Abstract
Unsolicited Bulk Email (UBE) still continues to successfully pass through the keyword-based and Artificial Intelligence (AI)-based filters due to the smart use of ‘word-salad’, ‘slang’ and ‘leet’ by the spammers to dilute as well as pollute the email text. Many research works account for the wastage of bandwidth and time of users as well as loss of money due to victimization to ‘next-of-kin’ type of UBE. This is the first formal attempt to present the quantified results on the calculations of averages for transaction amount offered, offered share of total amount, duration of transaction completion and total amount mentioned in such UBE. A peep is also provided on the identification of most frequently used first-names and surnames by the spammers. It is emphasized that this type of UBE does not ask for bank details and asks for money directly, unlike the many other types of UBE often confused with this type. On the side lines, the paper presents an interplay of scam and spam while providing useful statistical information for design of more robust spam email filters and blockers. A corpus of more than 1500 specific and only ‘next-of-kin’ type of spam emails has been used. It has been found that the average, respectively, for amount and share offered by the spammers is 10.64 million USD and 39.43% of the total amount. Only 5.57, 2.49 and 1.86% of the total number of spam emails mention the offered share, duration of transaction completion and total amount, respectively. The average transaction duration was 9 days while the average of total amount was found to be 134 million USD. ‘Aisha’ and ‘Kabore’ were the most frequent first-name and surname respectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lam, H., & Yeung, D. (2007). A learning approach to spam detection based on social networks. In Fourth Conference on Email and Anti-Spam (CEAS-2007).
Saini, J. R., & Desai, A. A. (2009). Self Learning Taxonomical Classification System using Vector Space Document Analysis Model for Web Text Mining in UBE, PhD Thesis accepted by Department of Computer Science. Surat, India: Veer Narmad South Gujarat University.
Isacenkova, J., Thonnard, O., Costin, A. et al. (2014). Inside the scam jungle: a closer look at 419 scam email operations. EURASIP Journal on Information Security, 4. https://doi.org/10.1186/1687-417X-2014-4.
Newman, L. H. (2020). Nigerian email scammers are more effective than ever. https://www.wired.com/story/nigerian-email-scammers-more-effective-than-ever/. Last accessed 02 Apr 2020.
Uemura, T., Ikeda, D., & Arimura, H. (2008). Unsupervised spam detection by document complexity estimation. In: J. F. Jean-Fran, M. R. Berthold & T. Horváth (Eds.), Discovery science. DS 2008. Lecture notes in computer science, (Vol 5255). Berlin, Heidelberg: Springer.
Kulkarni, P., & Saini, J. R. (2020). Identification of minimal email header features for discovery of email attachments. International Journal of Advanced Science and Technology, 29(6), 6242–6247.
Saini, J. R. (2012). Identification and analysis of most frequently occurring significant proper nouns in 419 Nigerian scams. National Journal of Computer Science and Technology, 4(1), 1–4.
Bibi, A., Latif, R., Khalid, S., Ahmed, W., Shabir, R. A., & Shahryar, T. (2020). Spam mail scanning using machine learning algorithm. Journal of Computers, 15(2), 73–84.
Venkatraman, S., Surendiran, B., & Raj, P. A. K. (2020). Spam e-mail classification for the internet of things environment using semantic similarity approach. The Journal of Supercomputing, 76(2), 756–776.
Al-Rawashdeh, G., Mamat, R., & Rahim, N. H. B. A. (2019). Hybrid water cycle optimization algorithm with simulated annealing for spam e-mail detection. IEEE Access, 7, 143721–143734.
Sanghani, G., & Kotecha, K. (2019). Incremental personalized E-mail spam filter using novel TFDCR feature selection with dynamic feature update. Expert Systems with Applications, Elsevier, 115, 287–299.
Mansourbeigi, S. M. H. (2019). Stochastic methods to find maximum likelihood for spam e-mail classification. AINA Workshops, 2019, 623–632.
Elshoush, H. T., & Dinar, E. A. (2019). Using adaboost and stochastic gradient descent (sgd) algorithms with R and orange software for filtering e-mail spam. CEEC, 2019, 41–46.
Saini, J. R., & Desai, A. A. (2011). Identification of non-lexicon non-slang unigrams in body-enhancement medicinal UBE. World Academy of Science, Engineering and Technology, 80(286), 1631–1637.
Saini, J. R., & Desai, A. A. (2011). Identification of most frequently occurring lexis in winnings-announcing unsolicited bulk e-mails. World Academy of Science, Engineering and Technology, 4(3), 172–176.
Kulkarni, P., Saini, J. R., & Acharya, H. (2020). Effect of header-based features on accuracy of classifiers for spam email classification. International Journal of Advanced Computer Science and Applications, 11(3), 396–401. https://doi.org/10.14569/IJACSA.2020.0110350.
Kulkarni, P., & Saini, J. R. (2020). A creation of bag of words using map reduce technique for ham email classification. International Journal of Advanced Science and Technology, 29(5), 715–721.
Rader, E., & Munasinghe, A. (2019). Wait, do i know this person?: Understanding misdirected email. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI’19), (Vol. 290, pp. 1–13). New York: ACM. doi:https://doi.org/10.1145/3290605.3300520.
Ho, P., Kim, H., & Kim, S. (2014). Application of sim-hash algorithm and big data analysis in spam email detection system. In Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems (RACS ’14), (pp. 242–246). New York: ACM. doi:https://doi.org/10.1145/2663761.2664221.
Wei, C., Sprague, A., Warner, G., & Skjellum, A. (2008). Mining spam email to identify common origins for forensic application. In Proceedings of the 2008 ACM symposium on Applied computing (SAC ’08), (pp. 1433–1437). New York: ACM. doi:https://doi.org/10.1145/1363686.1364019.
Li, W., Hershkop, S., & Stolfo, S. J. (2004). Email archive analysis through graphical visualization. In Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security (VizSEC/DMSEC ’04), (pp. 128–132). New York: ACM. doi:https://doi.org/10.1145/1029208.1029229.
Lehrfeld, M., Ogle, A., Franklin, B., & Dangler, J. (2014). Dimensioning SPAM: An in depth examination of why users click on deceptive emails. Journal of Computer Science College, 30(2), 213–219.
Lumezanu, C., & Feamster, N. (2012). Observing common spam in twitter and email. In 2012 Internet Measurement Conference (IMC’12), (pp. 461–466). New York: ACM. doi:https://doi.org/10.1145/2398776.2398824.
Fette, I., Sadeh, N., & Tomasic, A. (2007). Learning to detect phishing emails. In Proceedings of the 16th international conference on World Wide Web (WWW ’07), (pp. 649–656). New York: ACM. doi:https://doi.org/10.1145/1242572.1242660.
Atkins, B., & Huang, W. (2013). A study of social engineering in online frauds. Open Journal of Social Sciences, 1(3), 23–32.
Cummins, E. (2020). The Nigerian prince scam is still fooling people. Here’s why, https://www.popsci.com/story/technology/nigerian-prince-scam-social-engineering/. Last accessed 02 Apr 2020.
Nigerian Scams (2020). https://www.scamwatch.gov.au/types-of-scams/unexpected-money/nigerian-scams. Last accessed 02 Apr 2020.
Lin, T., Capecci, D. E., Ellis, D. M., Rocha, H. A., Dommaraju, S., Oliveira, D. S., & Ebner, N. C. (2019). Susceptibility to spear-phishing emails: effects of internet user demographics and email content. ACM Transactions on Computer—Human Interact, 26(5). doi:https://doi.org/10.1145/3336141.
Leonhardt, M. (2019). ‘Nigerian Prince’ email scams still rake in over $700,000 a year-here’s how to protect yourself. https://www.cnbc.com/2019/04/18/nigerian-prince-scams-still-rake-in-over-700000-dollars-a-year.html. Last accessed 07 Apr 2020.
Longe, O. B., Abayomi-Alli, A., Shaib, I. O. L., & Longe, F. A. (2009). Enhanced content analysis of fraudulent Nigeria electronic mails using e-STAT. In 2009 2nd International Conference on Adaptive Science & Technology (ICAST-2009), (pp. 238–243). Ghana: Acra.
Ibrahim, S. (2016). Causes of socioeconomic cybercrime in Nigeria. In 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF), (pp. 1–9). Vancouver: BC.
Saini, J. R., & Desai, A. A. (2010). A survey of classifications of unsolicited bulk emails. National Journal of Computer Science and Technology, 2(1), 33–39.
Saini, J. R., & Desai, A. A. (2010). A supervised machine learning approach with re-training for unstructured document classification in UBE. INFOCOMP Journal of Computer Science, 9(3), 30–41.
Saini, J. R., & Desai, A. A. (2010). Analysis of classifications of unsolicited bulk emails. World Academy of Science, Engineering and Technology, 4(2), 91–95.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Saini, J.R., Naik, S. (2021). Quantification of Multimillion Offers in ‘Next-of-Kin’ Unsolicited Bulk Emails. In: Fong, S., Dey, N., Joshi, A. (eds) ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 154. Springer, Singapore. https://doi.org/10.1007/978-981-15-8354-4_45
Download citation
DOI: https://doi.org/10.1007/978-981-15-8354-4_45
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-8353-7
Online ISBN: 978-981-15-8354-4
eBook Packages: EngineeringEngineering (R0)