Youn et al., 2015 - Google Patents
Improved spam filter via handling of text embedded image e-mailYoun et al., 2015
View PDF- Document ID
- 6303237476338276642
- Author
- Youn S
- Cho H
- Publication year
- Publication venue
- Journal of Electrical Engineering and Technology
External Links
Snippet
The increase of image spam, a kind of spam in which the text message is embedded into attached image to defeat spam filtering technique, is a major problem of the current e-mail system. For nearly a decade, content based filtering using text classification or machine …
- 238000001914 filtration 0 abstract description 36
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/107—Computer aided management of electronic mail
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
- H04L12/585—Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Mughaid et al. | An intelligent cyber security phishing detection system using deep learning techniques | |
| US8869269B1 (en) | Method and apparatus for identifying domain name abuse | |
| US7653606B2 (en) | Dynamic message filtering | |
| US20030204569A1 (en) | Method and apparatus for filtering e-mail infected with a previously unidentified computer virus | |
| Merugu et al. | Text message classification using supervised machine learning algorithms | |
| Rayan | Analysis of e‐Mail Spam Detection Using a Novel Machine Learning‐Based Hybrid Bagging Technique | |
| US20230171287A1 (en) | System and method for identifying a phishing email | |
| Akinyelu | Machine learning and nature inspired based phishing detection: a literature survey | |
| Thakur et al. | Catching classical and hijack-based phishing attacks | |
| Mittal et al. | Phishing detection using natural language processing and machine learning | |
| US12438903B2 (en) | Systems and methods for detecting maliciousness of network communications through deployment of artificial intelligence techniques | |
| Nivedha et al. | Detection of email spam using natural language processing based random forest approach | |
| Yasin et al. | Email spam filtering technique: challenges and solutions | |
| Alhawamleh | Advanced spam filtering in electronic mail using hybrid the mini batch k-means normalized mutual information feature elimination with elephant herding optimization technique | |
| Ketari et al. | A study of image spam filtering techniques | |
| Youn et al. | Improved spam filter via handling of text embedded image e-mail | |
| Dhavale | Advanced image-based spam detection and filtering techniques | |
| Almousa et al. | Anti-spoofing in medical employee's email using machine learning uclassify algorithm | |
| Revar et al. | A Review on Different types of Spam Filtering Techniques. | |
| Khawandi et al. | A survey on image spam detection techniques | |
| Altan et al. | Dual-Path Phishing Detection: Integrating Transformer-Based NLP with Structural URL Analysis | |
| Abdulrahman et al. | Using decision tree algorithms in detecting spam emails written in Malay: A comparison study | |
| Barbar et al. | Image spam detection using FENOMAA technique | |
| Khanum et al. | Trends in combating image spam e-mails | |
| Rayan et al. | Detection of email spam using natural language processing based random forest approach |