{"title":"Adaptive Spam Filtering Based on Fingerprint Vectors","authors":"Weihong Liu, Weidong Fang","doi":"10.1109/CCCM.2008.275","DOIUrl":null,"url":null,"abstract":"Spam has become one of the severest problems for today's network systems. In this paper, we present an adaptive spam filtering mechanism based on message fingerprinting. In our mechanism, each message is represented by a fingerprint vector, and two messages with a short distance in their fingerprint vectors are viewed as variants of each other. We present methods for fast matching a query message against a list of known spam messages, and methods for adaptive updating of the fingerprint vectors of known spam messages. Experiments on real spam data demonstrate the effectiveness of the proposed method.","PeriodicalId":326534,"journal":{"name":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 ISECS International Colloquium on Computing, Communication, Control, and Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCCM.2008.275","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
Spam has become one of the severest problems for today's network systems. In this paper, we present an adaptive spam filtering mechanism based on message fingerprinting. In our mechanism, each message is represented by a fingerprint vector, and two messages with a short distance in their fingerprint vectors are viewed as variants of each other. We present methods for fast matching a query message against a list of known spam messages, and methods for adaptive updating of the fingerprint vectors of known spam messages. Experiments on real spam data demonstrate the effectiveness of the proposed method.