Personalized Filtering of Polymorphic E-mail Spam

被引:1
作者
Takesue, Masaru [1 ]
机构
[1] Hosei Univ, Dept Appl Informat, Tokyo 1848584, Japan
来源
2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES | 2009年
关键词
D O I
10.1109/SECURWARE.2009.45
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Which of emails are spams depends on the recipient's interest, so it is desirable to filter spams based on his/her interest. We store the fingerprints (FPs) of k portions of each spam's content in our filter and examine tire metrics for detecting the polymorphic spams devised with intent to thwart the detection. For a smaller memory size of the filter we exploit two Bloom filters (in fact, merged into a single one to reduce cache miss) to replace the least recently matched spams by recently matched ones. We use as the metrics the number N(t), (<= k) of FPs in the filter matching with those of an incoming email, but also of the N(t) FPs, the greatest number N(d) of FPs stored for a single spam. We plot spams and legitimate emails in the N(d)-N(t), space and detect spams by a piecewise linear function. The experiments with about 4,000 real world emails show that our filter achieves the false negative rate of about 0.36 with no false positive.
引用
收藏
页码:249 / 254
页数:6
相关论文
共 18 条
[1]  
[Anonymous], 2007, RFC 4871
[2]  
[Anonymous], 2003, The next step in the spam control war: Greylisting
[3]  
[Anonymous], 2008, LOW COST ATTACK MICR
[4]  
Back A., 2002, HASHCASH A DENIAL SE
[5]  
BLOOM B, 1970, COMMUN ACM, V7, P422
[6]  
Broder A., 2004, INTERNET MATH, V1
[7]  
DENG F, 2006, ACM SIGMOD C
[8]  
HUNT R, 2006, P 14 INT C NETW ICON
[9]   E-mail authentication is here, but has it arrived yet? [J].
Lawton, G .
COMPUTER, 2005, 38 (11) :17-19
[10]  
LI F, 2006, 3 C EM ANT CEAS