind some of the key current technological anti-spam measures to increase effectiveness. The difference in this work is that SPAC uses those ideas effectively and combines them in a unique way which enables SPAC to acquire the good features of a number of technological anti-spam approaches without showing any of the drawbacks of these approaches. Sybil attacks, Dictionary attacks and address spoofing have no impact on the performance of SPAC. In fact SPAC functions in a similar way (i.e. as for unknown persons) for these sorts of attacks. An application known as the "SPAC application" has been developed to test the performance of the SPAC mechanism. The results obtained from various tests on the SPAC application show that SPAC has a clear edge over the existing anti-spam technological approaches

    From Social Data Mining to Forecasting Socio-Economic Crisis

    Full text link
    Socio-economic data mining has a great potential in terms of gaining a better understanding of problems that our economy and society are facing, such as financial instability, shortages of resources, or conflicts. Without large-scale data mining, progress in these areas seems hard or impossible. Therefore, a suitable, distributed data mining infrastructure and research centers should be built in Europe. It also appears appropriate to build a network of Crisis Observatories. They can be imagined as laboratories devoted to the gathering and processing of enormous volumes of data on both natural systems such as the Earth and its ecosystem, as well as on human techno-socio-economic systems, so as to gain early warnings of impending events. Reality mining provides the chance to adapt more quickly and more accurately to changing situations. Further opportunities arise by individually customized services, which however should be provided in a privacy-respecting way. This requires the development of novel ICT (such as a self- organizing Web), but most likely new legal regulations and suitable institutions as well. As long as such regulations are lacking on a world-wide scale, it is in the public interest that scientists explore what can be done with the huge data available. Big data do have the potential to change or even threaten democratic societies. The same applies to sudden and large-scale failures of ICT systems. Therefore, dealing with data must be done with a large degree of responsibility and care. Self-interests of individuals, companies or institutions have limits, where the public interest is affected, and public interest is not a sufficient justification to violate human rights of individuals. Privacy is a high good, as confidentiality is, and damaging it would have serious side effects for society.Comment: 65 pages, 1 figure, Visioneer White Paper, see http://www.visioneer.ethz.c

    Filter mediated design : generating coherence in (collaborative) design

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Architecture, 1999.Includes bibliographical references (leaves 67-69).Architectural design involves the integration of diverse, sometimes conflicting, concepts and requirements into a coherent single composition. This paper proposes a method for negotiating architectural design across domains, by examining issues of ontology, perception, generation and evaluation, and detailing a prototype in which these mechanisms are augmented using computational agents for achieving coherence and innovation in remote collaborative design. The paper proposes a common geometric and topological database, from which multiple semantic models are constructed. Filter Mediated Design is intended to explore the processes and strategies of constructing intelligent designs and design intelligence.by John R. Haymaker.S.M

    The Internet vs. the Nation-State: Prevention and Prosecution Challenges on the Internet in Republic of TürkiyI

    Get PDF
    Social, economic, and technological developments are widely accepted as powerful forces that affect the role, power, and functions of nation-states. Being one of the most influential technological developments in the recent decades, the internet has come into prominence in this regard. With the use of the Internet, the monopoly of media and information controlled by official ideologies, capitalist barons, or elites is seriously challenged. Consequently the power balance between individuals and authorities in the mass media and communication has been transformed in a significant way. Though their reliability may sometimes be questionable, the number and type of information resources has increased dramatically, and accessing information has become easier substantially. People are more interconnected today than ever before. They can easily find, join, or construct their personal, social or political networks. With a number of internet applications and social media, collective reactions, social movements and activities are more organized and effective today than ever before. That is why we have seen so much social fluctuation, unrest. protest, and political activism all over the world in the last few years. Moreover new terms and phenomena like cyber-crime, cyber warfare, and cyber-attacks have urged nation-states to be more careful about the internet and increase their efforts to control it. This level of social chaos in different states and increasing cyber-crimes lead us to question the effectiveness of nation-states\u27 controlling measures. Focusing on one state, the Republic of Türkiye, this study analyzes two important dimensions of state control efforts, prevention and prosecution. On the prevention side, I explore the effectiveness of internet access blocking. On the prosecution side, I analyze the effectiveness of prosecution in internet child pornography. The result of testing to measure the effectiveness of Internet website blocking reveals that there are significant gaps, complications, and dilemmas in these policies. A similar situation is also seen in the investigations of internet child pornography. Analysis conducted of the operational investigation files reveals that in most of the files, suspects could not be identified, traced or brought before judicial authorities. As seen in these two fields, state policing efforts of the Internet in a country are not absolute, and the Internet can be a vulnerable space in which any local or foreign actor or agents like criminals, opposition groups, terrorists can create problems for nation-states
    corecore