Open Access
Efficient Modelling and Analysis on the Propagation Dynamics of Email Malware Filtering for Sustainable IT Development
et. al. D.R.Thirupurasundari
- Vol. 12, Iss: 11, pp 4346-4354
TLDR
In this paper, the authors used Bloom filter to analyze the network traffic to identify the same email from a known IP address to various routes and identify disruptions on the network, and classified the email data into spam and harm mails.Abstract:
Email system is one of the most effective and commonly used sources of Communication. Unfortunately, the Email system is getting threatened by spam emails. Email spam, also known as junk”email or unsolicited bulk email (UBE),”is a category of electronic spam which includes almost identical messages sent by email to multiple recipients. In existing system highly parallel encoding technique was used to detect the spam campaigns. Privacy preserving collaborative spam detection is used at the Receiver side. In the proposed system the modern spam filtering techniques are deployed at Sender Side. To increase the internet bandwidth and storage of the mail server to deploy WorldNet and Spambot. In this paper to use bro Intrusion detection to analyze the network traffic. It counts the number and regularity of the same”email”sent from a known IP address to various routes, and identifies disruptions on the network. Because of the large number of emails reported in the SMTP sessions, we efficiently monitor and process them in the Bloom filters. The process of spam filtering classified the email data into spam and harm mails.read more
References
More filters
Proceedings ArticleDOI
Adversarial classification
TL;DR: This paper views classification as a game between the classifier and the adversary, and produces a classifier that is optimal given the adversary's optimal strategy, and experiments show that this approach can greatly outperform a classifiers learned in the standard way.
Journal ArticleDOI
Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware
TL;DR: GuardOL is a combined approach using processor and field-programmable gate array (FPGA) to perform online malware detection and aims to capture the malicious behavior (i.e., high-level semantics) of malware.
Proceedings Article
Observed Trends in Spam Construction Techniques: A Case Study of Spam Evolution.
Calton Pu,Steve Webb +1 more
TL;DR: 1. INTRODUCTION OQ &> * , e $ 'N8"H , " 0 7 N (FNi = _N 8" $ N8N $>$ N, Q $ _ (] e( 0 H .
Proceedings ArticleDOI
Definition of spam 2.0: New spamming boom
Pedram Hayati,Vidyasagar Potdar,Alex Talevski,Nazanin Firoozeh,Saeed Sarenche,Elham Afsari Yeganeh +5 more
TL;DR: The aim of this paper is to provide the reader with a complete understanding of this new form of spamming and to discuss new difficulties associated with Spam 2.0.
Journal ArticleDOI
Precise and Fast Cryptanalysis for Bloom Filter Based Privacy-Preserving Record Linkage
TL;DR: This work presents a novel efficient attack which exploits how attribute values are encoded into Bloom filters and is significantly faster than earlier PPRL cryptanalysis attacks, and in the experimental evaluation, is able to successfully re-identify attribute values from large real-world databases in a few minutes.