Spam Reduction by using E-mail History and Authentication (SREHA)

Full Text (PDF, 459KB), PP.17-22

Views: 0 Downloads: 0

Author(s)

Adwan Yasin 1,*

1. Faculty of Engineering and Information Technology Arab American University – Jenin, Palestine

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2016.07.03

Received: 10 Jan. 2016 / Revised: 25 Mar. 2016 / Accepted: 11 May 2016 / Published: 8 Jul. 2016

Index Terms

Authentication, Certification, Whitelist, Graylist, Blacklist, Spam, Ham

Abstract

Spam messages are today one of the most serious threats to users of E-mail messages. There are several ways to prevent and detect spam message, the most important way is filtering spam. Sometimes Filtering fails to discover some spam messages or even fails in the classification of non-spam messages as a spam messages. In this paper, we suggest a new effective method that reduces the spam messages by integrating prevention and detection techniques in one scheme. The reduction achieved by considering history and user authentication. This method based on issuing a certificate to each reliable user during the process of Email account Creation. The certificate used by Email servers to discard or forward ingoing or outgoing Emails. Each Server has to maintain white, gray and blacklist according to Email classification spam or ham, which determined by the user or by the contents examination of the message in terms of empty or contained only links without any text or by searching for a specific keywords in the subject and in the content. We believe that there are no bad or good E–mails forever, so the proposed model dynamically allows the transition of E-mail from one state to another state based on the number of received spam and ham messages.

Cite This Paper

Adwan F. Yasin, "Spam Reduction by using E-mail History and Authentication (SREHA)", International Journal of Computer Network and Information Security(IJCNIS), Vol.8, No.7, pp.17-22, 2016. DOI:10.5815/ijcnis.2016.07.03

Reference

[1]Toshihiro Tabata, “Spam Mail Filtering: commentary of Bayesian filter,” The journal of Information Science and Technology Association, Vol.56, No.10, pp.464-468, 2006.
[2]http://securelist.com/analysis/monthly-spam-reports/648 69/, spam-in-june-2014/
[3]UC Irvine Spam Statistics. (2013). http://www.oit.uci.edu/email/spam/stats/
[4]Guido Schryen. “Fighting Spam: Motivating an Account Based Proceedings of the IADIS International Conference WWW/Internet 2004, Madrid, Spain, 2 Volumes; 01/2004.
[5]http://en.wikipedia.org/wiki/Email_spam
[6]Bayesian filter. P. Graham, A Plan for Spam, http://paulgraham.com/better.html
[7]J.M.Gomez Hidalgo and M. Mana Lopez. Combining text and heuristics for cost-sensitive spam filtering. In Proceedings of the 4th Computational Natural Language Learning Workshop, pages 99-102, Lisbon, Portugal, 2000.
[8]Sahil Puri1, Dishant Gosain2, Mehak Ahuja3, Ishita Kathuria4, Nishtha Jatana5. “Comparison and Analysis of Spam Detection Algorithm”. 1,2,3, India. ISSN 2319 – 4847. Volume 2, Issue 4, April 2013.
[9]Nadeem A.S, Shuang H, Nick F, Alexander G. Gray, Sven K. “Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine”. College of Computing Tech. Georgia.
[10]Firte, L., Lemnaru, C. and Potolea, R. 2010. ―Spam Detection Filter Using KNN Algorithm and Resampling,‖ in Intelligent Computer Communication and Processing (ICCP), 2010 IEEE International Conference, pp. 27 – 33.
[11]Rasim M. A lgulie v, Ramiz M. Aliguliye v, a nd Saadat A. Na zirova. Classification of Textual E-mail Spam Using Data Mining Techniques. Applied Computational Intelligence and Soft Computing, vol. 2011, Article ID 416308, 8 pages.
[12]Antonia Kyriakopoulou and Theodore Kalamboukis, “Text Classification Using Clustering” in ECML-PKDD Discovery Challenge Workshop Proceedings. 2006.
[13]J. Jung and E. Sit, “An Empirical Study of Spam Traffic and the Use of DNS Black Lists”, in the proceeding of ACM IMC’ 04, Oct. 2004.
[14]Li, K., Pu, C. and Ahamad, M., “Resisting spam delivery by TCP damping,” Proceedings of the First Conference on Email and Anti-Spam, CEAS’2004.
[15]Saito, T., “Anti-spam system: Another way of preventing Spam,” Proceedings of the 16th International Workshop on Database and Expert Systems Applications, DEXA 2005, pp. 57–61, 2005.
[16]ZhangYing, YangXi, Liu Yanqiu “Improvement and Optimization of Spam Text Filtering System” 2nd International Conference on Computer Science and Network Technology, p 448-451, 2012 IEEE, China.
[17]Xin Liu, Zhaojun Xin, Leyi Shi, Yao Wang,” A Decentralized and Personalized Spam Filter Based on Social Computing” pp.887-894, Aug 2014, IEEE, Nicosia.