Spam Filtering Techniques Arnold Perez Joseph Tilley.

Slides:



Advertisements
Similar presentations
1 Eloqua Providing Industry-Leading Management Tools May 2009.
Advertisements

Eloqua Providing Industry-Leading Management Tools.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
Bayesian Theorem & Spam Filtering
What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
Early Detection of Outgoing Spammers in Large-Scale Service Provider Networks Yehonatan Cohen Daniel Gordon Danny Hendler Ben-Gurion University Yehonatan.
----Presented by Di Xu  Introduction  Overview of Spam  Solutions to Spam  Conclusion.
Presented by: Alex Misstear Spam Filtering An Artificial Intelligence Showcase.
6/1/2015 Spam Filtering - Muthiyalu Jothir 1 Spam Filtering Computer Security Seminar N.Muthiyalu Jothir – Media Informatics.
IMF Mihály Andó IT-IS 6 November Mihály Andó 2 / 11 6 November 2006 What is IMF? ­ Intelligent Message Filter ­ provides server-side message filtering,
LENS LEveraging anti-social Networking against Spam (Introduction) MSc. Sufian Hameed Dr. Pan Hui Prof. Xiaoming Fu.
Preventing Spam: Today and Tomorrow Zane Bonny Vilaphong Phasiname The Spamsters!
© Franz Kurfess Project Topics 1 Topics for Master’s Projects and Theses -- Winter Franz J. Kurfess Computer Science Department Cal Poly.
1 SIMS 290-2: Applied Natural Language Processing Marti Hearst October 18, 2004.
How does computer know what is spam and what is ham?
1 Authors: Anirudh Ramachandran, Nick Feamster, and Santosh Vempala Publication: ACM Conference on Computer and Communications Security 2007 Presenter:
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
Spam Reduction Techniques Using greylisting and SpamAssassin.
TrustPort Net Gateway traffic protection. Keep It Secure Entry point protection –Clear separation of the risky internet and secured.
An Effective Defense Against Spam Laundering Paper by: Mengjun Xie, Heng Yin, Haining Wang Presented at:CCS'06 Presentation by: Devendra Salvi.
Team Excel What is SPAM ?. Spam Offense Team Excel '‘a distinctive chopped pork shoulder and ham mixture'' Image Source:Appscout.com.
Filtron: A Learning-Based Anti-Spam Filter Eirinaios Michelakis Ion Androutsopoulos
Visit for Marketing and Deliverability Tips, Tools, & Trainingwww. Delivered.com.
Countering Spam Using Classification Techniques Steve Webb Data Mining Guest Lecture February 21, 2008.
Anti Phishing & Spam -- by lynn. Spam Anti Spam and How White-lists Black-lists Heuristics –Bayes –Neural Networks Static technique –keyword checking.
How to Get Permission and Avoid Being Spam Jill Bastian Training and Education Manager.
Reporter: Li, Fong Ruei National Taiwan University of Science and Technology 9/19/2015Slide 1 (of 32)
Fraud Detection with Data Mining IN COLLABORATION WITH “IDEAMART( DIALOG AXIATA PLC)” Roshanth Gardiarachchi (Dialog) Sampath Deegalla UoP Mohammed Fawsan.
Module 6 Planning and Deploying Messaging Security.
Using Traffic Shaping to Combat Spam David Cawley, Senior Engineer December 12th, 2007.
Microsoft Word 2010 Lesson 10 Brandy Frazier – Southern Nash High School – Nash County.
Jhih-sin Jheng 2009/09/01 Machine Learning and Bioinformatics Laboratory.
SCAVENGER: A JUNK MAIL CLASSIFICATION PROGRAM Rohan Malkhare Committee : Dr. Eugene Fink Dr. Dewey Rundus Dr. Alan Hevner.
Management Function Controlling Dr. John Abraham Professor UTPA.
How different are the beliefs of children and adults?
Adapting Statistical Filtering David Kohlbrenner IT.com TJHSST.
Classification Techniques: Bayesian Classification
Defense Against the Dark Arts Defense Against The Dark Arts Eric Peterson Research Manager McAfee 24 – 26 February, 2015.
1 A Study of Supervised Spam Detection Applied to Eight Months of Personal E- Mail Gordon Cormack and Thomas Lynam Presented by Hui Fang.
Project Presentation B 王 立 B 陳俊甫 B 張又仁 B 李佳穎.
C August 24, 2004 Page 1 SMS Spam Control Nobuyuki Uchida QUALCOMM Incorporated Notice ©2004 QUALCOMM Incorporated. All rights reserved.
Deliverability Making it to the inbox
Silicon & Software Systems (S3)‏ Copyright © Silicon & Software Systems Limited Antispam protection IT Department 20/03/2008 Ondrej Valousek.
Filtering and Recommendation INST 734 Module 9 Doug Oard.
Detecting Phishing in s Srikanth Palla Ram Dantu University of North Texas, Denton.
1 Spam – a living thing Predicting future evolution based on the past Daniel Raduta.
1 Fighting Against Spam. 2 How might we analyze ? Identify different parts – Reply blocks, signature blocks Integrate with workflow tasks Build.
Leveraging Delivery for Spam Mitigation.
Machine Learning for Spam Filtering 1 Sai Koushik Haddunoori.
I SPCon 2003 – Evaluating Spam Control SolutionsBrandendenburg.com / 1 Points of Control UA = User Agent MTA = Message Transfer Agent o =originator.
A COMPARISON OF ANN, NAÏVE BAYES, AND DECISION TREE FOR THE PURPOSE OF SPAM FILTERING KAASHYAPEE JHA ECE/CS
Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.
ARMA Boston Spring Seminar 2011 Jesse Wilkins, CRM.
Spam Wrangling on UC Berkeley's CalMail. Spam detection CalMail uses Sophos PureMessage, running on CommuniGate Pro's front-end servers PureMessage.
[1] Control Spam by the Use of Greylisting Torgny Hallenmark LDC - Computing Center Lund University, Sweden TERENA Networking.
An Effective Defense Against Spam Laundering Author: Mengjun Xie, Heng Yin, Haining Wang Presented At: CCS’ 06 Prepared By: Amit Shrivastava.
ORGANIZING . 1.Sort messages quickly. 2.Group similar messages in folders or labels. 3.Route mail efficiently to specific folders or labels. 4.Reduce.
Anti-Spam Managing Spam with Kerio Connect
Exploiting Machine Learning to Subvert Your Spam Filter
Web Statistics Statistics collected from
BOTNET JUDO : Fighting Spam with Itself
Lesson 6.5 Percents of Increase and Decrease
iSRD Spam Review Detection with Imbalanced Data Distributions
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Please send any images as a separate file
Project Presentation B 王 立 B 陳俊甫 B 張又仁
Spam control Old emphasis: detect spam
Management Function Controlling
Presentation transcript:

Spam Filtering Techniques Arnold Perez Joseph Tilley

Spam Filters CRM114 – The Controllable Regex Mutilator Bayesian Filter – improvements over Pantel and Lin Case Based Approach to Spam Filtering that Can Track Concept Drift

Spam Filter Traits Text Classification Use text classification to identify spam Concept Drift Leverage case based filtering to avoid concept drift Headers Investigate data in headers

Other Spam Filtering Techniques Blacklists List of sender information that will identify an as spam Greylists Hold messages from a sender that is not recognized

Goals Evaluate different Spam Filtering Techniques Create Spam Filter that borrows from different strengths from other Spam Filters Decrease number of false positives.

Testing Test our filter against a set of text files that represent s. Compare our results with statistical data of existing spam filters. Provide record statistics at milestones Addition of text classification Addition of Bayesian improvements Addition of cased based filtering

Project Deliverables Create Spam Filter that combines text classification, case based filtering, and improved Bayesian filter Comparisons of our filter to existing statistical data. Conclusions, lessons learned and possible future work.