Personalized E-mail Filtering System Based on Usage Control

In order to cope with the problem of spam soaring, a personalized e-mail filtering method based on UCON is proposed. E-mails from different senders were classified as junk e-mail, suspicious e-mail and normal e-mail by trust third-party according to the maintained blacklist and embedded machine learning technology online. Suspicious e-mails will be classified further from users’ point of view manually. Then the incoming e-mails would be sifted and processed differently according to their classification.  Experiments results illustrate the method of the paper not only provide a personalization filtering but also more accurate and effective than the popular statistical spam filtering system.

[1]  Xu Zhou,et al.  A LVQ-based neural network anti-spam email approach , 2005, OPSR.

[2]  Gao Qian The invasion and defense of spam , 2008 .

[3]  Ernesto Damiani,et al.  P2P-based collaborative spam detection and filtering , 2004 .

[4]  R.F. Erbacher,et al.  An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.

[5]  Jaehong Park,et al.  The UCONABC usage control model , 2004, TSEC.

[6]  Virgílio A. F. Almeida,et al.  Characterizing a spam traffic , 2004, IMC '04.

[7]  Wenqing Zhao,et al.  An Email Classification Scheme Based on Decision-Theoretic Rough Set Theory and Analysis of Email Security , 2005, TENCON 2005 - 2005 IEEE Region 10 Conference.

[8]  Emil Sit,et al.  An empirical study of spam traffic and the use of DNS black lists , 2004, IMC '04.

[9]  Chih-Chien Wang,et al.  Using header session messages to anti-spamming , 2007, Comput. Secur..

[10]  Jalal Almhana,et al.  Adaptive filtering of spam , 2004, Proceedings. Second Annual Conference on Communication Networks and Services Research, 2004..

[11]  Chia-Mei Chen,et al.  An Alliance-Based Anti-spam Approach , 2007, Third International Conference on Natural Computation (ICNC 2007).

[12]  Zhanting Yuan,et al.  Application of Refined LSA and MD5 Algorithms in Spam Filtering , 2009, J. Comput..

[13]  Otávio Augusto S. Carpinteiro,et al.  A Neural Model in Anti-spam Systems , 2006, ICANN.

[14]  Li Wei,et al.  Spam Filtering by Stages , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[15]  H. Labiod,et al.  A Prior Distribution for Anti-spam Statistical Bayesian Model , 2009, 2009 International Conference on Network and Service Security.

[16]  Kartik Gopalan,et al.  DMTP: Controlling spam through message delivery differentiation , 2006, Comput. Networks.

[17]  Biju Issac,et al.  Improved Bayesian Anti-Spam Filter Implementation and Analysis on Independent Spam Corpuses , 2009, 2009 International Conference on Computer Engineering and Technology.

[18]  Lu Xianliang,et al.  A LVQ-based neural network anti-spam email approach , 2005 .

[19]  Barry Leiba,et al.  DomainKeys Identified Mail (DKIM): Using Digital Signatures for Domain Verification , 2007, CEAS.

[20]  Stefan Savage,et al.  Slicing Spam with Occam's Razor , 2007, CEAS.

[21]  Jaehong Park,et al.  Formal model and policy specification of usage control , 2005, TSEC.

[22]  Zhen-fang Zhu,et al.  Research on E-mail Filtering Based On Improved Bayesian , 2009, J. Comput..