Workload models of spam and legitimate e-mails
نویسندگان
چکیده
This article presents an extensive characterization of a spam-infected e-mail workload. The study aims at identifying and quantifying the characteristics that significantly distinguish spam from non-spam (i.e., legitimate) traffic, assessing the impact of spam on the aggregate traffic, providing data for creating synthetic workload models, and drawing insights into more effective spam detection techniques. Our analysis reveals significant differences in the spam and non-spam workloads. We conjecture that these differences are consequence of the inherently different mode of operation of the e-mail senders. Whereas legitimate e-mail transmissions are driven by social bilateral relationships, spam transmissions are a unilateral spammer-driven action. c © 2006 Elsevier B.V. All rights reserved.
منابع مشابه
Trends in Combating Image Spam E-mails
With the rapid adoption of Internet as an easy way to communicate, the amount of unsolicited e-mails, known as spam e-mails, has been growing rapidly. The major problem of spam e-mails is the loss of productivity and a drain on IT resources. Today, we receive spam more rapidly than the legitimate e-mails. Initially, spam e-mails contained only textual messages which were easily detected by the ...
متن کاملA Probabilistic Neural Network Based Classification of Spam Mails Using Particle Swarm Optimization Feature Selection
Email has gained the explosive growth in the communication of people across the world. This worldwide communication also has some disadvantages like Spam mails. The spammers spread the useless, unwanted mails and even malicious contents to the usersemails. This increasing number of spam mails increases the need for the spam detection architecture with the machine learning classification. The pr...
متن کاملAn Efficient Two-phase Spam Filtering Method Based on E-mails Categorization
The e-mail’s header session usually contains important attributes such as e-mail title, sender’s name, sender’s email address, sending date, which are helpful to classification of e-mails. In this paper, we apply decision tree data mining technique to header’s basic attributes to analyze the association rules of spam e-mails and propose an efficient spam filtering method to accurately identify ...
متن کاملAn E-mail Authentication and Disposable Addressing Scheme for Filtering Spam
The number of spam mails has spread rapidly in recent years. Currently, the most common spam filtering solutions include blacklisting and content filtering, as well as the Bayesian approach, which uses a Bayesian filter to analyze mail content to generate classifiers. However, spammers can forge their addresses or include additional information that will mislead the filtering system or mark leg...
متن کاملEffectiveness and Limitations of Statistical Spam Filters
Spam is not only clogging the Internet traffic by consuming a hefty amount of network bandwidth but it is also a source for e-mail born viruses, spyware, adware and Trojan Horses. It is also used to carry out denial of service, directory harvesting and phishing attacks that directly cause financial losses. Further, the contents of spam are often offensive and contain adult oriented and fraudule...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Perform. Eval.
دوره 64 شماره
صفحات -
تاریخ انتشار 2007