Trends, Issues and Challenges Concerning Spam Mails

Full Text (PDF, 630KB), PP.10-21

Views: 0 Downloads: 0

Author(s)

Jitendra Nath Shrivastava 1,* Maringanti Hima Bindu 2

1. Deptt. of Computer Science & Engineering, Invertis University, Bareilly, India & Research Scholar of Singhania University, Rajasthan, India

2. Deptt. of Information Technology, Jaypee Institute of Information Technology, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2012.08.02

Received: 24 Sep. 2011 / Revised: 3 Feb. 2012 / Accepted: 10 Apr. 2012 / Published: 8 Jul. 2012

Index Terms

Spam, Trojan horse, Botnet, ANN, HAM and Modem

Abstract

Traditional correspondence system has now been replaced by internet, which has now become indispensable in everyone’s life. With the advent of the internet, majority of people correspond through emails several times in a day. However, as internet has evolved, email is being exploited by spammers so as to disturb the recipients’. The entire internet community pays the price, every time there pops a spam mail. Online privacy of the users is compromised when spam disturbs a network by crashing mail servers and filling up hard disks. Servers classified as spam sites are forfeited from sending mails to the recipients’. This paper gives the broader view of spam, issues challenges and statistical losses occurred on account of spams.

Cite This Paper

Jitendra Nath Shrivastava, Maringanti Hima Bindu, "Trends, Issues and Challenges Concerning Spam Mails", International Journal of Information Technology and Computer Science(IJITCS), vol.4, no.8, pp.10-21, 2012. DOI:10.5815/ijitcs.2012.08.02

Reference

[1]Radicati S. Email Statistics Report, 2011-2015[R]. The Radicati Group, Inc. A Technology Market Research Firm, USA.

[2]Symantec’s MessageLabs Intelligence: 2010[R]. Annual Security Report.

[3]Zhang L, Zhu J and Yao T. An evaluation of statistical spam filtering techniques[J]. ACM Transactions on Asian Language Information Processing (TALIP), 2004, 3(4):243–269, 

[4]Cristiatnini N and Shawe-Taylor J. An introduction to Support Vector Machines and Other Kernel-Based Learning Methods[B]. Cambridge University Press, 2003. 

[5]Sahami M. Learning limited dependence Bayesian classifiers [C]. Second International Conference on Knowledge Discovery in Databases, 1996.

[6]Meyer T A. and Whateley B. Spambayes: Effective open-source, bayesian based, email classification system[C]. Proceedings of the First Conference on Email and Anti-Spam (CEAS), 2004. Available: http://www.ceas.cc/papers-2004/136.pdf

[7]Spamassassin available: http://spamassassin.org.

[8]Zhang L., Zhu J. and Yao T. An evaluation of statistical spam filtering techniques [J] ACM Transactions on Asian Language Information Processing (TALIP), 2004, 3(4):243–269.

[9]Musat C N. Layout Based Spam Filtering [C]. World Academy of Science, Engineering and Technology, 2005, 12, 371-374, 

[10]Glick, M. and Rumelhart D. Neuroscience and Connectionist Theory. The Development in Connectionist Theory[B]. Erlbaum Associates, Hilldsdale, NJ, 1989.

[11]Cortes C. and Vapnik V. Support vector networks [A]. Machine Learning, 1995, 20, 273-297.

[12]Burges C J C. A tutorial on support vector machines for pattern recognition[C].Data Mining and Knowledge Discovery, 1998 2(2):121–167.

[13]McCulloch W S. and Pitts W H. A logical calculus of the ideas immanent in nervous activity [J]. Bulletin of Mathematical Biophysics 5:115-133.

[14]Rosenblatt F. Principles of Neuro dynamics [B]. Spartan Books, Washington, 1958.

[15]David Reby, Sovan Lek, Ioannis Dimopoulos Jean Joachim, Jacques Lauga,Ste´phane Aulagnier Artificial neural networks as a classification method in the behavioural sciences[J]. Behavioral process (Elsevier), 1997, 40, 35–43.

[16]Holland J. Adaptation in Natural and Artificial Systems [B]. Ann Arbor: The University of Michigan Press, 1975.

[17]Shavlik J. Mooney R. and Towell G. Symbolic and neural learning algorithms: An experimental comparison [A]. Machine Learning 1991, 6:111–143. 

[18]Sahami M. A bayesian approach to filtering junk email [W]. Proceedings of AAAI-98 workshop on Learning for Text Categorization, Madison, Wisconsin, USA, 1998.

[19]Haykin S. Neural Networks: A comprehensive foundation [B]. Printice Hall, 1998.

[20]Steele R. Techniques for Specialized Search Engines[C]. In: Proc. Internet Computing 2001, Las Vegas. 

[21]Kolesnikov O., Lee W., and Lipton R. Filtering spam using search engines[R]. Technical Report GITCC-04-15, Georgia Tech, College of Computing, Georgia Institute of Technology, Atlanta, GA30332, 2004-2005.

[22]Katirai H. Filtering junk e-mail: A performance comparison between genetic programming and naive bayes [B]. Carnegie Mellon University, 1999.

[23]Koza J R. Hierarchical genetic algorithms operating on populations of computer programs[C]. In the Proceedings of the Eleventh International Joint Conference on Artificial Intelligence IJCAI-89, 1989, 1, 768–774.

[24]Koza J R. Genetic programming: A paradigm for genetically breeding populations of computer programs to solve problems[R]. Technical Report STAN-CS-90-1314, Dept. of Computer Science, Stanford University, June 1990.

[25]Koza J. Genetic Programming: On the Programming of Computers by Means of Natural-Selection [B]. MIT Press, MA, 1992

[26]Koza J R. Genetic Programming II: Automatic Discovery of Reusable Programs [B]. MIT Press, Cambridge, MA, 1994.

[27]Ahluwalia M. and Bull L. A Genetic Programming-based Classifier System[C]. Proceedings of the Genetic and Evolutionary Computation Conference, 1999, 1, 11-18, Orlando, Florida, USA.