2008 4th International Conference on Wireless Communications, Networking and Mobile Computing 2008
DOI: 10.1109/wicom.2008.1139
|View full text |Cite
|
Sign up to set email alerts
|

A Spam Discrimination Based on Mail Header Feature and SVM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…Wang et al [16] also proposed the similar spam classification technique by using features of the sender and receiver address (To, CC, BCC), mail user agent and message-ID to train the system. Similar research by Hu et al [17], Wu et al [14], Ye et al [15] and Sheu [13] also classified spam email by using different features information such as the size of an email, time, length of sender-destination field, sender IP or email subject and others with machine learning.…”
Section: Related Researchmentioning
confidence: 83%
“…Wang et al [16] also proposed the similar spam classification technique by using features of the sender and receiver address (To, CC, BCC), mail user agent and message-ID to train the system. Similar research by Hu et al [17], Wu et al [14], Ye et al [15] and Sheu [13] also classified spam email by using different features information such as the size of an email, time, length of sender-destination field, sender IP or email subject and others with machine learning.…”
Section: Related Researchmentioning
confidence: 83%
“…Ye et al [16] offered a statistical analysis of junk and legitimate email header session messages, as well as the feasibility of using these messages to conduct spam filtering. The content present in 10024 emails of trash in the mail system was obtained from the database of spam archives and statistically analyzed.…”
Section: Related Workmentioning
confidence: 99%
“…The convolutional neural network (CNN) architecture was developed to solve the problems of the classic cost-related artificial neural network (ANN), time, number of parameters, and selected features. The most important benefits of the CNN model are: extracting the most relevant features, minimizing the number of parameters [18], training massive data, and decreasing the computation in the network [16]. The CNN model has achieved high performance in a several fields, such as image recognition.…”
Section: The Cnn Model For Image Datamentioning
confidence: 99%
“…There are four commonly used techniques for spam classification namely, a) Use of blacklist [14] b) Protocol-based approach c) Use of keywords or content filtering d) Header based [20], [28], [21], [5], [36], [13] In the first case, a list of email the network administrator maintains addresses or domain name databases. The classifier matches new record with blacklisted database and simply rejects some mails and puts them onto the spam folder.…”
Section: Literature Reviewmentioning
confidence: 99%
“…There have been various attempts to classify the spam email based on using email header [20], [21], [5], [36], [37], [38], [13], [4], using email body [3], [41], [35], [29], [27], [30], [7], [31], [32], [33], [34] and also using both body and header [18], [23], [21], [15], [42] and statistical features [19], [25]. The email header classification is performed using techniques such as Naïve Bayes (NB), Decision Tree (DT) [40] [43], and Support Vector Machine (SVM) [23], [24], [20], [13], [26] Random Forest (RF) [4], [13]. When these techniques were adopted by the researchers using various features and datasets, Random Forest showed better performance than the other techniques.…”
Section: Literature Reviewmentioning
confidence: 99%