Behavioral Experiments in Email Filter Evasion

نویسندگان

  • Liyiming Ke
  • Bo Li
  • Yevgeniy Vorobeychik
چکیده

Despite decades of effort to combat spam, unwanted and even malicious emails, such as phish which aim to deceive recipients into disclosing sensitive information, still routinely find their way into one’s mailbox. To be sure, email filters manage to stop a large fraction of spam emails from ever reaching users, but spammers and phishers have mastered the art of filter evasion, or manipulating the content of email messages to avoid being filtered. We present a unique behavioral experiment designed to study email filter evasion. Our experiment is framed in somewhat broader terms: given the widespread use of machine learning methods for distinguishing spam and non-spam, we investigate how human subjects manipulate a spam template to evade a classification-based filter. We find that adding a small amount of noise to a filter significantly reduces the ability of subjects to evade it, observing that noise does not merely have a short-term impact, but also degrades evasion performance in the longer term. Moreover, we find that greater coverage of an email template by the classifier (filter) features significantly increases the difficulty of evading it. This observation suggests that aggressive feature reduction—a common practice in applied machine learning—can actually facilitate evasion. In addition to the descriptive analysis of behavior, we develop a synthetic model of human evasion behavior which closely matches observed behavior and effectively replicates experimental findings in simulation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Estimating Shadow Economy and Tax Evasion by Considering the Variables of Government Financial Discipline and Behavioral Factors in Iran’s Economy

L ow tax incomes and the large size of the government in Iran lead into budget deficit, which increases the inflation rate. It also causes economic instability and fluctuations in inflation, leading to tax non-compliance and the transfer of people to the informal economy. Therefore, considering the variables of financial discipline and behavioral factors, this research examines the e...

متن کامل

A Voice Spam Filter to Clean Subscribers' Mailbox

With the growing popularity of VoIP and its large customer base, the incentives of telemarketers for voice spam has been increasing in the recent years. If the threat of voice spam remains unchecked, it could become a problem as serious as email spam today. Compared to email spam, voice spam will be much more obnoxious and time consuming nuisance for telephone subscribers to filter out. In this...

متن کامل

Tax Evasion in Oil-Exporting Countries: The Case of Iran

N umerous studies have been conducted about the determinants of tax evasion. In all of these studies, this phenomenon has been taken into account in the framework of balanced budget and a non-oil economy. In this study the determinants are examined by extending an endogenous growth model and considering two cases for the government budget in an oil-exporting country along with its budget d...

متن کامل

The Desirable Tax Compliance Model in Iran: Combined Model

In dealing with tax evasion phenomenon and developing tax sanctions generally, two preventive and behaviorism approaches can be mentioned. The inhibitory approach believes that by increasing the likelihood of discovering tax evasion and the severity of tax sanctions, tax evasions can be reduced.  On the contrary, the behaviorism approach believes that the increase in tax compliance among the ta...

متن کامل

Model-Based Covert Timing Channels: Automated Modeling and Evasion

The exploration of advanced covert timing channel design is important to understand and defend against covert timing channels. In this paper, we introduce a new class of covert timing channels, called model-based covert timing channels, which exploit the statistical properties of legitimate network traffic to evade detection in an effective manner. We design and implement an automated framework...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016