A neural network classifier for junk e-mail

被引:0
|
作者
Stuart, I [1 ]
Cha, SH [1 ]
Tappert, C [1 ]
机构
[1] Pace Univ, Comp Sci Dept, New York, NY 10570 USA
来源
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Most e-mail readers spend a non-trivial amount of time regularly deleting junk e-mail (spam) messages, even as an expanding volume of such e-mail occupies server storage space and consumes network bandwidth. An ongoing challenge, therefore, rests within the development and refinement of automatic classifiers that can distinguish legitimate e-mail from spam. A few published studies have examined spam detectors using Naive Bayesian approaches and large feature sets of binary attributes that determine the existence of common keywords in spam, and many commercial applications also use Naive Bayesian techniques. Spammers recognize these attempts to thwart their messages and have developed tactics to circumvent these filters, but these evasive tactics are themselves patterns that human readers can often identify quickly. Therefore, in contrast to earlier approaches, our feature set uses descriptive characteristics of words and messages similar to those that a human reader would use to identify spam. This preliminary study tests this alternative approach using a neural network (NN) classifier on a corpus of e-mail messages from one user. The results of this study are compared to previous spain detectors that have used Nave Bayesian classifiers. Also, it appears that commercial spam detectors are now beginning to use descriptive features as proposed here.
引用
收藏
页码:442 / 450
页数:9
相关论文
共 50 条
  • [41] E-mail
    Zoller, WF
    JOURNAL OF THE AMERICAN DENTAL ASSOCIATION, 1996, 127 (11): : 1576 - 1576
  • [42] (e-mail:)
    Xia, Weidai
    Zhou, Dongming
    Cao, Jinde
    Liu, Yanyu
    Hou, Ruichao
    NEUROCOMPUTING, 2022, 493 : 327 - 339
  • [43] Effects of e-mail availability on the informal network
    Zaremba, Alan
    International Journal of Technology Management, 11 (1-2):
  • [44] Assessing e-mail intent and tasks in e-mail messages
    Sappelli, M.
    Pasi, G.
    Verberne, S.
    de Boer, M.
    Kraaij, W.
    INFORMATION SCIENCES, 2016, 358 : 1 - 17
  • [45] The inner life of e-mail (Why use e-mail)
    Stevick, Philip
    SALMAGUNDI-A QUARTERLY OF THE HUMANITIES AND SOCIAL SCIENCES, 2007, (153-54): : 3 - 18
  • [46] E-Mail as Legacy: Managing and Preserving E-Mail as a Collection
    Dinneen, Jesse David
    Krtalic, Maja
    PORTAL-LIBRARIES AND THE ACADEMY, 2020, 20 (03) : 413 - 424
  • [47] Registered e-mail (REM) — Reliable e-mail for everybody
    Franco Ruggieri
    Datenschutz und Datensicherheit - DuD, 2010, 34 (5) : 314 - 317
  • [48] Spam: The plague of junk E-mail (Reprinted from the Editorial Eye, November 1997)
    Ivey, KC
    IEEE COMPUTER APPLICATIONS IN POWER, 1998, 11 (02): : 15 - 16
  • [49] On effective E-mail classification via neural networks
    Cui, B
    Mondal, A
    Shen, JL
    Cong, G
    Tan, KL
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2005, 3588 : 85 - 94
  • [50] Spam e-mail: How Malaysian e-mail users deal with it?
    Bujang, Yanti Rosmunie
    Hussin, Husnayati
    World Academy of Science, Engineering and Technology, 2010, 43 : 1007 - 1013