Dissertations / Theses on the topic 'Spam-Filter'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 36 dissertations / theses for your research on the topic 'Spam-Filter.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Fredborg, Johan. "Spam filter for SMS-traffic." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-94161.
Full textAlbrecht, Keno. "Mastering spam : a multifaceted approach with the Spamato spam filter system /." Zürich : ETH, 2006. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=16839.
Full textLingaas, Türk Jakob. "Comparing the relative efficacy of phishing emails." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42392.
Full textSyftet med denna studie var att undersöka om det fanns en skillnad i hur troligt det är att ett offer klickar på länkarna till ett phishing-e-postmeddelande, baserat på innehållet i e-postmeddelandet, tonen och språket som används och kodens struktur. Denna sannolikhet inkluderar även e-postens förmåga att kringgå skräppostfilter. Metod: Metoden som användes var en simulerad phishing-attack. Sex olika phishing-mallar skapades och skickades ut via Gophish-ramverket till målgruppen bestående av studenter (från Halmstads universitet), från en slumpmässig pool med 20 000 användare. Phishing-e-postmeddelandena innehöll en länk till en målsida (hostad via en virtuell maskin) som spårade användarstatus. Mallarna var: Covid19 Pre-Attempt, Spotify Friendly CSS, Spotify Friendly Button, Spotify Aggressive CSS, Spotify Aggressive Button, Student Union. Resultat: Covid19 förförsök: 72,6% kringgick det primära spamfiltret, 45,8% kringgick det sekundära spamfiltret, 4% e-postmeddelanden öppnade och 100% länkar klickade Spotify Friendly CSS: 50% kringgick det primära spamfiltret, 38% kringgick det sekundära spamfiltret, 26,3% e-postmeddelanden öppnade och 0% länkar klickade. Spotify Friendly Button: 59% kringgick det primära spamfiltret, 28,8% kringgick det sekundära spamfiltret, 5.8% e-postmeddelanden öppnade och 0% länkar klickade. Spotify Aggressive CSS: 50% kringgick det primära spamfiltret, 38% kringgick det sekundära spamfiltret, 10,5% e-post öppnade och 100% länkar klickade. Spotify Aggressive Button: 16% kringgick det primära spamfiltret, 25% kringgick det sekundära spamfiltret, 0% e-postmeddelanden öppnade och 0% e-postmeddelanden klickade. Studentkåren: 40% kringgick det primära spamfiltret, 75% kringgick det sekundära spamfiltret, 33,3% e-postmeddelanden öppnade och 100% länkar klickade. Slutsats: Olika strukturerade e-postmeddelanden har olika funktioner för att kringgå skräppostfilter och för att lura användare. Språk och ton tycks påverka effektiviteten för epost-phishing. Resultaten tyder på att en aggressiv och auktoritär ton ökar phishing-epostmeddelandets förmåga att lura användare, men verkar inte påverka dess förmåga att kringgå skräppostfilter i motsvarande grad. Autenticitet verkar påverka e-postens effektivitet, då resultaten visade en skillnad i effektivitet om ett e-postmeddelande var strukturerat som en äkta avsändare. Att adressera känslor som stress och rädsla verkar öka phishing-e-postens effektivitet när det gäller att lura en användare.
Richter, Frank. ""Die guten ins Töpfchen, die schlechten ins ..." - Filter für E-Mail." Universitätsbibliothek Chemnitz, 2001. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200100300.
Full textEggendorfer, Tobias. "Methoden der Spambekämpfung und -vermeidung /." Norderstedt : Books on Demand, 2007. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=016357555&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textSingh, Kuldeep. "An Investigation of Spam Filter Optimaltiy : based on Signal Detection Theory." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9960.
Full textUnsolicited bulk email, commonly known as spam, represents a significant problem on the Internet. The seriousness of the situation is reflected by the fact that approximately 97% of the total e-mail traffic currently (2009) is spam. To fight this problem, various anti-spam methods have been proposed and are implemented to filter out spam before it gets delivered to recipients, but none of these methods are entirely satisfactory. This thesis analyzes the properties of spam filters from the viewpoint of Signal Detection Theory (SDT). The Bayesian approach of Signal Detection Theory provides a basis for determining the tuning of spam filters from the particular user's point of view and helps in determining the utility which the spam filter provides to the user.
Havens, Russel William. "Naive Bayesian Spam Filters for Log File Analysis." BYU ScholarsArchive, 2011. https://scholarsarchive.byu.edu/etd/2814.
Full textFrobese, Dirk T. "E-Mail-Kategorisierung und Spam-Detektion mit SENTRAX [Mustererkennung mit Assoziativmatrizen]." Hildesheim Berlin Franzbecker, 2009. http://d-nb.info/999598341/04.
Full textJägenstedt, Gabriel. "Analysis and Simulation of Threats in an Open, Decentralized, Distributed Spam Filtering System." Thesis, Linköpings universitet, Databas och informationsteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-81012.
Full textMatula, Tomáš. "Techniky umělé inteligence pro filtraci nevyžádané pošty." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-236060.
Full textNeuwirth, David. "Realizace spamového filtru na bázi umělého imunitního systému." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2009. http://www.nusl.cz/ntk/nusl-236637.
Full textČervenka, Richard. "Dopisy v Internetu a další používání bayesovských filtrů." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-9227.
Full textSontag, Ralph. "Hat Bayes eine Chance?" Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400556.
Full textMalkhare, Rohan V. "Scavenger: A Junk Mail Classification Program." Scholar Commons, 2003. https://scholarcommons.usf.edu/etd/1145.
Full textBrückner, Michael. "Prediction games : machine learning in the presence of an adversary." Phd thesis, Universität Potsdam, 2012. http://opus.kobv.de/ubp/volltexte/2012/6037/.
Full textEine der Aufgabenstellungen des Maschinellen Lernens ist die Konstruktion von Vorhersagemodellen basierend auf gegebenen Trainingsdaten. Ein solches Modell beschreibt den Zusammenhang zwischen einem Eingabedatum, wie beispielsweise einer E-Mail, und einer Zielgröße; zum Beispiel, ob die E-Mail durch den Empfänger als erwünscht oder unerwünscht empfunden wird. Dabei ist entscheidend, dass ein gelerntes Vorhersagemodell auch die Zielgrößen zuvor unbeobachteter Testdaten korrekt vorhersagt. Die Mehrzahl existierender Lernverfahren wurde unter der Annahme entwickelt, dass Trainings- und Testdaten derselben Wahrscheinlichkeitsverteilung unterliegen. Insbesondere in Fällen in welchen zukünftige Daten von der Wahl des Vorhersagemodells abhängen, ist diese Annahme jedoch verletzt. Ein Beispiel hierfür ist das automatische Filtern von Spam-E-Mails durch E-Mail-Anbieter. Diese konstruieren Spam-Filter basierend auf zuvor empfangenen E-Mails. Die Spam-Sender verändern daraufhin den Inhalt und die Gestaltung der zukünftigen Spam-E-Mails mit dem Ziel, dass diese durch die Filter möglichst nicht erkannt werden. Bisherige Arbeiten zu diesem Thema beschränken sich auf das Lernen robuster Vorhersagemodelle welche unempfindlich gegenüber geringen Veränderungen des datengenerierenden Prozesses sind. Die Modelle werden dabei unter der Worst-Case-Annahme konstruiert, dass diese Veränderungen einen maximal negativen Effekt auf die Vorhersagequalität des Modells haben. Diese Modellierung beschreibt die tatsächliche Wechselwirkung zwischen der Modellbildung und der Generierung zukünftiger Daten nur ungenügend. Aus diesem Grund führen wir in dieser Arbeit das Konzept der Prädiktionsspiele ein. Die Modellbildung wird dabei als mathematisches Spiel zwischen einer lernenden und einer datengenerierenden Instanz beschrieben. Die spieltheoretische Modellierung ermöglicht es uns, die Interaktion der beiden Parteien exakt zu beschreiben. Dies umfasst die jeweils verfolgten Ziele, ihre Handlungsmöglichkeiten, ihr Wissen übereinander und die zeitliche Reihenfolge, in der sie agieren. Insbesondere die Reihenfolge der Spielzüge hat einen entscheidenden Einfluss auf die spieltheoretisch optimale Lösung. Wir betrachten zunächst den Fall gleichzeitig agierender Spieler, in welchem sowohl der Lerner als auch der Datengenerierer keine Kenntnis über die Aktion des jeweils anderen Spielers haben. Wir leiten hinreichende Bedingungen her, unter welchen dieses Spiel eine Lösung in Form eines eindeutigen Nash-Gleichgewichts besitzt. Im Anschluss diskutieren wir zwei verschiedene Verfahren zur effizienten Berechnung dieses Gleichgewichts. Als zweites betrachten wir den Fall eines Stackelberg-Duopols. In diesem Prädiktionsspiel wählt der Lerner zunächst das Vorhersagemodell, woraufhin der Datengenerierer in voller Kenntnis des Modells reagiert. Wir leiten ein relaxiertes Optimierungsproblem zur Bestimmung des Stackelberg-Gleichgewichts her und stellen ein mögliches Lösungsverfahren vor. Darüber hinaus diskutieren wir, inwieweit das Stackelberg-Modell bestehende robuste Lernverfahren verallgemeinert. Abschließend untersuchen wir einen Lerner, der auf die Aktion des Datengenerierers, d.h. der Wahl der Testdaten, reagiert. In diesem Fall sind die Testdaten dem Lerner zum Zeitpunkt der Modellbildung bekannt und können in den Lernprozess einfließen. Allerdings unterliegen die Trainings- und Testdaten nicht notwendigerweise der gleichen Verteilung. Wir leiten daher ein neues integriertes sowie ein zweistufiges Lernverfahren her, welche diese Verteilungsverschiebung bei der Modellbildung berücksichtigen. In mehreren Fallstudien zur Klassifikation von Spam-E-Mails untersuchen wir alle hergeleiteten, sowie existierende Verfahren empirisch. Wir zeigen, dass die hergeleiteten spieltheoretisch-motivierten Lernverfahren in Summe signifikant bessere Spam-Filter erzeugen als alle betrachteten Referenzverfahren.
Anders, Jörg. "WORKSHOP "MOBILITÄT"." Universitätsbibliothek Chemnitz, 2001. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200100538.
Full textLynam, Thomas Richard. "Spam Filter Improvement Through Measurement." Thesis, 2009. http://hdl.handle.net/10012/4344.
Full textChen, Shu-Bin, and 陳書彬. "Bayesian-based Hybrid Spam Mail Filter." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/79812000538189642560.
Full text靜宜大學
資訊傳播工程學系
100
The spam E-mail problem has become more and more serious today. Enterprises and users have to spend lots of time on filtering out useful messages from spam. A variety of spam filtering mechanisms had been proposed, including list-based method, behavior-based filter, content-based method, and cocktail filtering mechanisms. In order to improve the accuracy of spam filters, this study proposes a novel spam detection system, which combines Bayesian-based content filter with URL filter. There are two stages in the proposed system: the online stage and the offline stage. In the offline stage, the characteristics of the spam mail and legitimate mail will be analyzed based on the occurrence frequency of keywords, and then four keyword hash tables will be built. In the offline stage, the filtering process is based on the four pre-built hash tables and the proposed Bayesian-based functions. Five different spam filtering scenarios are examined in this study. The results show that the hybrid spam filtering method proposed in this study has 98% precision rate and 94% recall rate. Therefore, the proposed spam filter performs efficiently and accurately.
Hsieh, Wen Hsuan, and 謝文軒. "Semantic processing model for spam filter." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/24871504260332740224.
Full text淡江大學
資訊管理學系碩士班
94
In this information age, network provides many convenient applications to us, but spam is different one. The huge amount of spam and disgusting contents are disturbance people who use e-mail in daily life. The thesis is to develop a semantic-based spam filter in client side, it can handle mail message in Chinese or in English and doesn’t need to build a huge amount of black-white list for mail. It has an ability of adaptive learning to reach high precision rate and looks after the speed in training phase and classifying phase. So it can be used in real environment. Mail filtering is similar with document classification. First problem is how to extract enough features that represent the mail exactly. Then according to these features, we use automatic classify algorithm to classify this mail is spam or ham. We use sliding window to extract features and take Bayesian’s algorithm as our classification algorithm. Due to the feature extraction method deeps into semantic layer, the precision rate is higher than the feature extraction with keywords as a result.
Tzeng, Mo-yi, and 曾漠益. "A Spam Filter Based on Rough Sets Theory." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/21623525189852488270.
Full text國立中山大學
資訊管理學系研究所
93
With the popularization of Internet and the wide use of electronic mails, the number of spam mails grows continuously. The matter has made e-mail users feel inconvenient. If e-mail servers can be integrated with data mining and artificial intelligence techniques and learn spam rules and filter out spam mails automatically, they will help every person who is bothered by spam mails to enjoy a clear e-mail environment. In this research, we propose an architecture called union defense to oppose against the spread of spam mails. Under the architecture, we need a rule-based data mining and artificial intelligence algorithm. Rough sets theory will be a good choice. Rough sets theory was proposed by Palwak, a logician living in Poland. It is a rule-based data mining and artificial intelligence algorithm and suitable to find the potential knowledge of inexact and incomplete data out. This research developed a spam filter based on rough sets theory. It can search for the characteristic rules of spam mails and can use these rules to filter out spam mails. This system set up by this research can be appended to most of existing e-mail servers. Besides, the system support Chinese, Japanese and Korean character sets and overcome the problem that most spam filters only can deal with English mails. We can develop a rule exchange approach between e-mail servers in the future works to realize union defense.
Yang, Chih-Chin, and 楊智欽. "A Spam Filter Based on Reinforcement and Collaboration." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/8u5rzn.
Full text國立中山大學
資訊管理學系研究所
96
Growing volume of spam mails have not only decreased the productivity of people but also become a security threat on the Internet. Mail servers should have abilities to filter out spam mails which change time by time precisely and manage increasing spam rules which generated by mail servers automatically and effectively. Most paper only focused on single aspect (especially for spam rule generation) to prevent spam mail. However, in real word, spam prevention is not just applying data mining algorithm for rule generation. To filter out spam mails correctly in a real world, there are still many issues should be considered in addition to spam rule generation. In this paper, we integrate three modules to form a complete anti-spam system, they are spam rule generation module, spam rule reinforcement module and spam rule exchange module. In this paper, rule-based data mining approach is used to generate exchangeable spam rules. The feedback of user’s returns is reinforced spam rule. The distributing spam rules are exchanged through machine-readable XML format. The results of experiment draw the following conclusion: (1) The spam filter can filter out the Chinese mails by analyzing the header characteristics. (2) Rules exchanged among mail improve the spam recall and accuracy of mail servers. (3) Rules reinforced improve the effectiveness of spam rule.
SHENG, HO TU, and 何篤生. "Design of Adaptively Automatic Filter for Spam Mails." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/79600197387040135993.
Full text國立中興大學
資訊科學研究所
93
Flooding the Internet with many copies of the same email is known as spam mail. While spammers can send thousands or even millions of spam emails at negligible cost, the recipient pays a considerable price for processing these unwanted mails. Decreases in worker’s productivity, bandwidth, storage, and mail server’s performance are major problems caused by the spam mails. We propose an adaptive,automatic filter for spam mails processing in this paper, based on the Bayes probability. In addition, we make use of weights on server and client, adopt the technique of both black and white list, and offer personalized filter rules definition. In our system, a user can define his own filter rules. Through the automatic training mechanism, even with rapid spam mail evolution, the efficiency of spam mail detection remains. In conclusion, this system can reduce the user’s burden and provide a great flexibility to adaptively filter out most spam mails.
CHENG, TA-I., and 鄭達懿. "Multi-Level Spam Protection System-Focus on Bayesian Filter." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/25448972291999061988.
Full text國立屏東教育大學
資訊科學系
99
在現今科技的蓬勃發展以及網路的普及之下,電子郵件已然成為人們互相傳遞訊息最方便的工具。而垃圾郵件的增加造成系統的負擔,消耗了網路的資源,也浪費了大家等待的時間。這些垃圾郵件內容都包含了惡意程式、木馬、蠕蟲等內容,目前有許多的垃圾郵件的過濾軟體都是使用Bayesian filter的反制垃圾郵件機制。在本篇的論文中,我們主要運用有貝氏過濾法(Bayesian filter)垃圾郵件反制機制的Anti-Spam SMTP Proxy和搭配正規表示式(Regular Expression)的Spampal以及防毒軟體ClamAV來辨識惡意軟體和木馬等附件檔。我們探討的是當只使用一個反垃圾郵件軟體過濾垃圾郵件,會發現將某郵件地址加入白名單後,反垃圾郵件軟體就不再對該郵件地址所寄的所有郵件過濾。本論文設計了一個多層的防護架構,除了過濾一般寄件者所寄的垃圾郵件之外,也可以過濾白名單內的寄件者,藉由多層的架構來防止垃圾郵件寄件者利用各種方式來規避過濾。
Tai, Chin-Fu, and 戴進福. "A Study of Filter Spam based on Fuzzy Control." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/72806612065421141036.
Full text萬能科技大學
資訊管理研究所
99
The Traditional e-Mail filtering technique that most researches proposed could not cope with the complicated Internet nowadays. E-mail has become the necessary part in our daily life. However, spammers use different ways to spread the improper e-mail to trouble peoples’ life. Therefore, how to find the innovative and effective e-mail filtering technique becomes an important issue. Although Bayesian Classifiers shows remarkable accuracy in filtering spam email, but it exists great difficulty in choosing appropriate parameters and understanding the information of Bayesian Training Model. The research proposed a theory-based spam email method, called Fuzzy model. One can establish his/her own filtering model through the result of fuzzy control to manage spam email. The owned filtering model also provided learning mechanism. Unnecessary classified rules can lead to low email server performance and increase the rate of false spam positive. Through the proposed method, email filtering servers can increase filtering efficiency within the smallest set and eliminate the rate of false spam positive so that email server performance can become much more efficient and accurate.
Chang, Yung shun, and 張詠順. "The Design and Implementation of Factorial Type Spam Filter." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/49063446319161787381.
Full text佛光大學
資訊學系
100
Solve the SPAM problem has been the proliferation of Internet application development on important issues in theses year. E-mail users are affected by the problem of SPAM, it reduces trust in e-mail service. In recent years, portal site and Internet Services Provider in order to increase the number of customers and offer free e-mail account and has a large space. Although accelerated the popularization of e-mail service but ignore the amount of spam increase will reduce the customer's reliability, it have a negative impact on corporate image. Therefore, a high degree of operational efficiency, block rate, and friendly management interface is the three elements must be of development anti-spam technology. Then there must be a better system hardware resources and fast computing efficiency and help each other. Friendly and convenient management interface need for high-performance automatic learning mechanisms and accurate response mechanisms. Provide a complete e-mail records and statistical reports to managers for data analysis spam filter weights and adjustment argument.
Teng, Wei-Lun, and 鄧維侖. "A Spam Filtering Approach Utilizing Personalized Legitimate Mail Filter." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/77875191130653592963.
Full text國立臺灣科技大學
資訊工程系
97
Comparing to server side spam mail filter, personal spam mail filter has the advantage to utilize personal information, like address book and local mail folders, to reach higher accuracy on spam filtering. However, filters trained by both spam mails and personal mails may have difficulty classifying e-mails with the same characteristics of both spam and ham. Former research suggests that putting a legitimate mail filter in front of traditional personal spam filter may effectively decrease false positive rate and allow some spam mails which user might be interested with to pass through. E-mails classified as legitimate mails by the legitimate mail filter may pass, while the remaining e-mails are processed by the spam filter in an ordinary way. This thesis focuses on implementation issues including building testbed, developing different training process for Chinese and for English mails, and fine tuning thresholds of both filters to reach lowest false positive rate with reasonable false negative rate. Experiments are performed on two mail servers–one equipped with ordinary spam filter only, and the other equipped both the legitimate mail filter and the spam filter. The results of experiments demonstrates that, given the same false negative rate, the two filters approach offer a much lower false positive rate comparing to the ordinary one.
Wu, Chao-Yi, and 吳昭逸. "An E-Mail System with Spam Filter and Security Mechanism." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/30778439943836414376.
Full text國立臺灣科技大學
資訊工程系
92
The two mainly goals in the system are filtering spam E-mails and stopping those malevolence programs, such as virus, backdoor and Trojan Horse, to send E-mails through user’s Mail User Agent. The most important key points of a perfect spam filtering system include high speed and correctness when classifying between spam and legitimate E-mails, and SSVM is one of the most suitable machine algorithms in classifying. In this system we use two public standard training and testing data set: Ling-Spam corpus and PU1 corpus. Each data in these two corpus set will translate from textual form into vector form, and each vector has 108 feature columns. Using these vector-form data, we can use SSVM to train and test our optimal classifying function. From the results of experiments in this paper, we can get totally better Spam Precision and Spam Recall values than other researches before. Besides, our system will also install a firewall in user’s personal computer to stop malevolence programs sending E-mails. The firewall will guard user’s port 25 in order to stop those malevolence programs fake as normal TCP/IP packets but send E-mails stealthily. Based on these two important parts, this system can help users build a clear, safely, and non-spam network environment.
Huang, Iao-Ting, and 黃耀庭. "A Market moneyness & Functional demand Analysis of Spam Filter." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/4vq5et.
Full text國立臺北科技大學
工業工程與管理系所
94
It’s favored with quick development of communication information science and technology, bandwidth and speed of internet are surmounted one after another. Marketers go with the trend, combine science and technology of network, internet marketing assumes and already becomes the most modernized outstanding one of industry; Times rising in internet marketing, Marketers besides statically erect websites and improve the exposing rate, send dynamically the advertising document of electron to declare constantly, in order to touch consumer''s mentality, it is an important thing among them to use E-mail as advertising marketing, however, these electron advertising letters become very hated spam that was not agreed and enter promptly by force, are not only increase in quantities, wasted network bandwidth, hide rapidly information safety , raising the cost of management , reducing productivity and working efficiency. So far the spammer’s sending indiscriminately has already reached quite rampantly. The mailers are expectations that authorities legislate to prevent, and ISP (Internet Services Provider) offer filter to hold back. The former, there are two drafted bills have been sent and examined at present, but has not legislated yet; And the latter, the academia counts 14 to the discussion of the spam filter, they primarily writing stress on technology such as how to mine, detect, sieve etc, few people shows any interest in its market. The war of spam and anti-spam has already been launched silently, both sides try one''s very best, what does not bleed attacks and defends fighting, The spammers who attack crazily, the anti-spammers who defend do one''s utmost to defend stopping up , the spam filter are brought following the trend , therefore there are more than 20 kinds spam filter on the market, this research is major receiving the quantity and software demand of spam filter user with the market of the software , and the relation between the filter function and filter software demand differently, to suggest really of management who’s filter provider of anti-spammer and the mailer, and do some good to network clans.
Liau, Ming-Li, and 廖明禮. "A Design and Implementation of Distributed SPAM Mail Filter System." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/35875750255904221146.
Full text淡江大學
資訊管理學系碩士班
94
To use E-mail is an indispensable for the way of communication in the E-generation. However, someone make capital of it to send countless advertisement letters by the advantage of network that has low cost and endless scope. Due to advertisement letters violently increase, a lot of scholars bring up the investigations into mails of percolation in the several years. People progressively develop various solutions of SPAM mail filter system. When handle a large number of mails that can effect the speed inevitably. SPAM mail filter system will inefficiency and that can loss the mails timeliness when the system deal with a great quantity of mails. There are no way of solutions aim at an overload situation by single mail domain in every SPAM mail filter system presently. The purpose of this study, we use distributed architecture to design the spam mail filter system. We take some advantage and ameliorate some drawback from old system to construct IM-SPAM system. According to experimental result, the IM-SPAM system solved the bottleneck in system is overloaded. Although we also provided a web-based interface for administrative and user can do the system configuration and set up their filtering policies and feed back spam mail information. This system will analyse feedback information and mistrial fixed. That will reduce wrong decision again.
Sun, Chung-Yeh, and 孫宗業. "The Design of an E-mail Header Based Spam Filter." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/44325187903647937728.
Full text元智大學
資訊管理學系
94
This study reviews several popular spam filters and filtering approaches, and then propose and E-mail header based spam filter that takes advantages of both heuristic filtering and Bayesian filter. The experiment results showed that the proposed spam filter performs more stably than SpamAssassin, Bogofilter and SpamBayes. The proposed spam filter achieved an average precision rate above 88% and a false positive rate below 0.1%. Also the proposed spam filter is comparable to other spam filter in filtering efficiency.
Huang, Tsai-Yuan, and 黃再源. "A Study of the Mail Spam Filter Using Clustering Launched Classification." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/80876676340135134755.
Full text逢甲大學
資訊電機工程碩士在職專班
96
Spam mail has caused great distress in enterprise and individuals. More recently, many spam mail filters were proposed. One of them, Support vector machine (SVM) is a powerful supervised learning method. Many researches explained that the accuracy of SVM is outstanding in the anti-spam field. However it is not easy that determine the suitable parameters of SVM for constructing the training model, and this model is difficult to understand. Additionally, SVM is time consuming on training and re-training. Clustering Launched Classification (CLC) is easy to use, which only needs one parameter. It has been used in other fields and performs well in accuracy. This paper proposes to adopt CLC method as a spam mail filter. The accuracy of CLC was compared with that of MySVM. In the experimental results, the accuracy variation scope of CLC is very small and that of SVM is great. Thus the performance of CLC is comparable to SVM. Furthermore, CLC is insensitive to parameter, while the SVM is sensitive, showing CLC is easier to use in anti-spam field.
Liu, Faust D. K., and 劉鼎康. "A Study of Using Artificial Neural Network Approach to Filter Spam." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/yq979e.
Full text中原大學
資訊管理研究所
93
It is well known that there is a specific effectiveness by using Neural Network Categorization (NNC) to proceed documents category; furthermore, foreign research reports are also obviously revealed that by using NNC to recognize core processor of spam is also workable. However, currently, due to there is no thesis by using NNC to proceed identification of spam in the light of Chinese mails’ contents, it is expected that through concrete experiment to understand does it workable by using NNC with regard to identification of spam. When Chinese documents are sorted out by using NNC, pre-handling is necessary. And, with regard to collection of key words (terms) when Chinese documents being pre-handled, difficulties of collection will be caused due to Chinese non-structured. In this study, as a result of mails are treated as one of documents, collection of key words (terms) in pre-handling is also quite important. Therefore, it is expected that being permeated collection of different numbers of key words (terms), and through live experiment to understand does numbers of key words (terms) influence to identification of spam. If mails are observed by an angle of documents category, even spam are also categorized differently. Hence, it is expected that through experiment to understand if mails are categorized by using dichotomy; as well as by actually using seven sorts of spam which are tested, and adding regular mails altogether, is there any influence between numbers of these two sorting results towards by using NNC to identify spam. It is expected to obtain regional optimum reconciliation through adjustment of three arguments of numbers of key words (terms), numbers of NNC node as well as numbers of NNC output categorization. Through actual experiment, it is aware of if numbers of key words (terms) collected are able to appropriately represent spam, ratio of spam identification not only can be heaved, but that of erroneous judgment can be reduced also. And, numbers of NNC node will be changed to comply with complication of training data. This study has pointed out that the highest ratio of identification will be obtained when numbers of NNC node is five. NNC output categories have to be conformed to categories of actual data after experiment. Spam has been divided to seven categories in this study, and non-spam category has been added up to eight. Therefore, spam identification is the highest when NNC numbers of output category is set at eight. Through experiment, it is informed of using NNC to proceed categorization, SF1 of spam can be reached to 0.82. Hence, it is proved that identification of Chinese spam by using NNC is effective indeed.
Chiang, Soun-Jan, and 蔣松展. "A study on design and implementation of Naive Bayesian Spam Filter." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/41689626690381500334.
Full text國立臺灣海洋大學
資訊工程學系
94
Abstract With the rise of Internet, email has become a useful communication tool in our daily life. At the same time, spam mails also become a big problem which perplexes people. Among these unsolicited emails, they include commercial advertisements, virus, Trojan, to name a few. Spam mails not only consume network resources but also cost receivers’ valuable time to handle them. A lot of anti-spam software is developed. Many of them deploy Bayesian filter mechanism. In this thesis study, we would like to explore the efficiency of Bayesian filter mechanism for spam detection. We also discuss detailed implementation issues. With public spam benchmark, we trained and evaluated our Bayesian-based spam filter. Our primitive experiment results showed that our Bayesian-based spam filter performs quite well with respect to a large range of threshold setting. The performance we got in terms of spam detection accuracy is quite close as some similar studies reported in literature.
Chiang, Yuan-Chieh, and 江元傑. "Using Characteristic Words Analysis and PSO Support Vector Machines for Spam Filter." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/18775933583592543723.
Full text國立暨南國際大學
資訊管理學系
96
In recent years, people suffer the pain from having too much information. It is different from the past where people always worry about having less information. Nowadays, it is obvious that the amount of information that one man can handle is limited. When it exceeds the information rate that one can handle, they will make mistakes easily. Therefore, data mining techniques are needed. Spam filter is an application using data mining technique. There are some troubles for users when they use their e-mails. For instance, the mix of normal and junk mails let user lose important information or delete wrong mails easily. In the business environment, costs for information processing, especially in dealing with junk mails, will increase. Hence, many techniques are proposed for anti-spam. K-mean, Back-Propagation Network (BP), Decision Tree, Bayesian approach, and Support Vector Machine (SVM) are some of the many techniques used. In the past, there are few studies that concerns about Chinese characters compared with English in spam filter. This study will focus on the Chinese e-mails for spam filter. This study compares with the four data mining techniques, which are rough set theory (RST), back-propagation neural network, combing Taguchi with SVM, and combining particle swarm optimization (PSO) with SVM. We will discuss the capability of them in this study. Additionally, this study will combine it with the discretization and feature selection method. In short, there are two important key points in this paper. First, the selection of key words will influence the accuracy of the data mining method. On the other words, the key words must have distinguishing features that can stand for the original e-mail. Second, this study discusses the optimization of parameters and the influence of using the ChiMerge algorithm for the discretization method.
Jan, Chih-Wei, and 詹智為. "An Integrated Proxy Architecture for Anti-Virus, Anti-Spam, Intrusion Detection and Content Filter." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/82030897199949867440.
Full text國立交通大學
資訊科學系所
92
Network content security has become a critical issue for the Internet. We selected five popular open-source packages to solve the problems of intrusions, viruses, spam, and inappropriate Web pages. However, simply installing these packages brings four kinds of overheads: (1) process forking, (2) redundant IPCs, (3) redundant user/kernel space interactions, and (4) duplicate packet reassembly. To reduce the above overheads, we propose a tightly-integrated architecture. This architecture uses multi-thread and the system call, select(), to eliminate the overhead in (1), and is integrated with cooperating packages into a single proxy to eliminate the overheads in (2), (3) and (4). The external benchmark reveals that the improvement of performance is from 7.16 Mbps to 13.11 Mbps in content filtering and intrusion detection, and is from 2.85 Mbps to 5.82 Mbps in anti-virus and anti-spam. It shows that the dominating overhead in the original architecture is process forking. The internal benchmark shows that the main bottlenecks of the content processing are string matching in HTTP and file system access in SMTP, 48% and 62%, respectively. Finally, to scale up this architecture, we suggest directions of improvement, including faster string matching algorithms, hardware accelerators, and more protocol support.
Tsai, Ming-Yuan, and 蔡銘源. "Spam Filtering Improvement of an e-mail Server by the Cooperation of Multi-Filter Firewall and Virtual Private Networks." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/35594340263845146048.
Full text輔仁大學
電子工程學系
96
In this paper we propose a new multi-filter firewall method instead of only a single e-mail server to enhance the efficiency of the processing of spam. The idea of a multi-filter firewall is to combine firewall, mail frontier and mail server, and with their different functions such as virus scan, anti-spam find, link brush-off in IP blacklist of unwelcome senders to ensure the safety of the mail server and efficient lift-up. In addition, to estimate system performance, we use a serial equivalent model representing a multi-filter firewall. Due to the use of the multi-filter firewall when processing e-mail our method stops spam by a cooperation method and reduces the workload of the actual mail server. For the receiving and sending nodes we use a Firewall Virtual Private Network (VPN) to share the loading for mail processing. Because the VPN is not only a virtual private Internet established between two nodes but also the use of Multi-Protocol Label Switching (MPLS), it is like an interior Internet passing data quickly between two nodes. MPLS supports Multi-Protocol Networks Transfer Protocol and core networks transfer with efficient label switching. MPLS VPN is also compatible with many communication protocols and supports free safety services.