Trusted Behavior Based Spam Filtering

Various approaches are presented to solve the spreading spam problem. However, most of these approaches can not flexibly and dynamically adapt to spam. This paper proposes a novel approach to counter spam based on trusted behavior recognition during transfer sessions. A behavior recognition of email transfer patterns which enables normal servers to detect malicious connections before email body delivered, contributes much to save network bandwidth wasted by spam emails. An integrated Anti-Spam framework is designed combining the trusted behavior recognition with Bayesian Analysis. The effectiveness of both the trusted Behavior recognition and the integrated filter are evaluated.

[1]  Grigorios Tsoumakas,et al.  E-mail Mining: Emerging Techniques for E-Mail Management , 2006 .

[2]  Xuan Zhang,et al.  Spam Behavior Recognition Based on Session Layer Data Mining , 2006, FSKD.

[3]  Catherine Rosenberg,et al.  Behavioral authentication of server flows , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..

[4]  Minh Tran,et al.  FreeBSD server anti-spam software using automated TCP connection control , 2004 .

[5]  Salvatore J. Stolfo,et al.  EMT/MET: systems for modeling and detecting errant email , 2003, Proceedings DARPA Information Survivability Conference and Exposition.

[6]  Grigorios Tsoumakas,et al.  Email Mining: Emerging Techniques for Email Management , 2006 .

[7]  Li Ren,et al.  Bayesian Chinese Spam Filter Based on Crossed N-gram , 2006, Sixth International Conference on Intelligent Systems Design and Applications.

[8]  Michaël Rusinowitch,et al.  Protocol analysis in intrusion detection using decision tree , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[9]  Christopher Lueg Spam and Anti-Spam Measures: A Look at Potential Impacts , 2003 .

[10]  Nitin Kumar,et al.  Controlling spam Emails at the routers , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.

[11]  金田 重郎,et al.  C4.5: Programs for Machine Learning (書評) , 1995 .

[12]  Aiko M. Hormann,et al.  Programs for Machine Learning. Part I , 1962, Inf. Control..

[13]  Susan T. Dumais,et al.  A Bayesian Approach to Filtering Junk E-Mail , 1998, AAAI 1998.

[14]  Chen Ming,et al.  Flow-based anti-spam , 2004, 2004 IEEE International Workshop on IP Operations and Management.

[15]  J. Srivastava,et al.  Analyzing Network Traffic to Detect E-Mail Spamming Machines , 2004 .