[go: up one dir, main page]

Youn et al., 2015 - Google Patents

Improved spam filter via handling of text embedded image e-mail

Youn et al., 2015

View PDF
Document ID
6303237476338276642
Author
Youn S
Cho H
Publication year
Publication venue
Journal of Electrical Engineering and Technology

External Links

Snippet

The increase of image spam, a kind of spam in which the text message is embedded into attached image to defeat spam filtering technique, is a major problem of the current e-mail system. For nearly a decade, content based filtering using text classification or machine …
Continue reading at koreascience.kr (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/107Computer aided management of electronic mail
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems
    • H04L12/585Message switching systems, e.g. electronic mail systems with filtering and selective blocking capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/12Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/20Handling natural language data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Mughaid et al. An intelligent cyber security phishing detection system using deep learning techniques
US8869269B1 (en) Method and apparatus for identifying domain name abuse
US7653606B2 (en) Dynamic message filtering
US20030204569A1 (en) Method and apparatus for filtering e-mail infected with a previously unidentified computer virus
Merugu et al. Text message classification using supervised machine learning algorithms
Rayan Analysis of e‐Mail Spam Detection Using a Novel Machine Learning‐Based Hybrid Bagging Technique
US20230171287A1 (en) System and method for identifying a phishing email
Akinyelu Machine learning and nature inspired based phishing detection: a literature survey
Thakur et al. Catching classical and hijack-based phishing attacks
Mittal et al. Phishing detection using natural language processing and machine learning
US12438903B2 (en) Systems and methods for detecting maliciousness of network communications through deployment of artificial intelligence techniques
Nivedha et al. Detection of email spam using natural language processing based random forest approach
Yasin et al. Email spam filtering technique: challenges and solutions
Alhawamleh Advanced spam filtering in electronic mail using hybrid the mini batch k-means normalized mutual information feature elimination with elephant herding optimization technique
Ketari et al. A study of image spam filtering techniques
Youn et al. Improved spam filter via handling of text embedded image e-mail
Dhavale Advanced image-based spam detection and filtering techniques
Almousa et al. Anti-spoofing in medical employee's email using machine learning uclassify algorithm
Revar et al. A Review on Different types of Spam Filtering Techniques.
Khawandi et al. A survey on image spam detection techniques
Altan et al. Dual-Path Phishing Detection: Integrating Transformer-Based NLP with Structural URL Analysis
Abdulrahman et al. Using decision tree algorithms in detecting spam emails written in Malay: A comparison study
Barbar et al. Image spam detection using FENOMAA technique
Khanum et al. Trends in combating image spam e-mails
Rayan et al. Detection of email spam using natural language processing based random forest approach