A review of spam email detection: analysis of spammer strategies and the dataset shift problem

被引:34
作者
Janez-Martino, Francisco [1 ,2 ]
Alaiz-Rodriguez, Rocio [1 ,2 ]
Gonzalez-Castro, Victor [1 ,2 ]
Fidalgo, Eduardo [1 ,2 ]
Alegre, Enrique [1 ,2 ]
机构
[1] Univ Leon, Dept Elect Syst & Automat, Leon, Spain
[2] INCIBE Spanish Natl Cybersecur Inst, Leon, Spain
关键词
Spam email detection; Dataset shift; Adversarial machine learning; Spammer strategies; Feature selection; CONCEPT DRIFT; FEATURE-SELECTION; CLASSIFICATION; PATTERNS;
D O I
10.1007/s10462-022-10195-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Spam emails have been traditionally seen as just annoying and unsolicited emails containing advertisements, but they increasingly include scams, malware or phishing. In order to ensure the security and integrity for the users, organisations and researchers aim to develop robust filters for spam email detection. Recently, most spam filters based on machine learning algorithms published in academic journals report very high performance, but users are still reporting a rising number of frauds and attacks via spam emails. Two main challenges can be found in this field: (a) it is a very dynamic environment prone to the dataset shift problem and (b) it suffers from the presence of an adversarial figure, i.e. the spammer. Unlike classical spam email reviews, this one is particularly focused on the problems that this constantly changing environment poses. Moreover, we analyse the different spammer strategies used for contaminating the emails, and we review the state-of-the-art techniques to develop filters based on machine learning. Finally, we empirically evaluate and present the consequences of ignoring the matter of dataset shift in this practical field. Experimental results show that this shift may lead to severe degradation in the estimated generalisation performance, with error rates reaching values up to 48.81%.
引用
收藏
页码:1145 / 1173
页数:29
相关论文
共 120 条
[11]   Efficient email classification approach based on semantic methods [J].
Bahgat, Eman M. ;
Rady, Sherine ;
Gad, Walaa ;
Moawad, Ibrahim F. .
AIN SHAMS ENGINEERING JOURNAL, 2018, 9 (04) :3259-3269
[12]  
BARRENO M., 2006, P 2006 ACM S INF COM, P16
[13]   Spam filtering using integrated distribution-based balancing approach and regularized deep neural networks [J].
Barushka, Aliaksandr ;
Hajek, Petr .
APPLIED INTELLIGENCE, 2018, 48 (10) :3538-3556
[14]   Ham and Spam E-Mails Classification Using Machine Learning Techniques [J].
Bassiouni, M. ;
Ali, M. ;
El-Dahshan, E. A. .
JOURNAL OF APPLIED SECURITY RESEARCH, 2018, 13 (03) :315-331
[15]  
Bergholz A., 2008, CEAS, P9
[16]  
Bhowmick A., 2018, Advances in Electronics, P583, DOI DOI 10.1007/978-981-10-4765-7_61
[17]  
Biggio, 2007, C CEAS 2007THE 4 C E, P6
[18]  
Biggio B., 2013, Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2013, Prague, Czech Republic, P387, DOI [10.1007/978-3-642-40994-3_25, DOI 10.1007/978-3-642-40994-3_25, 10.1007/978-3-642-40994-325]
[19]   Wild patterns: Ten years after the rise of adversarial machine learning [J].
Biggio, Battista ;
Roli, Fabio .
PATTERN RECOGNITION, 2018, 84 :317-331
[20]   A survey and experimental evaluation of image spam filtering techniques [J].
Biggio, Battista ;
Fumera, Giorgio ;
Pillai, Ignazio ;
Roli, Fabio .
PATTERN RECOGNITION LETTERS, 2011, 32 (10) :1436-1446