Filtering Obfuscated Email Spam by means of Phonetic String Matching

  • Valerio Freschi
  • Andrea Seraghiti
  • Alessandro Bogliolo
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3936)


Rule-based email filters mainly rely on the occurrence of critical words to classify spam messages. However, perceptive obfuscation techniques can be used to elude exact pattern matching. In this paper we propose a new technique for filtering obfuscated email spam that performs approximate pattern matching both on the original message and on its phonetic transcription.


Pattern Match Critical Word Incoming Message Original Message Phonetic Transcription 
These keywords were added by machine and not by the authors.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Damerau, F.: A technique for computer detection and error correction of spelling errors. Comm. of the ACM 7(3), 171–176 (1964)CrossRefGoogle Scholar
  2. 2.
    Gusfield, D.: Algorithms on Strings, Trees, and Sequences. Cambridge University Press, Cambridge (1999)MATHGoogle Scholar
  3. 3.
    Hochberg, J., Mniszewski, S.M., Calleja, T., Papcun, G.J.: A default hierarchy for pronouncing English. IEEE Trans. on Pattern Matching and Machine Intelligence 13, 957–964 (1991)Google Scholar
  4. 4.
    Lee, H., Ng, A.Y.: Spam deobfuscation using a Hidden Markov Model. In: Proceedings of the Second Conference on Email and Anti-Spam, CEAS 2005 (2005)Google Scholar
  5. 5.
    Rigoutsos, I., Huynh, T.: Chung-Kwei: a pattern-discovery-based system for the automatic identification of unsolicited E-mail messages (SPAM). In: Proceedings First Conference on Email and Anti-Spam, CEAS 2004 (2005)Google Scholar
  6. 6.
    Sahami, M., Dumais, S., Heckerman, D., Horvitz, E.: A Bayesian approach to filtering junk E-Mail. In: Proceedings of AAAI 1998 Workshop on Learning for Text Categorization (1998)Google Scholar
  7. 7.
  8. 8.
    Stolfo, S., Hershkop, S., Wang, K., Nimeskern, O., Hu, C.W.: A Behavior-Based Approach to Securing Email Systems. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol. 2776, pp. 57–81. Springer, Heidelberg (2003)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Valerio Freschi
    • 1
  • Andrea Seraghiti
    • 1
  • Alessandro Bogliolo
    • 1
  1. 1.STI – University of UrbinoUrbinoItaly

Personalised recommendations