About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
1st International Conference on Collaborative Computing: Networking, Applications and Worksharing

Research Article

An experimental evaluation of spam filter performance and robustness against attack

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/COLCOM.2005.1651219,
        author={Steve Webb and Subramanyam Chitti and Calton Pu},
        title={An experimental evaluation of spam filter performance and robustness against attack},
        proceedings={1st International Conference on Collaborative Computing: Networking, Applications and Worksharing},
        publisher={IEEE},
        proceedings_a={COLLABORATECOM},
        year={2006},
        month={7},
        keywords={Collaboration  Degradation  Educational institutions  High performance computing  Information filtering  Information filters  Large-scale systems  Robustness  Support vector machines  Unsolicited electronic mail},
        doi={10.1109/COLCOM.2005.1651219}
    }
    
  • Steve Webb
    Subramanyam Chitti
    Calton Pu
    Year: 2006
    An experimental evaluation of spam filter performance and robustness against attack
    COLLABORATECOM
    IEEE
    DOI: 10.1109/COLCOM.2005.1651219
Steve Webb1,*, Subramanyam Chitti1,*, Calton Pu1,*
  • 1: College of Computing, Georgia Institute of Technology, Atlanta, GA 30332
*Contact email: webb@cc.gatech.edu, chittis@cc.gatech.edu, calton@cc.gatech.edu

Abstract

In this paper, we show experimentally that learning filters are able to classify large corpora of spam and legitimate email messages with a high degree of accuracy. The corpora in our experiments contain about half a million spam messages and a similar number of legitimate messages, making them two orders of magnitude larger than the corpora used in current research. The use of such large corpora represents a collaborative approach to spam filtering because the corpora combine spam and legitimate messages from many different sources. First, we show that this collaborative approach creates very accurate spam filters. Then, we introduce an effective attack against these filters which successfully degrades their ability to classify spam. Finally, we present an effective solution to the above attack which involves retraining the filters to accurately identify the attack messages.

Keywords
Collaboration Degradation Educational institutions High performance computing Information filtering Information filters Large-scale systems Robustness Support vector machines Unsolicited electronic mail
Published
2006-07-24
Publisher
IEEE
Modified
2011-11-05
http://dx.doi.org/10.1109/COLCOM.2005.1651219
Copyright © 2005–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL