Rathod et al., 2015 - Google Patents
Content based spam detection in email using Bayesian classifierRathod et al., 2015
View PDF- Document ID
- 14248619261075983431
- Author
- Rathod S
- Pattewar T
- Publication year
- Publication venue
- 2015 International Conference on Communications and Signal Processing (ICCSP)
External Links
Snippet
Internet provides Emails as means of data communication. Email messaging is an essential contribution. Hacking attacks, phishing attacks and malicious attack are frequently undergo email services to attempt fraud and deception motivation. They use emails to obtain …
- 238000001514 detection method 0 title abstract description 10
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/585—Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/107—Computer aided management of electronic mail
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rathod et al. | Content based spam detection in email using Bayesian classifier | |
Cormack | Email spam filtering: A systematic review | |
US8489689B1 (en) | Apparatus and method for obfuscation detection within a spam filtering model | |
US8112484B1 (en) | Apparatus and method for auxiliary classification for generating features for a spam filtering model | |
Almomani et al. | A survey of phishing email filtering techniques | |
Subramaniam et al. | Overview of textual anti-spam filtering techniques | |
CN110134876B (en) | Network space population event sensing and detecting method based on crowd sensing sensor | |
Rathod et al. | A comparative performance evaluation of content based spam and malicious URL detection in E-mail | |
Sharma et al. | E-Mail Spam Detection Using SVM and RBF. | |
Ruskanda | Study on the effect of preprocessing methods for spam email detection | |
Rawal et al. | Phishing detection in e-mails using machine learning | |
Taylor et al. | A model to detect spam email using support vector classifier and random forest classifier | |
Iyengar et al. | Integrated spam detection for multilingual emails | |
Mallampati et al. | A machine learning based email spam classification framework model: related challenges and issues | |
Hunt et al. | Current and new developments in spam filtering | |
Alshahrani | Intelligent security schema for SMS spam message based on machine learning algorithms | |
Kågström | Improving naive bayesian spam filtering | |
Santos et al. | Spam filtering through anomaly detection | |
Hershkop et al. | Identifying spam without peeking at the contents | |
Giorgi et al. | Email Spoofing Attack Detection through an End to End Authorship Attribution System. | |
Sasikala et al. | Performance evaluation of Spam and Non-Spam E-mail detection using Machine Learning algorithms | |
Geerthik et al. | Filtering spam: Current trends and techniques | |
Panwar et al. | Detection of spam email | |
Tham et al. | Phishing message detection based on keyword matching | |
Prasad et al. | Classification of E-mail Spam with Supervised Machine Learning-Naïve Bayesian Classification |