Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment

  • Manabu Iwanaga
  • Toshihiro Tabata
  • Kouichi Sakurai
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3325)

Abstract

Bayesian filtering is one of the most famous anti-spam measures. However, there is no standard implementation for treatment of Japanese emails by Bayesian filtering. In this paper, we compare several conceivable ways to treat Japanese emails about tokenizing and corpus separation. In addition, we give experimental results and some knowledge obtained by the experiments.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Mozilla 1.3 Release Notes, modified (February 2004), http://www.mozilla.org/releases/mozilla1.3/
  2. 2.
    QUALCOMM Releases Eudora(R) 6.0 - Significant Version Upgrade with New Advanced Time-Saving Tools (September 2003), http://www.eudora.com/press/2003/090403.html
  3. 3.
    Help Prevent Junk E-Mail Messages with Outlook 2003 (April 2003), http://www.microsoft.com/office/editions/prodinfo/junkmail.mspx
  4. 4.
    Graham, P.: A Plan for Spam, http://paulgraham.com/spam.html
  5. 5.
  6. 6.
    Harris, E.: The Next Step in the Spam Control War: Greylisting (2003), http://projects.puremagic.com/greylisting/
  7. 7.
    Open relay database, http://www.ordb.org/
  8. 8.
    Sender Policy Framework, http://spf.pobox.com/
  9. 9.
    MTA Authentication Records in DNS, Internet-Draft (May 2004), http://xml.coverpages.org/draft-ietf-marid-core-01.txt
  10. 10.
  11. 11.
    Graham, P.: Better Bayesian Filtering. In: Spam conference, Boston, USA (January 2003), http://paulgraham.com/better.html
  12. 12.
    Yerazunis, W.: The Spam-Filtering Accuracy Plateau at 99.9% Accuracy and How to Get Past It. In: 2004 Spam Conference, Boston, USA (January 2004), http://crm114.sourceforge.net/PlateauPaper.pdf
  13. 13.
  14. 14.
    Gabber, E., Jakobsson, M., Matias, Y., Mayer, A.: Curbing Junk Email via secure Classification. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 198–213. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  15. 15.
    Hall, R.J.: Channels: Avoiding unwanted electronic mail. In: The 1996 DIMACS Symposium on Network Threats, Piscataway, USA, pp. 85–103 (1996)Google Scholar
  16. 16.
  17. 17.
    Jakobsson, M., Linn, J., Algesheimer, J.: How to Protect Against a Militant Spammer. Cryptology ePrint archive, report 2003/071 (2003)Google Scholar
  18. 18.
  19. 19.
  20. 20.
  21. 21.
  22. 22.
  23. 23.
  24. 24.
  25. 25.
    Multipurpose Internet Mail Extensions (MIME) Part Five: Conformance Criteria and Examples, RFC2049 (November 1996), http://www.ietf.org/rfc/rfc2049.txt

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Manabu Iwanaga
    • 1
  • Toshihiro Tabata
    • 2
  • Kouichi Sakurai
    • 2
  1. 1.Graduate School of Information Science and Electrical EngineeringKyushu UniversityJapan
  2. 2.Faculty of Information Science and Electrical EngineeringKyushu UniversityJapan

Personalised recommendations