Detection Approaches for Categorization of Spam and Legitimate E-Mail

Author(s):  
Rachnana Dubey ◽  
Jay Prakash Maurya ◽  
R. S. Thakur

The internet has become very popular, and the concept of electronic mail has made it easy and cheap to communicate with many people. But, many undesired mails are also received by users and the higher percentage of these e-mails is termed spam. The goal of spam classification is to distinguish between spam and legitimate e-mail messages. But, with the popularization of the internet, it is challenging to develop spam filters that can effectively eliminate the increasing volumes of unwanted e-mails automatically before they enter a user's mailbox. The main objective of this chapter is to examine and identify the best detection approach for spam categorization. Different types of algorithms and data mining models are proposed, implemented, and evaluated on data sets. For improvement of spam filtering technique, the authors analyze the methods of feature selection and give recommendations of their use. The chapter concludes that the data mining models using a combination of supervised learning algorithms provide better results than single data models.

Author(s):  
Edwin I. Achugbue

The chapter focuses on the history of the internet system of e-mail; e-mail security; threat to e-mail security, usefulness of e-mail address and country codes, how e-mails can be secured by the individual and electronic mail policy. The future of e-mail security is also described.


2011 ◽  
pp. 2159-2163 ◽  
Author(s):  
Simpson Poon

The use of the Internet for business purposes among small businesses started quite early in the e-commerce evolution. In the beginning, innovative and entrepreneurial owners of small businesses attempted to use rudimentary Internet tools such as electronic mail (e-mail) and file transfer protocol (FTP) to exchange messages and documents. While primitive, it fulfilled much of the business needs at the time. Even to date, e-mail and document exchange, according to some of the latest research findings, are still the most commonly used tools despite the fact that tools themselves have become more sophisticated.


2011 ◽  
Vol 271-273 ◽  
pp. 1082-1085 ◽  
Author(s):  
Gan Miao Zhou

This document explains and demonstrates the basics of how email is work on the Internet. By analyzing the working process of e-mail, it try and describe some tips that can help reduce the number of emails you send out that get blocked by spam filters.


Author(s):  
Milica Stojmenovic

This article studies social networks on the Internet created by popular applications such as e-mails, Web, chat, file sharing via peer-to-peer interaction, and online gaming. The Internet has its roots in military and academia. Connections are available around the world at academic institutions, military installations, government agencies, commercial enterprises, commercial information providers (AOL, CompuServe, and MSN), and Internet service providers. The Internet offers the following services: sending and receiving e-mail (electronic mail), transferring files between computers, participating in discussion groups through newsgroups and mailing lists, searching and retrieving information, chat, Internet relay chat, instant messaging, Internet telephony (voice chat), and on-line shopping. Newsgroups contain databases of messages on topics. They are similar to mailing lists, except that e-mail messages are posted to newsgroup sites. Bulletin boards and discussion groups offer similar services. People “surf the net” to find information and download files and connect directly to other computers. Web pages are used to communicate with customers and suppliers, describe organizations and products, tender documents, and provide services (banking, stocks, and software).


Author(s):  
Patrice Braun

To date, most research into the implications of the Internet for SMEs has focused on individual business barriers to ICT and e-commerce adoption. Such research has shown that SMEs tend to be time- and resource-poor, with their size being their main disadvantage vis-à-vis ICT adoption (OECD, 2000; Van Beveren & Thompson, 2002). Perhaps the question is not whether small firms have adopted ICT, but rather where are small firms in terms of their ICT adoption. ICT encompasses a series of separate yet interrelated components; for example, electronic mail (e-mail), the Internet, the Web, and e-commerce, which can be adopted in a variety of social and business settings. Hence, it is suggested that ICT cannot be considered as a single technological innovation but rather as a series of (process) innovations, potentially resulting in variable ICT adoption patterns (Walczuch, Van Braven, & Lundgren, 2000).


Author(s):  
Simpson Poon

The use of the Internet for business purposes among small businesses started quite early in the e-commerce evolution. In the beginning, innovative and entrepreneurial owners of small businesses attempted to use rudimentary Internet tools such as electronic mail (e-mail) and file transfer protocol (FTP) to exchange messages and documents. While primitive, it fulfilled much of the business needs at the time. Even to date, e-mail and document exchange, according to some of the latest research findings, are still the most commonly used tools despite the fact that tools themselves have become more sophisticated.


Author(s):  
Stephanie Austria

 Spoofing is one of the newest forms of cyber-attack, a technological methodology adapted to mask the identity of spammers who have faced hostile reaction in response to bulk, unsolicited, electronic mail messages.[1] Sending Spam, however, is no longer the only reason for deception, as crackers have taken pleasure in the challenge of manipulating computer systems and, additionally, find recreational enjoyment in doing so. In this legal Note, the author’s intent is to show that criminal, rather than civil liability is the best way to effectively deter and punish the spoofer. The injury that results when a computer system’s technological safety measures fail to adequately safeguard the system affects not only the owner of the hijacked e-mail address, but also the Internet Service Provider, and the Network as a whole. Current Anti-Spam Legislation is arguably ineffective at targeting these particular types of malicious attacks, and a different legal approach is suggested.


Electronic mail (e-mail) is one of the most prevalent approaches for online communication and transferring data through web because of its quick and easy distribution of data, low distribution cost and permanency. Despite these benefits there are certain weaknesses of e-mail. Among these, spam also known as junk e-mail tops. Spam is set of unwanted or inappropriate messages sent over the internet to a massive amount of users for the purpose of marketing, phishing, disseminating malware, etc.With the internet becoming the dominant platform anti-spam solutions are of great use today. This paper illustrates an efficient hybrid spam filtration method using Naïve Bayes algorithm and Markov Random Field technique, which detects and filters spam messages. The proposed method is evaluated based on its accurateness, meticulousness and time consumption. The results confirm that the proposed hybrid method achieves high percentage of true positive rate in finding e-mail spam messages.


2004 ◽  
Vol 66 (2) ◽  
Author(s):  
Matthew E. Shames

And in the beginning, there was e-mail! At least, that may be the perception of the millions of people who use electronic mail (“e-mail”) every day. In fact, the pervasiveness of the Internet in general, and the World Wide Web and e-mail in particular, has made it difficult for many people to remember the world before these technologies changed the face of communications forever. But it was only a decade ago that e-mail was a novelty outside of academic and scientific settings, the Web was not yet viable as a commercial mechanism, and the promise and exuberance surrounding the developing technologies masked the dangers of the road that would lie ahead.


Author(s):  
Dianne Willis

Electronic mail is the most frequently used application of the Internet. IDC research in 2002 suggested that the daily output of e-mails will reach 35 billion by 2005.


Sign in / Sign up

Export Citation Format

Share Document