2019
DOI: 10.1109/access.2019.2954791
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Survey for Intelligent Spam Email Detection

Abstract: The tremendously growing problem of phishing e-mail, also known as spam including spear phishing or spam borne malware, has demanded a need for reliable intelligent anti-spam e-mail filters. This survey paper describes a focused literature survey of Artificial Intelligence (AI) and Machine Learning (ML) methods for intelligent spam email detection, which we believe can help in developing appropriate countermeasures. In this paper, we considered 4 parts in the email's structure that can be used for intelligent … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
58
0
7

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 142 publications
(65 citation statements)
references
References 158 publications
(210 reference statements)
0
58
0
7
Order By: Relevance
“…Several research papers in the field of malware detection have been published over the past few years [18][19][20][21][22]. Initial research studies focused on permission-based detection, signature-based detection, system call-based detection, and sensitive API-based detection.…”
Section: Related Workmentioning
confidence: 99%
“…Several research papers in the field of malware detection have been published over the past few years [18][19][20][21][22]. Initial research studies focused on permission-based detection, signature-based detection, system call-based detection, and sensitive API-based detection.…”
Section: Related Workmentioning
confidence: 99%
“…The Decision Tree algorithm, which has only 2 numClasses, is one of the most powerful and well-known predictive instruments [77]. Every interior node in the structure of a Decision Tree refers to testing a property, every branch corresponds to a test outcome, and each leaf node is a separate class [78] [94].…”
Section: ) Decision Treementioning
confidence: 99%
“…In this framework, access control scheme and patient-centric personal data with enhanced encrypted satisfaction method needs to be considered. Additionally, hash-based digital signatures [79] and pseudo-identity need to be used to identify the privacy of personal data [80]. Moreover, it addresses the enhanced privacy model of additional authorization and authentication of functionality and discovers the novel strategies that need be deployed to gradually develop the efficiency on privacy and user in the e-healthcare system.…”
Section: Enhanced E-health Framework For Privacy In the Healthcare Symentioning
confidence: 99%
“…However, recent happenings show that the industry is far from immune; such as in 2019, where it was detected by the researchers at Kaspersky Lab that a sophisticated cybercrime operation was already in motion to destructively affect at least 130 manufacturing, industrial, and engineering firms across the globe. Named "Operation Ghoul", it used email phishing techniques [79] to spoof letters from banks to make unsuspecting recipients reply them with highly sensitive corporate information [96]. Email phishing is one of the most common ways of carrying out spam attacks on senders, and is achieved through manipulating different email header and body fields [79].…”
Section: Security Threats and Privacy Requirements For Soa-based Iot mentioning
confidence: 99%
See 1 more Smart Citation