Enhanced Email Spam Prevention through Sender Verification Dual Models

被引:0
|
作者
Limthanmaphon, Benchaphon [1 ]
Saraubon, Kobkiat [1 ]
机构
[1] King Mongkuts Univ Technol N Bangkok, Fac Sci Appl, Dept Comp & Informat Sci, Bangkok, Thailand
关键词
spam; spam filtering; anti-spam; spam behavior;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Spam mails distributed from botnets waste user time and consume resources such as space and network bandwidth. Many works have contribution in spam detection techniques. Mostly, these spam filtering and detection mechanisms are designed to protect the recipients. They do not stop spam spreading out actually. To block the spreading of spam. we design two modules to verify mail sender: Sender Verification (SV) Module and Sender Location Verification (SLV) Module. The first one runs on Mail Submission Agent. It verifies the sender account. The later one runs on Mail Transfer Agent. It verifies spam or ham by considering the sending country location. Since only the mail header is verified in both modules, our approach works well with both text-based spam and other kinds of image spam. Thus, these two separated modules are able to block the spam fast and effectively.
引用
收藏
页码:343 / 354
页数:12
相关论文
共 50 条
  • [1] Identity Based Email Sender Authentication for Spam Mitigation
    Hameed, Sufian
    Kloht, Tobias
    Fu, Xiaoming
    [J]. 2013 EIGHTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), 2013, : 14 - 19
  • [2] VeriActor: Dynamic Generation of Challenge-Response Questions for Enhanced Email Sender Verification
    Abdeen, Basel
    Al-Shaer, Ehab
    Shadid, Waseem
    [J]. 2023 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS, 2023,
  • [3] The Unintended Consequences of Email Spam Prevention
    Scheffler, Sarah
    Smith, Sean
    Gilad, Yossi
    Goldberg, Sharon
    [J]. PASSIVE AND ACTIVE MEASUREMENT, PAM 2018, 2018, 10771 : 158 - 169
  • [4] Polite sender: A resource-saving spam email countermeasure based on sender responsibilities and recipient justifications
    Vorakulpipat, Chalee
    Visoottiviseth, Vasaka
    Siwamogsatham, Siwaruk
    [J]. COMPUTERS & SECURITY, 2012, 31 (03) : 286 - 298
  • [5] Adversarial Email Generation against Spam Detection Models through Feature Perturbation
    Cheng, Qi
    Xu, Anyi
    Li, Xiangyang
    Ding, Leah
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON ASSURED AUTONOMY (ICAA 2022), 2022, : 83 - 92
  • [6] Detecting spam through their Sender Policy Framework records
    Sipahi, Devrim
    Dalkilic, Gokhan
    Ozcanhan, Mehmet Hilal
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3555 - 3563
  • [7] Hyperparameter Optimization of Ensemble Models for Spam Email Detection
    Omotehinwa, Temidayo Oluwatosin
    Oyewola, David Opeoluwa
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (03):
  • [8] Towards Discovering Covert Communication Through Email Spam
    Yang, Bo
    Jiang, Jianguo
    Li, Ning
    [J]. INTELLIGENT INFORMATION PROCESSING VIII, 2016, 486 : 191 - 201
  • [9] Methodologies for Email Spam Classification using Large Language Models
    De La Noval, Alejandro
    Gutierrez, Diana
    Soni, Jayesh
    Upadhyay, Himanshu
    Perez-Pons, Alexander
    Lagos, Leonel
    [J]. 2023 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE, CSCI 2023, 2023, : 179 - 185
  • [10] A comprehensive dual-layer architecture for phishing and spam email detection
    Doshi, Jay
    Parmar, Kunal
    Sanghavi, Raj
    Shekokar, Narendra
    [J]. COMPUTERS & SECURITY, 2023, 133