Skip to main content

Spam Filtering Using Automated Classifying Services over a Cloud Computing Infrastructure

  • Conference paper
  • First Online:
Innovative Security Solutions for Information Technology and Communications (SECITC 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9522))

Included in the following conference series:

  • 1220 Accesses

Abstract

Together with the increase in size of Internet technologies and coped with the need for instant communication between people, unsolicited messages or spam messages represent a serious problem for most system administrators and users. This problem permits the usage of various technologies and techniques in order to solve it and filter volumes of thousands of email messages per day.

In this article we present a new solution for spam detection and classification, based on a Cloud supported infrastructure of a service oriented architecture. Our implementation is able to scan and classify a large stream of emails. We also prove that the architecture is scalable across multiple datacenter nodes and it is able to handle a continuous flux of emails, keeping users configuration a top priority.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Spam Messages Report. http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_main_report_v19_21291018.en-us.pdf

  2. Androutsopoulos, I., Koutsias, J., Chandrinos, K.V., Spyropoulos, C.D.: An experimental comparison of naive bayesian and keyword-based anti-spam filtering with personal e-mail messages. In: Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Athens, Greece (2000)

    Google Scholar 

  3. Kolcz, A., Bond, M., Sargent, J.: The challenges of service-side personalized spam filtering: scalability and beyond. In: Proceedings of the 1st International Conference on Scalable Information Systems, Hong Kong (2006)

    Google Scholar 

  4. Li, K., Zhong, Z.: Fast statistical spam filter by approximate classifications. In: Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, Saint Malo, France (2006)

    Google Scholar 

  5. Aun, M.T.B., Goi, B.-M., Kim, V.T.H.: Cloud enabled spam filtering services: challenges and opportunities. In: Sustainable Utilization and Development in Engineering and Technology (2011)

    Google Scholar 

  6. Salah, K., Calero, J.M.A., Zeadally, S., Al-Mulla, S., Alzaabi, M.: Using cloud computing to implement a security overlay network. IEEE Secur. Priv. 11(1), 44–53 (2013)

    Google Scholar 

  7. Check Point Anti-Spam & Email Security Software Blade, Symantec Hosted Service. https://hostedendpoint.spn.com

  8. Zscaler Web Security Service. http://www.zscaler.com/product-cloud-security/web-security.php

  9. FortiGuard Antispam Service. http://www.fortinet.com/support/fortiguard_services/antispam.html

  10. http://www.checkpoint.com/products/anti-spam-email-security-software-blade/

  11. Murphy, K.P.: Machine Learning: A Probabilistic Perspective. MIT Press, Cambridge (2012). ISBN: 0262018020, 9780262018029

    MATH  Google Scholar 

  12. Pătraşcu, A., Leordeanu, C., Dobre, C., Cristea, V.: ReC\(^{2}\)S: reliable cloud computing system. In: European Concurrent Engineering Conference, Bucharest (2012)

    Google Scholar 

  13. Gregory, P.H., Simon, M.: Blocking Spam and Spyware For Dummies. Wiley, Indianapolis (2005). ISBN-10: 0764575910, ISBN-13: 978–0764575914

    Google Scholar 

  14. McGregor, C.: Controlling Spam with SpamAssassin. Linux Journal, Vol. 153 (2007)

    Google Scholar 

  15. Spamcop.net - beware of cheap imitations. http://www.spamcop.net/

  16. Blanzieri, E., Bryl, A.: A survey of learning-based techniques of email spam filtering. Artif. Intell. Rev. 29(1), 63–92 (2008)

    Article  Google Scholar 

  17. Weinbrenner, S., Giemza, A., Hoppe, H.U.: Engineering heterogenous distributed learning environments using tuple spaces as an architectural platform. In: Proceedings of the 7th IEEE International Conference on Advanced Learning Technologies (2007)

    Google Scholar 

  18. Schneider, K.-M.: A comparison of event models for naive bayes anti-spam e-mail filtering. In: Proceedings of 10th Conference of the European Chapter of the Association for Computational Linguistics, Budapest, Hungary (2003)

    Google Scholar 

  19. Linux Containers. https://linuxcontainers.org/

Download references

Acknowledgment

This paper has been financially supported within the project entitled “Horizon 2020 - Doctoral and Postdoctoral Studies: Promoting the National interest through Excellence, Competitiveness and Responsibility in the Field of Romanian Fundamental and Applied Scientific Research”, contract number POSDRU/159/1.5/S/140106. This project is co-financed by European Social Fund through the Sectoral Operational Programme for Human Resources Development 2007–2013. Investing in people!

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alecsandru Pătraşcu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Pătraşcu, A., Bica, I., Patriciu, V.V. (2015). Spam Filtering Using Automated Classifying Services over a Cloud Computing Infrastructure. In: Bica, I., Naccache, D., Simion, E. (eds) Innovative Security Solutions for Information Technology and Communications. SECITC 2015. Lecture Notes in Computer Science(), vol 9522. Springer, Cham. https://doi.org/10.1007/978-3-319-27179-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27179-8_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27178-1

  • Online ISBN: 978-3-319-27179-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics