SlideShare a Scribd company logo
Carlos Laorden
WHAT YOU
GOT, THEN? SPAM, EGG,
SPAM, SPAM,
BACON AND
SPAM.
SPAM, SPAM,
SPAM, BAKED
BEANS AND
SPAM.
ANYTHING
WITHOUT
SPAM?
I DON’T
LIKE
SPAM!!
UGH!
Meet the real SPiced hAM
Monty Python’s Flying Circus
Something that repeats and
repeats until being annoying
It is a
real problem
for Information Security
Billions of daily losses in
productivity
Infected computers
Stolen credentials
Collective Classification for Spam Filtering - CISIS 2011
We must
fight
Anti-spam methods
Pre-sending
New
protocols
Post-sending
Increase sending
costs
Increase risks
for spammers
E-mail
sender
E-mail
content
E-mail
content
Usually
supervised
approaches
A significant
labelling work
is needed
Usually
supervised
approaches
Link structure among documents
Collective Classification
no interest this
SpamAssassin word has
this has Ling Spam no
interest word
Empirical evaluation
SpamAssassin
Ling Spamt1
t2
t3
D1
D2
D10
D3
D9
D4
D7
D8
D5
D11
D6
0.65
0.70
0.75
0.80
0.85
0.90
0.95
1.00
10% 20% 30% 40% 50% 60% 70% 80% 90%
Collective KNN, k=10
Collective Forest
Collective Woods
Random Woods
Precision
0.10
0.20
0.30
0.40
0.50
0.60
0.70
0.80
0.90
1.00
10% 20% 30% 40% 50% 60% 70% 80% 90%
Collective KNN, k=10
Collective Forest
Collective Woods
Random Woods
Recall
0.55
0.60
0.65
0.70
0.75
0.80
0.85
0.90
0.95
1.00
10% 20% 30% 40% 50% 60% 70% 80% 90%
Collective KNN, k=10
Collective Forest
Collective Woods
Random Woods
AUC
Suitable to
overcome the amount
of unclassified spam e-mails
Will we see
the END of spam?
95%
“Solution to spam”
Cut their billing
systems?
Collective Classification for Spam Filtering - CISIS 2011
Collective Classification for Spam Filtering - CISIS 2011
Collective Classification for Spam Filtering - CISIS 2011
References
1. Monty Python – Spam:
http://www.youtube.com/watch?v=anwy2MPT5RE
2. Spam wall by freezelight:
http://www.flickr.com/photos/63056612@N00/155554663/
3. monty python flying circus by the_d8_show:
http://www.flickr.com/photos/8056839@N04/478599790/
4. Dollars: http://vegasgravy.com/News-detail/two-women-
caught-for-transporting-drug-money-from-vegas/dollars/
5. Day 97: Infected by dustywrath:
http://www.flickr.com/photos/10921499@N07/2187318683
6. my bank sucks by B Rosen:
http://www.flickr.com/photos/rosengrant/3537904106/
7. Interlinked documents:
http://zhangruiyanz.blogspot.com.es/
8. Honeycomb: http://desktop-
wallpapers.net/3d/Honeycomb.html
9. Feet on table: http://bisystembuilders.com/wp-
content/uploads/2010/02/shutterstock_feet-on-table.jpg
10. Buried on bills: http://getupkids.net/wp-
content/uploads/2013/06/debt_piling.jpg
11. Kill spam: http://www.email-marketing-wizard.com/wp-
content/uploads/2010/03/spammer.jpg

More Related Content

PDF
Anomaly-based Spam Filtering - SECRYPT 2011
PDF
On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...
PPTX
Enhancing Scalability in Anomaly-based Email Spam Filtering - CEAS 2011
PPT
ASSP: Extracting the Ham from Spam -- by David J. Young
PDF
A review of spam filtering and measures of antispam
PDF
Spam – The Evolution
PDF
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
PDF
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Anomaly-based Spam Filtering - SECRYPT 2011
On the Study of Anomaly-based Spam Filtering Using Spam as Representation of ...
Enhancing Scalability in Anomaly-based Email Spam Filtering - CEAS 2011
ASSP: Extracting the Ham from Spam -- by David J. Young
A review of spam filtering and measures of antispam
Spam – The Evolution
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...

Similar to Collective Classification for Spam Filtering - CISIS 2011 (20)

PDF
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
PDF
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
PDF
Analysis of an image spam in email based on content analysis
PDF
Spam Filtering
PDF
E-Mail Security Using Spam Mail Detection and Filtering System
PDF
E-Mail Security Using Spam Mail Detection and Filtering System
PPT
Spam Wars
PDF
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
DOCX
Spam!
PPT
Fang feb-17
DOCX
Final paper
PPT
E mail image spam filtering techniques
DOCX
Watch out!
PPT
83517754.ppt
DOC
Survey on spam filtering
PPT
83517754.ppt
PPT
Spam and Anti-spam - Sudipta Bhattacharya
PDF
SPAM FILTERS
PDF
Evaluating and Implementing Anti-Spam Solutions
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Spam Detection in Social Networks Using Correlation Based Feature Subset Sele...
Analysis of an image spam in email based on content analysis
Spam Filtering
E-Mail Security Using Spam Mail Detection and Filtering System
E-Mail Security Using Spam Mail Detection and Filtering System
Spam Wars
AN ANALYSIS OF EFFECTIVE ANTI SPAM PROTOCOL USING DECISION TREE CLASSIFIERS
Spam!
Fang feb-17
Final paper
E mail image spam filtering techniques
Watch out!
83517754.ppt
Survey on spam filtering
83517754.ppt
Spam and Anti-spam - Sudipta Bhattacharya
SPAM FILTERS
Evaluating and Implementing Anti-Spam Solutions
Ad

More from Carlos Laorden (7)

PDF
Collective Classification for Packed Executable Identification - CEAS 2011
PDF
Collective classification for unknown malware detection - SECRYPT 2011
PDF
Puma: Permission Usage to detect Malware in Android - CISIS 2012
PPTX
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...
PPTX
Negobot: A conversational agent based on game theory for the detection of pae...
PDF
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
PDF
Twitter Content-based Spam Filtering - CISIS 2013
Collective Classification for Packed Executable Identification - CEAS 2011
Collective classification for unknown malware detection - SECRYPT 2011
Puma: Permission Usage to detect Malware in Android - CISIS 2012
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Netw...
Negobot: A conversational agent based on game theory for the detection of pae...
Anomaly Detection using String Analysis for Android Malware Detection - CISIS...
Twitter Content-based Spam Filtering - CISIS 2013
Ad

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Machine Learning_overview_presentation.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Electronic commerce courselecture one. Pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Cloud computing and distributed systems.
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Approach and Philosophy of On baking technology
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
MYSQL Presentation for SQL database connectivity
Machine Learning_overview_presentation.pptx
Programs and apps: productivity, graphics, security and other tools
MIND Revenue Release Quarter 2 2025 Press Release
Mobile App Security Testing_ A Comprehensive Guide.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation_ Review paper, used for researhc scholars
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Unlocking AI with Model Context Protocol (MCP)
Electronic commerce courselecture one. Pdf
The AUB Centre for AI in Media Proposal.docx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Cloud computing and distributed systems.
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Building Integrated photovoltaic BIPV_UPV.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Spectral efficient network and resource selection model in 5G networks
Approach and Philosophy of On baking technology
sap open course for s4hana steps from ECC to s4
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

Collective Classification for Spam Filtering - CISIS 2011

Editor's Notes

  • #2: [click]
  • #6: After that, the internet community associated the term spam to repeated and annoying messages.So, next time you receive an e-mail message of a pharmaceutical company offering you viagra, and you think about the mother or father of spam, think about Hormel Foods.[click]
  • #8: Causing billion dollar losses daily around the world for lack of productivity[click]
  • #9: Infecting millions of computers[click]
  • #10: And affecting users who lose money as result of stolen credentials[click]
  • #11: For each 5 mails sent,[click]4 are spam.[click]
  • #29: and fight it everyway we can.
  • #30: and fight this serious problem everyway we can.