skip to main content
10.1145/2030376.2030388acmotherconferencesArticle/Chapter ViewAbstractPublication PagesceasConference Proceedingsconference-collections
research-article

A rule-based system for end-user e-mail annotations

Published:01 September 2011Publication History

ABSTRACT

A new system for spam e-mail annotation by end-users is presented. It is based on the recursive application of handwritten annotation rules by means of an inferential engine based on Logic Programming. Annotation rules allow the user to express nuanced considerations that depend on deobfuscation, word (non-)occurrence and structure of the message in a straightforward, human-readable syntax. We show that a sample collection of annotation rules are effective on a relevant corpus that we have assembled by collecting emails that have escaped detection by the industry-standard SpamAssassin filter. The system presented here is intended as a personal tool enforcing personalized annotation rules that would not be suitable for the general e-mail traffic.

References

  1. R. Baumgartner, S. Flesca, and G. Gottlob. Visual web information extraction with lixto. In P. M. G. Apers, P. Atzeni, S. Ceri, S. Paraboschi, K. Ramamohanarao, and R. T. Snodgrass, editors, VLDB, pages 119--128. Morgan Kaufmann, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. G. V. Cormack and T. R. Lynam. Spam corpus creation for trec. In Proc. of the Second Conference on Email and Anti-Spam (CEAS 2005), 2005.Google ScholarGoogle Scholar
  3. G. V. Cormack and T. R. Lynam. Online supervised spam filter evaluation. ACM Trans. Inf. Syst., 25(3), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. E. Denti, A. Omicini, and A. Ricci. Multi-paradigm java-prolog integration in tuprolog. Sci. Comput. Program., 57(2):217--250, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. G. Fiumara, M. Marchi, R. Pagano, and A. Provetti. Rule-based spam e-mail annotation. In P. Hitzler and T. Lukasiewicz, editors, RR, volume 6333 of Lecture Notes in Computer Science, pages 231--234. Springer, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. N. A. Fonseca, A. Srinivasan, F. M. A. Silva, and R. Camacho. Parallel ilp for distributed-memory architectures. Machine Learning, 74(3):257--279, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. G. Gottlob, C. Koch, R. Baumgartner, M. Herzog, and S. Flesca. The lixto data extraction project - back and forth between theory and practice. In A. Deutsch, editor, PODS, pages 1--12. ACM, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. P. Hayati and V. Potdar. Evaluation of spam detection and prevention frameworks for email and image spam: a state of art. In G. Kotsis, D. Taniar, E. Pardede, and I. K. Ibrahim, editors, iiWAS, pages 520--527. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. P. Hayati, V. Potdar, A. Talevski, and W. Smyth. Rule-based on-the-fly web spambot detection using action strings. In CEAS, 2010.Google ScholarGoogle Scholar
  10. H. Lee and A. Y. Ng. Spam deobfuscation using a hidden markov model. In Proc. of the Second Conference on Email and Anti-Spam (CEAS 2005), 2005.Google ScholarGoogle Scholar
  11. S. Lee, I. Jeong, and S. Choi. Dynamically weighted hidden markov model for spam deobfuscation. In Proc. of IJCAI (IJCAI 2007), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. V. W. Marek and M. Truszczyński. Stable models and an alternative logic programming paradigm. The Logic Programming Paradigm: a 25-Year Perspective, Springer-Verlag, pages 75--398, 1999.Google ScholarGoogle Scholar
  13. S. Muggleton, R. P. Otero, and S. Colton. Editorial: special issue on inductive logic programming. Machine Learning, 70(2--3):119--120, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Poole, A. Macworth, and R. Goebel. Computational Intelligence: a Logical Approach (2nd ed). Oxford University Press, 2007.Google ScholarGoogle Scholar
  15. M. Sergeant. Internet-level spam detection and spamassassin 2.50. In Spam Conference, 2003.Google ScholarGoogle Scholar
  16. C. J. van Rijsbergen. Information Retrieval (2nd ed.). Butterworths, London, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Wielemaker and A. Anjewierden. An architecture for making object-oriented systems available from prolog. In Proc. of the 12th Int'l Workshop on Logic Programming Environments (WLPE2002), 2002.Google ScholarGoogle Scholar
  18. W. Yih, R. McCann, and A. Kotcz. Improving spam filtering by detecting gray mail. In Proc. of the fourth Conference on Email and Anti-Spam (CEAS 2007), 2007.Google ScholarGoogle Scholar

Index Terms

  1. A rule-based system for end-user e-mail annotations

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          CEAS '11: Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference
          September 2011
          230 pages
          ISBN:9781450307888
          DOI:10.1145/2030376

          Copyright © 2011 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 September 2011

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader