ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011 Overview of Existing Methods of Spam Mining and Potential Usefulness of Sender’s Name as Parameter for Fuzzy String Matching
This document summarizes an article that analyzes existing anti-spam techniques including content-based, non-content based, and hybrid methods. It also proposes using the sender's name as a parameter for fuzzy string matching to cluster related spam domains. The key methods discussed are naïve Bayesian filtering, support vector machines, neural networks, domain blacklisting, and an existing hybrid method that clusters spam based on subject and IP address similarity. Experimental results on a large spam dataset show the sender's name can effectively be used as an additional parameter for fuzzy matching, identifying large clusters of related spam.
Similaire à ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011 Overview of Existing Methods of Spam Mining and Potential Usefulness of Sender’s Name as Parameter for Fuzzy String Matching
Similaire à ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011 Overview of Existing Methods of Spam Mining and Potential Usefulness of Sender’s Name as Parameter for Fuzzy String Matching (20)
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
ACEEE Int. J. on Information Technology, Vol. 01, No. 01, Mar 2011 Overview of Existing Methods of Spam Mining and Potential Usefulness of Sender’s Name as Parameter for Fuzzy String Matching