A Comprehensive Survey for Intelligent Spam Email Detection

被引:92
作者
Karim, Asif [1 ]
Azam, Sami [1 ]
Shanmugam, Bharanidharan [1 ]
Kannoorpatti, Krishnan [1 ]
Alazab, Mamoun [1 ]
机构
[1] Charles Darwin Univ, Coll Engn IT & Environm, Casuarina, NT 0810, Australia
关键词
Machine learning; phishing attack; spear phishing; spam detection; spam email; spam filtering; NEGATIVE SELECTION ALGORITHM; E-MAIL; PHISHING DETECTION; CLASSIFICATION; ATTACKS;
D O I
10.1109/ACCESS.2019.2954791
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The tremendously growing problem of phishing e-mail, also known as spam including spear phishing or spam borne malware, has demanded a need for reliable intelligent anti-spam e-mail filters. This survey paper describes a focused literature survey of Artificial Intelligence (AI) and Machine Learning (ML) methods for intelligent spam email detection, which we believe can help in developing appropriate countermeasures. In this paper, we considered 4 parts in the email's structure that can be used for intelligent analysis: (A) Headers Provide Routing Information, contain mail transfer agents (MTA) that provide information like email and IP address of each sender and recipient of where the email originated and what stopovers, and final destination. (B) The SMTP Envelope, containing mail exchangers' identification, originating source and destination domains nusers. (C) First part of SMTP Data, containing information like from, to, date, subject - appearing in most email clients (D) Second part of SMTP Data, containing email body including text content, and attachment. Based on the number the relevance of an emerging intelligent method, papers representing each method were identified, read, and summarized. Insightful findings, challenges and research problems are disclosed in this paper. This comprehensive survey paves the way for future research endeavors addressing theoretical and empirical aspects related to intelligent spam email detection.
引用
收藏
页码:168261 / 168295
页数:35
相关论文
共 206 条
[1]  
Abdulhamid Shafi'i Muhammad, 2018, International Journal of Computer Network and Information Security, V10, P60, DOI 10.5815/ijcnis.2018.01.07
[2]  
Abu-Nimeh S., 2007, P ANTIPHISHING WORKI, P60, DOI DOI 10.1145/1299015.1299021
[3]   A hybrid firefly and support vector machine classifier for phishing email detection [J].
Adewumi, Oluyinka Aderemi ;
Akinyelu, Ayobami Andronicus .
KYBERNETES, 2016, 45 (06) :977-994
[4]  
Agrawal R., 1993, SIGMOD Record, V22, P207, DOI 10.1145/170036.170072
[5]   Analyzing CyberCrimes Strategies: The Case of Phishing Attack [J].
Al Halaseh, Rola ;
Alqatawna, Ja'far .
2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC), 2016, :82-88
[6]   Dynamic Event Detection Using a Distributed Feature Selection Based Machine Learning Approach in a Self-Healing Microgrid [J].
Al Karim, Miftah ;
Currie, Jonathan ;
Lie, Tek-Tjing .
IEEE TRANSACTIONS ON POWER SYSTEMS, 2018, 33 (05) :4706-4718
[7]   Malicious Spam Emails Developments and Authorship Attribution [J].
Alazab, Mamoun ;
Layton, Robert ;
Broadhurst, Roderic ;
Bouhours, Brigitte .
2013 FOURTH CYBERCRIME AND TRUSTWORTHY COMPUTING WORKSHOP (CTC 2013), 2014, :58-+
[8]   Profiling and classifying the behavior of malicious codes [J].
Alazab, Mamoun .
JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 100 :91-102
[9]   Text normalization and semantic indexing to enhance Instant Messaging and SMS spam filtering [J].
Almeida, Tiago A. ;
Silva, Tiago P. ;
Santos, Igor ;
Gomez Hidalgo, Jose M. .
KNOWLEDGE-BASED SYSTEMS, 2016, 108 :25-32
[10]   Clustering and classification of email contents [J].
Alsmadi, Izzat ;
Alhami, Ikdam .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2015, 27 (01) :46-57