Spam Detection Algorithm Analysis

Slides:



Advertisements
Similar presentations
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Advertisements

Zhiyun Qian, Z. Morley Mao (University of Michigan)
1 Effective, secure and reliable hosted security and continuity solution.
IP Warming Overview and Implementation Using Eloqua.
© 2012 Eloqua, Inc. Confidential 1 Deliverability and IP Warming Overview and Implementation Using Eloqua.
CS527: Advanced Topics in Software Engineering (Software Testing and Analysis) Darko Marinov September 18, 2008.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
RB-Seeker: Auto-detection of Redirection Botnet Presenter: Yi-Ren Yeh Authors: Xin Hu, Matthew Knysz, Kang G. Shin NDSS 2009 The slides is modified from.
Enhanced LIC Pencil Filter A project proposal by David Coyne.
6/1/2015 Spam Filtering - Muthiyalu Jothir 1 Spam Filtering Computer Security Seminar N.Muthiyalu Jothir – Media Informatics.
Exchange 2003 and SPAM Fighting Emmanuel Ormancey, Rafal Otto Internet Services Group Department of Information Technology CERN 3 June 2015.
Victor Ivanov. Introduction  Definition  Unsolicited bulk messages  Concerns  Server load  Garbage content.
Understanding the Network-Level Behavior of Spammers Anirudh Ramachandran Nick Feamster.
Spyware and Spamware By Melissa Borri. Spamware… Spamware is unsolicited bulk that is designed to disguise the origin of any bulk it sends.
Network Security: Spam Nick Feamster Georgia Tech CS 6250 Joint work with Anirudh Ramachanrdan, Shuang Hao, Santosh Vempala, Alex Gray.
Understanding the Network-Level Behavior of Spammers Mike Delahunty Bryan Lutz Kimberly Peng Kevin Kazmierski John Thykattil By Anirudh Ramachandran and.
“On Scalable Attack Detection in the Network” Ramana Rao Kompella, Sumeet Singh, and George Varghese Presented by Nadine Sundquist.
Chapter 6 SPAM. Synopsis What is spam Why does spam keep coming Specialty spam Why doesn't someone stop the spammers How do spammers get the addresses.
1 Authors: Anirudh Ramachandran, Nick Feamster, and Santosh Vempala Publication: ACM Conference on Computer and Communications Security 2007 Presenter:
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Spam Sonia Jahid University of Illinois Fall 2007.
Spam? Not any more !! Detecting spam s using neural networks ECE/CS/ME 539 Project presentation Submitted by Sivanadyan, Thiagarajan.
An Effective Defense Against Spam Laundering Paper by: Mengjun Xie, Heng Yin, Haining Wang Presented at:CCS'06 Presentation by: Devendra Salvi.
Team Excel What is SPAM ?. Spam Offense Team Excel '‘a distinctive chopped pork shoulder and ham mixture'' Image Source:Appscout.com.
Filtering with Open Source Software OLUG – June 7, 2005.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
Department of Computer Sciences The University of Texas at Austin Zmail : Zero-Sum Free Market Control of Spam Benjamin J. Kuipers, Alex X. Liu, Aashin.
Understanding the Network-Level Behavior of Spammers Best Student Paper, ACM Sigcomm 2006 Anirudh Ramachandran and Nick Feamster Ye Wang (sando)
A Technical Approach to Minimizing Spam Mallory J. Paine.
Appear in IEEE TDSC 2008 Presented by Wei-Cheng Xiao.
advantages The system is nearly universal because anyone who can access the Internet has an address. is fast because messages.
Final Year Projects Prof. Joseph Ng. Mobile Application Development Sensor Programming Android Platform Preferred Applications on the following domains:
Evaluation of Spam Detection and Prevention Frameworks for and Image Spam - A State of Art Pedram Hayati, Vidyasagar Potdar Digital Ecosystems and.
Spamscatter: Characterizing Internet Scam Hosting Infrastructure By D. Anderson, C. Fleizach, S. Savage, and G. Voelker Presented by Mishari Almishari.
SPAM DETECTION AND FILTERING By Prasanna Kunchavaram.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, and Ivan Osipkov. SIGCOMM, Presented.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Understanding the network level behavior of spammers Published by :Anirudh Ramachandran, Nick Feamster Published in :ACMSIGCOMM 2006 Presented by: Bharat.
Leveraging Delivery for Spam Mitigation.
1 Hosted security and continuity. 2 GFI MAX MailProtection overview GFI MAX MailProtection is a cloud-based security solution » Inbound .
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
A COMPARISON OF ANN, NAÏVE BAYES, AND DECISION TREE FOR THE PURPOSE OF SPAM FILTERING KAASHYAPEE JHA ECE/CS
Canny Edge Detection Using an NVIDIA GPU and CUDA Alex Wade CAP6938 Final Project.
Redesign/ Change Management Team 3. Point of Actions  Joint Application Design (JAD) session (2 weeks)  Representatives from each department  Overview.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
Eckel Acoustics Website Redesign: Process. Process Overview 1.Sign Hosting Agreement for desired sites. 2.Migrate existing sites and addresses.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
Interaction and Animation on Geolocalization Based Network Topology by Engin Arslan.
E Safety & Security Tools 13 th March 2009 Martin Quinn - The Westfield Centre.
Detecting Web Attacks Using Multi-Stage Log Analysis
Anti-Spam Managing Spam with Kerio Connect
Reputation and Engagement
BEST CLOUD COMPUTING PLATFORM Skype : mukesh.k.bansal.
New Directions in Routing
Evaluating state of the art in AI
A proposal to prevent the routing of “dark” space addresses
KDD 2004: Adversarial Classification
Cross-Site Request Forgeries: Exploitation and Prevention
Preventing Internet Denial-of-Service with Capabilities
Data Collection Learning Objectives
Dynamic Authentication of Typing Patterns
iSRD Spam Review Detection with Imbalanced Data Distributions
Spam Fighting at CERN 12 January 2019 Emmanuel Ormancey.
Dynamic Authentication of Typing Patterns
Spam control Old emphasis: detect spam
Card Reader Project pilot
Performance Evaluation of a Communication Round over the Internet
Evaluating the Running Time of a Communication Round over the Internet
Presentation transcript:

Spam Detection Algorithm Analysis By: Joseph LaFata Alex Wade

Problem Spam is a problem on the Internet Wastes bandwidth Wastes time General Annoyance

Overview ISP and Email Servers are constantly needing new ways to fight spam Spammers are not sitting still Coming up with new ways to evade spam filters Development of new prevention techniques always needed

Proposal Study different spam prevention techniques Develop framework for training and testing new algorithms

Spam Detection Techniques Look into common algorithms to prevent spam Implement at least three Attempt to develop new or hybrid algorithms

Framework Provide Training emails Easily add new algorithms Spam Valid Email Easily add new algorithms Keep Metrics How accurate is it? How long did it take to run?

Questions?

Timeline Week 1: Collect Spam\Valid Email Week 2: Write Framework for training and testing Week 3: Implement Spam Filter #1 Week 4: Implement Spam Filter #2 and #3 Week 5: Test, Collect Results, Write Paper

Spam Filters Spam Bayes Lookup Sending Host Presence of only images Further techniques will be researched