Skip to main content

Quantification of Multimillion Offers in ‘Next-of-Kin’ Unsolicited Bulk Emails

  • Conference paper
  • First Online:
ICT Analysis and Applications

Abstract

Unsolicited Bulk Email (UBE) still continues to successfully pass through the keyword-based and Artificial Intelligence (AI)-based filters due to the smart use of ‘word-salad’, ‘slang’ and ‘leet’ by the spammers to dilute as well as pollute the email text. Many research works account for the wastage of bandwidth and time of users as well as loss of money due to victimization to ‘next-of-kin’ type of UBE. This is the first formal attempt to present the quantified results on the calculations of averages for transaction amount offered, offered share of total amount, duration of transaction completion and total amount mentioned in such UBE. A peep is also provided on the identification of most frequently used first-names and surnames by the spammers. It is emphasized that this type of UBE does not ask for bank details and asks for money directly, unlike the many other types of UBE often confused with this type. On the side lines, the paper presents an interplay of scam and spam while providing useful statistical information for design of more robust spam email filters and blockers. A corpus of more than 1500 specific and only ‘next-of-kin’ type of spam emails has been used. It has been found that the average, respectively, for amount and share offered by the spammers is 10.64 million USD and 39.43% of the total amount. Only 5.57, 2.49 and 1.86% of the total number of spam emails mention the offered share, duration of transaction completion and total amount, respectively. The average transaction duration was 9 days while the average of total amount was found to be 134 million USD. ‘Aisha’ and ‘Kabore’ were the most frequent first-name and surname respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lam, H., & Yeung, D. (2007). A learning approach to spam detection based on social networks. In Fourth Conference on Email and Anti-Spam (CEAS-2007).

    Google Scholar 

  2. Saini, J. R., & Desai, A. A. (2009). Self Learning Taxonomical Classification System using Vector Space Document Analysis Model for Web Text Mining in UBE, PhD Thesis accepted by Department of Computer Science. Surat, India: Veer Narmad South Gujarat University.

    Google Scholar 

  3. Isacenkova, J., Thonnard, O., Costin, A. et al. (2014). Inside the scam jungle: a closer look at 419 scam email operations. EURASIP Journal on Information Security, 4. https://doi.org/10.1186/1687-417X-2014-4.

  4. Newman, L. H. (2020). Nigerian email scammers are more effective than ever. https://www.wired.com/story/nigerian-email-scammers-more-effective-than-ever/. Last accessed 02 Apr 2020.

  5. Uemura, T., Ikeda, D., & Arimura, H. (2008). Unsupervised spam detection by document complexity estimation. In: J. F. Jean-Fran, M. R. Berthold & T. Horváth (Eds.), Discovery science. DS 2008. Lecture notes in computer science, (Vol 5255). Berlin, Heidelberg: Springer.

    Google Scholar 

  6. Kulkarni, P., & Saini, J. R. (2020). Identification of minimal email header features for discovery of email attachments. International Journal of Advanced Science and Technology, 29(6), 6242–6247.

    Google Scholar 

  7. Saini, J. R. (2012). Identification and analysis of most frequently occurring significant proper nouns in 419 Nigerian scams. National Journal of Computer Science and Technology, 4(1), 1–4.

    Google Scholar 

  8. Bibi, A., Latif, R., Khalid, S., Ahmed, W., Shabir, R. A., & Shahryar, T. (2020). Spam mail scanning using machine learning algorithm. Journal of Computers, 15(2), 73–84.

    Article  Google Scholar 

  9. Venkatraman, S., Surendiran, B., & Raj, P. A. K. (2020). Spam e-mail classification for the internet of things environment using semantic similarity approach. The Journal of Supercomputing, 76(2), 756–776.

    Article  Google Scholar 

  10. Al-Rawashdeh, G., Mamat, R., & Rahim, N. H. B. A. (2019). Hybrid water cycle optimization algorithm with simulated annealing for spam e-mail detection. IEEE Access, 7, 143721–143734.

    Article  Google Scholar 

  11. Sanghani, G., & Kotecha, K. (2019). Incremental personalized E-mail spam filter using novel TFDCR feature selection with dynamic feature update. Expert Systems with Applications, Elsevier, 115, 287–299.

    Article  Google Scholar 

  12. Mansourbeigi, S. M. H. (2019). Stochastic methods to find maximum likelihood for spam e-mail classification. AINA Workshops, 2019, 623–632.

    Google Scholar 

  13. Elshoush, H. T., & Dinar, E. A. (2019). Using adaboost and stochastic gradient descent (sgd) algorithms with R and orange software for filtering e-mail spam. CEEC, 2019, 41–46.

    Google Scholar 

  14. Saini, J. R., & Desai, A. A. (2011). Identification of non-lexicon non-slang unigrams in body-enhancement medicinal UBE. World Academy of Science, Engineering and Technology, 80(286), 1631–1637.

    Google Scholar 

  15. Saini, J. R., & Desai, A. A. (2011). Identification of most frequently occurring lexis in winnings-announcing unsolicited bulk e-mails. World Academy of Science, Engineering and Technology, 4(3), 172–176.

    Google Scholar 

  16. Kulkarni, P., Saini, J. R., & Acharya, H. (2020). Effect of header-based features on accuracy of classifiers for spam email classification. International Journal of Advanced Computer Science and Applications, 11(3), 396–401. https://doi.org/10.14569/IJACSA.2020.0110350.

    Article  Google Scholar 

  17. Kulkarni, P., & Saini, J. R. (2020). A creation of bag of words using map reduce technique for ham email classification. International Journal of Advanced Science and Technology, 29(5), 715–721.

    Google Scholar 

  18. Rader, E., & Munasinghe, A. (2019). Wait, do i know this person?: Understanding misdirected email. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI’19), (Vol. 290, pp. 1–13). New York: ACM. doi:https://doi.org/10.1145/3290605.3300520.

  19. Ho, P., Kim, H., & Kim, S. (2014). Application of sim-hash algorithm and big data analysis in spam email detection system. In Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems (RACS ’14), (pp. 242–246). New York: ACM. doi:https://doi.org/10.1145/2663761.2664221.

  20. Wei, C., Sprague, A., Warner, G., & Skjellum, A. (2008). Mining spam email to identify common origins for forensic application. In Proceedings of the 2008 ACM symposium on Applied computing (SAC ’08), (pp. 1433–1437). New York: ACM. doi:https://doi.org/10.1145/1363686.1364019.

  21. Li, W., Hershkop, S., & Stolfo, S. J. (2004). Email archive analysis through graphical visualization. In Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security (VizSEC/DMSEC ’04), (pp. 128–132). New York: ACM. doi:https://doi.org/10.1145/1029208.1029229.

  22. Lehrfeld, M., Ogle, A., Franklin, B., & Dangler, J. (2014). Dimensioning SPAM: An in depth examination of why users click on deceptive emails. Journal of Computer Science College, 30(2), 213–219.

    Google Scholar 

  23. Lumezanu, C., & Feamster, N. (2012). Observing common spam in twitter and email. In 2012 Internet Measurement Conference (IMC’12), (pp. 461–466). New York: ACM. doi:https://doi.org/10.1145/2398776.2398824.

  24. Fette, I., Sadeh, N., & Tomasic, A. (2007). Learning to detect phishing emails. In Proceedings of the 16th international conference on World Wide Web (WWW ’07), (pp. 649–656). New York: ACM. doi:https://doi.org/10.1145/1242572.1242660.

  25. Atkins, B., & Huang, W. (2013). A study of social engineering in online frauds. Open Journal of Social Sciences, 1(3), 23–32.

    Article  Google Scholar 

  26. Cummins, E. (2020). The Nigerian prince scam is still fooling people. Here’s why, https://www.popsci.com/story/technology/nigerian-prince-scam-social-engineering/. Last accessed 02 Apr 2020.

  27. Nigerian Scams (2020). https://www.scamwatch.gov.au/types-of-scams/unexpected-money/nigerian-scams. Last accessed 02 Apr 2020.

  28. Lin, T., Capecci, D. E., Ellis, D. M., Rocha, H. A., Dommaraju, S., Oliveira, D. S., & Ebner, N. C. (2019). Susceptibility to spear-phishing emails: effects of internet user demographics and email content. ACM Transactions on Computer—Human Interact, 26(5). doi:https://doi.org/10.1145/3336141.

  29. Leonhardt, M. (2019). ‘Nigerian Prince’ email scams still rake in over $700,000 a year-here’s how to protect yourself. https://www.cnbc.com/2019/04/18/nigerian-prince-scams-still-rake-in-over-700000-dollars-a-year.html. Last accessed 07 Apr 2020.

  30. Longe, O. B., Abayomi-Alli, A., Shaib, I. O. L., & Longe, F. A. (2009). Enhanced content analysis of fraudulent Nigeria electronic mails using e-STAT. In 2009 2nd International Conference on Adaptive Science & Technology (ICAST-2009), (pp. 238–243). Ghana: Acra.

    Google Scholar 

  31. Ibrahim, S. (2016). Causes of socioeconomic cybercrime in Nigeria. In 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF), (pp. 1–9). Vancouver: BC.

    Google Scholar 

  32. Saini, J. R., & Desai, A. A. (2010). A survey of classifications of unsolicited bulk emails. National Journal of Computer Science and Technology, 2(1), 33–39.

    Google Scholar 

  33. Saini, J. R., & Desai, A. A. (2010). A supervised machine learning approach with re-training for unstructured document classification in UBE. INFOCOMP Journal of Computer Science, 9(3), 30–41.

    Google Scholar 

  34. Saini, J. R., & Desai, A. A. (2010). Analysis of classifications of unsolicited bulk emails. World Academy of Science, Engineering and Technology, 4(2), 91–95.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jatinderkumar R. Saini .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Saini, J.R., Naik, S. (2021). Quantification of Multimillion Offers in ‘Next-of-Kin’ Unsolicited Bulk Emails. In: Fong, S., Dey, N., Joshi, A. (eds) ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 154. Springer, Singapore. https://doi.org/10.1007/978-981-15-8354-4_45

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-8354-4_45

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-8353-7

  • Online ISBN: 978-981-15-8354-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics