Awareness Based Approach against E-Mail Attacks

  • Gaurav Kumar Tak
  • Gaurav Ojha
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 176)


E-mail plays a very important role in modern day communication. It is helpful for personal as well as business correspondences between people, or organizations. The major features of E-mail, which make it a convenient mode of communication, are its speed, efficiency, storage options and search facilities. Due to the high popularity of E-mails, it forms the preferred medium for a large number of web attacks. Spammers usually send spams and phishers send phishing URLs via E-mail. Of the large number of techniques that have already been proposed for the detection of several types of such attacks, quite a few of them provide good results but with higher false positives. In this paper, we are proposing a novel technique, which not only identifies spam but also scam mails, phishing, advertisements, etc. This technique utilizes some intelligence on the part of users, apart from keywords parsing, knowledge base, and token separation methods to detect various E-mail attacks. Implementation of the proposed methodology can help protect E-mail users from a wide range of unwanted E-mails, with increased efficiency and highly reduced number of false positives.


Phishing Scam Spams Social networking Subscription 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Tak, G.K., Tapaswi, S.: Knowledge Base Compound Approach towards Spam Detection. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) CNSA 2010. Part 2. CCIS, vol. 89, pp. 490–499. Springer, Heidelberg (2010), doi:10.1007/978-3-642-14478-3_49CrossRefGoogle Scholar
  2. 2.
    Tak, G.K., Tapaswi, S.: Query Based Approach towards Spam Attacks using Artificial Neural Networks. International Journal of Artificial Intelligence & Applications, IJAIA (2010) ISSN: 09762191, EISSN: 0975900X, Academy & Industry Research Collaboration CenterGoogle Scholar
  3. 3.
    Saraubon, K., Limthanmaphon, B.: Fast Effective Botnet Spam Detection. In: 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology, ICCIT, pp. 1066–1070 (2009)Google Scholar
  4. 4.
    Tak, G.K., Kakkar, A.: Demand based approach to control data load on email servers. In: Tiwari, M.D., Tripathi, R.C., Agrawal, A. (eds.) Proceedings of the First International Conference on Intelligent Interactive Technologies and Multimedia (IITM 2010), pp. 266–270. ACM, New York (2010),, doi:10.1145/1963564.1963611CrossRefGoogle Scholar
  5. 5.
    PHP, AJAX, MySQL and JavaScript Tutorials,
  6. 6.
    Naramore, E., Gerner, J., Scouarnec, Y.L., Stolz, J., Glass, M.K.: Beginning PHP5, Apache and MySQL Web Development ISBN: 9780764579660 Google Scholar
  7. 7.
    Yang, Y., Elfayoumy, S.: Anti-spam filtering using neural networks and Bayesian classifiers. In: Proceedings of the 2007 IEEE International Symposium on Computational Intelligence in Robotics and Automation, Jacksonville, FL, USA (2007)Google Scholar
  8. 8.
    Pantel, P., Spamcop, D.L.: A spam classification and organization program. Learning for Text Categorization, Papers from the 2006 Workshop, Madison, Wisconsin, AAAI Technical Report (2006)Google Scholar
  9. 9.
    Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, San Francisco (1999)Google Scholar
  10. 10.
    Sakkis, G., Androutsopoulos, I., Paliouras, G.: A memory based approach to anti-spam filtering. Information Retrieval 6, 49–73 (2003)CrossRefGoogle Scholar
  11. 11.
    Rathore, S.K., Jassi, P., Agarwal, B.: A New Probability based Analysis for Recognition of Unwanted Emails. International Journal of Computer Applications 28(4), 6–9 (2011); Published by Foundation of Computer Science, New York, USA (2011) CrossRefGoogle Scholar
  12. 12.
    Chiu, Y.-F., Chen, C.-M., Jeng, B., Lin, H.-C.: An Alliance-based Anti-Spam Approach. In: Third International Conference on Natural Computation (ICNC 2007). IEEE (2007)Google Scholar
  13. 13.
    De Capitani, D., Damiani, E., De Vimercati, S., Capitani, P., Samarati, P.: An Open Digest-Based Technique for Spam Detection. In: Proceedings of International Workshop on Security in Parallel and Distributed Systems (2004)Google Scholar
  14. 14.
    O’Donnell, A.J., Mankowski, W., Abrahamson, J.: Using E-mail Social Network Analysis for Detecting unauthorized accounts. In: Third Conference on Email and Anti-Spam, Mountain View, CA (July 2006)Google Scholar
  15. 15.
    Boykin, P.O., Roychowdhury, V.P.: Leveraging Social Networks to fight spam. Computer 38(4), 61–68 (2005)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Sahami, M., Dumais, S., Heckerman, D., Horvitz, E.: Bayesian approach to filtering junk E-mail. Learning for Text Categorization, Papers from the 1998 Workshop, Madison, Wisconsin (1998)Google Scholar
  17. 17.
    Jindal, N., Liu, B.: Analyzing and Detecting Review Spam. In: Seventh IEEE International Conference on Data Mining (ICDM), IEEE (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Gaurav Kumar Tak
    • 1
  • Gaurav Ojha
    • 2
  1. 1.School of Computer Science & Information TechnologyLovely Professional UniversityPhagwaraIndia
  2. 2.Department of Information TechnologyIndian Institute of Information Technology and ManagementGwaliorIndia

Personalised recommendations