skip to main content
10.1145/1458082.1458296acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
poster

A novel email abstraction scheme for spam detection

Published:26 October 2008Publication History

ABSTRACT

Prior studies on collaborative spam filtering with near-duplicate similarity matching scheme mainly represent each email by a succinct abstraction derived from email content text. Since these abstractions of emails cannot fully catch the evolving nature of spams, we propose in this paper a novel email abstraction scheme, which considers email layout structure to represent emails. With the proposed abstraction, we design a near-duplicate matching scheme to efficiently match each incoming email with a huge spam database.

References

  1. E. Damiani, S. D. C. di Vimercati1, S. Paraboschi, and P. Samarati. An open digest-based technique for spam detection. In Proc. of IEEE P2P, 2004.Google ScholarGoogle Scholar
  2. A. Kolcz, A. Chowdhury, and J. Alspector. The impact of feature selection on signature-driven spam detection. In Proc. CEAS, 2004.Google ScholarGoogle Scholar
  3. K. YOSHIDA, F. ADACHI, T. WASHIO, H. MOTODA, T. HOMMA, A. NAKASHIMA, H. FUJIKAWA, and K. YAMAZAKI. Density-based spam detector. In Proc. of ACM SIGKDD, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. F. Zhou, L. Zhuang, B. Y. Zhao, L. Huang, A. D. Joseph, and J. D. Kubiatowicz. Approximate object location and spam filtering on peer-to-peer systems. In Proc. of ACM/IFIP/USENIX Middleware, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A novel email abstraction scheme for spam detection

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CIKM '08: Proceedings of the 17th ACM conference on Information and knowledge management
      October 2008
      1562 pages
      ISBN:9781595939913
      DOI:10.1145/1458082

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 October 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      Overall Acceptance Rate1,861of8,427submissions,22%

      Upcoming Conference

    • Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader