2013
DOI: 10.1016/j.jss.2013.07.036
|View full text |Cite
|
Sign up to set email alerts
|

Effective scheduling strategies for boosting performance on rule-based spam filtering frameworks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
30
0
1

Year Published

2015
2015
2017
2017

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(32 citation statements)
references
References 5 publications
1
30
0
1
Order By: Relevance
“…To take more advantage of the above mentioned advances (i.e. achieve the SFE conditions to stop a filter evaluation early and achieve an adequate parallelization of rules), some scheduling heuristics have been introduced [8,9,10].…”
Section: Throughput Optimizationmentioning
confidence: 99%
See 1 more Smart Citation
“…To take more advantage of the above mentioned advances (i.e. achieve the SFE conditions to stop a filter evaluation early and achieve an adequate parallelization of rules), some scheduling heuristics have been introduced [8,9,10].…”
Section: Throughput Optimizationmentioning
confidence: 99%
“…In this context, and given the extensive utilization and increasing significance of rule-based filtering frameworks for the anti-spam domain, several studies have addressed the optimization of parameters (rule scores and scheduling plan) to improve their accuracy [4,5,6,7] and classification throughput [8,9,10]. However, previous works on throughput optimization are based on simple heuristics without taking into account its relation to accuracy.…”
Section: Introductionmentioning
confidence: 99%
“…During this process, all the rules comprising the WSF2 filter are loaded into the ruleset data structure represented in Figure 1(b) and sorted by a rule-scheduling algorithm. This rule planning module is implemented into the prescheduler t data type and, as outlined in Ruano-Ordás and colleagues [34], it is responsible for elaborating an optional arrangement of the execution of the filtering rules in order to improve WSF2 classification throughput. Moreover, with the aim of reducing the filtering time, all available parsers, spam filtering techniques, and event-handlers are loaded into memory within this stage.…”
Section: Main Designmentioning
confidence: 99%
“…Step 7: Algorithm stores the newly classified pattern in its local cache for future use It has been adopted by international companies (such as Symantec or McAfee) and small and medium enterprises (SMEs) [11]. Anti-spam RBS are combination of a decision threshold value plus a set of scored rules (See Fig.…”
Section: Pattern Detectionmentioning
confidence: 99%
“…After examining all rules, a message is classified as spam if its global counter value is greater than or equal to the configured threshold. Both (i) scored rules and (ii) the filter threshold are commonly stored in regular text files in order to facilitate their exchange between computers [11].…”
Section: Pattern Detectionmentioning
confidence: 99%