期刊文献+

基于行为的垃圾邮件检测技术 被引量:5

Behavior-based Junk Mail Detection
下载PDF
导出
摘要 电子邮件作为一种重要的信息交互手段,引发了诸如垃圾邮件、恶意邮件、隐私泄露等一系列严重的问题。垃圾邮件检测是近年来出现的一个研究领域,其目的在于判定一封邮件是否为垃圾邮件。提出了一种基于邮件行为的垃圾邮件检测技术BJMD,介绍了邮件行为检测的主要思想和算法过程。通过在实际邮件集上的实验和分析,给出了新方法的一些性能评判。 As an important information exchange tool,emails contribute to serious problems such as spam-mails,malicious mails and private information leaks.Junk mail detection is a recently emerging filed,which aims to provide a efficient monitoring means on deciding whether a mail is a junk mail.We provided a behavior-based method of junk mail detection.We showed the behavior models used in our method and gave a introduction of the algorithm processes.We implemented our method on a real mail set and gave some comparisons with content-based junk mail detection to get some experiences in mining mail information.
作者 秦逸
出处 《计算机科学》 CSCD 北大核心 2012年第11期86-89,共4页 Computer Science
关键词 垃圾邮件 行为模型 邮件检测 数据挖掘 电子邮件 Junk mail Behavior model Mail detection Data mining Email
  • 相关文献

参考文献15

  • 1Cohen W. Fast effective rule induction[C]//Machine Learning: Proceedings of the Twelfth International Conference. Lake Taho,California,Mongan Kanfmann, 1995:115-123.
  • 2Carreras X, Marquez L. Boosting Trees for Anti-Spare Email Filtering[C] /// Proceedings of Euro (53nference Recent Advan- ces in NLP (RANLP 2001). Sep. 2001:58-64.
  • 3Nicholas T. Using AdaBoost and Decision Stumps to Identify Spam E-mail. Stanford University Course Project (Spring 2002/ 2003) Report[OL]. http://nlp, stanford, edu/ courses/cs224n/ 2003/fp/.
  • 4Drucker H, Wu D, Vapnik V N. Support Vector Machines for Spam Categorization [J]. IEEE Transactions on Neural Net works, 1999,20(5) : 1048-1054.
  • 5董建设,袁占亭,张秋余.基于多种核函数的SVM在垃圾邮件过滤中的应用[J].计算机应用,2008,28(2):424-427. 被引量:3
  • 6Sahami M,Dumais S, Heckerman D, et al. A Bayesian approach to filtering junk e-mail [C]//Proc. of AAAI Workshop on Learning for Text Categorization. 1998 : 55-62.
  • 7Androutsopoulos I, Koutsias J, Chandrinos K V, et al. An Evalua- tion of Naive Bayesian Anti-Spare Filtering[C] // Proc. of the Workshop on Machine Learning in the New Information Age, 11 th European Conference on Machine Learning ([CML 2000). May 2000:9-17.
  • 8Androutsopoulos I, Paliouras G, Michelakis E. Learning to Filter Unsolicited Commercial E-Mail[R]. Technical report 2004/2, NCSR "Demokritos". 2004.
  • 9Denning D E, Neumann P G. Requirements and model for IDE- A real-time intrusion detection system[R]. Tech. Rep. ,Com put. Sci. Lab, SRI International, Menlo Park, CA, 19 8 5.
  • 10Schultz M, Eskin E, Zadok E, et al. MEF: Malicious Email Filter A UNIX Mail Filter that Detect Malicious Windows Executables [C]//USENIX Annual Technical Conference-FREENIX Track. 2001.

二级参考文献20

  • 1王斌,潘文锋.基于内容的垃圾邮件过滤技术综述[J].中文信息学报,2005,19(5):1-10. 被引量:129
  • 2M. Sahami, S. Dumais, D. Heckerman, etc. A Bayesian Approach to Filtering Junk Email[C]//Proceeding of AAAI Workshop on Learning for Text Categorization, 1998:55-62.
  • 3I. Androutsopoulos, J. Koutsias, K. V. Chandrinos, etc. An Evaluation of Naive Bayesian Anti-Spam Filtering[C]//Proceeding of the Workshop on Machine Learning in the New Information Age, llth European Conference on Machine Learning (ECML'00), Barcelona, Spain, 2000: 9-17.
  • 4Fuchuan Peng and Dale Schuurmans. Combining Naive Bayes and n-Gram Language Models for Text Classification[C]//25th European Conference on Information Retrieval Research ( ECIR ' 03 ), Springer Verlag, 2003: 335-350.
  • 5F. Peng, X. Huang, D. Schuurmans, and S. Wang. Text Classification in Asian Languages without Word Segmentation[C]//Proceedings of the 6th International Workshop on Information Retrieval with Asian Languages (IRAL'03), Sapporo, Japan, 2003: 41-48.
  • 6H. Drucker, D. Wu and V. N. Vapnik. Support Vector Machines for Spam Categorization[J].IEEE Transactions on Neural Networks, 1999, 20(5): 1048-1054.
  • 7D. Sculley, Gabriel Wachman. Relaxed online SVMs for Spare Filtering[C]//Proeeedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR'07), Amsterdam, Netherlands, 2007:415-422.
  • 8Joshua Goodman and Wen-tau Yih. Online Discriminative Spam Filter Training[C]//Third Conference on Email and AntiSpam (CEAS'06), Mountain View, California USA, 2006.
  • 9Andrej Bratko and Bogdan Filipic. Spare Filtering using Statistical Data Compression Models[J]. Jour nal of Machine Learning Research, 2006, 14(2):1-38.
  • 10Egidio Terra. Simple Language Models for Spam Detection[C]//14th TExt Retrieval Conference (TREC'05), Gaithersburg, Maryland, 2005.

共引文献9

同被引文献24

  • 1李涛.基于免疫的网络监控模型[J].计算机学报,2006,29(9):1515-1522. 被引量:53
  • 2张泽明,罗文坚,王煦法.一种基于人工免疫的多层垃圾邮件过滤算法[J].电子学报,2006,34(9):1616-1620. 被引量:16
  • 3Gansterer W,Ilger M,Neumayer P,et al.Anti-spam methodsstate-ofthe-art[D].Vienna:Faculty of Computer Science.University of Vienna,2005.
  • 4Marsono M N,El-Kharash M W,Gebali F.Targeting spam control on middleboxes:Spam detection based on layer-3 e-mail content classification[J].Computer Networks,2009,53(6):835-848.
  • 5Mehmet Aci,Cigdem Inan,Mutlu Avci.A hybrid classification method of k nearest neighbor,Bayesian methods and genetic algorithm[J].Expert Systems With Applications,2010,37(7):5061-5067.
  • 6Yu Bo,Xu Zongben.A comparative study for content-based dynamic spam classification using four machine learning algorithms[J].Knowledge-Based System s,2008,21(4):355-362.
  • 7Clark J,Koprinska I,Poon J.A Neural Network Based Approach to Automated E-Mail Classification[C]//Web Intelligence:Proceedings of the 2003 IEEE/WICInternational Conference on Web Intelligence,2003:13-17.
  • 8Qing J J,Mao R L,Bie R F,et al.An AIS-based e-mail classification method[C]//The 2009 International Conference on Intelligent Computing,Ulsan,Korea,2009:492-499.
  • 9Zhang Le,Zhu Jingbo,Yao Tianshun.An evaluation of statistical spam filtering techinques[J].ACM Transactionson Asian Language Information Processing(TALIP),2004,3(4):243-269.
  • 10Guzella T S,Mota-Santos T A,Uca J Q,et al.Identification of SPAM messages using an approach inspired on the immune system[J].Biosystems,2008,92(3):215-225.

引证文献5

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部