Detecting spam email using multiple spam classifiers

a classifier and spam technology, applied in the field of electronic mail or email, can solve the problems of unsolicited e-mail, received hundreds of unsolicited e-mails, and the use of e-mail has not come without its drawbacks

Inactive Publication Date: 2006-07-06
IBM CORP
View PDF3 Cites 128 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The use of e-mail, however, has not come without its drawbacks.
Almost as soon as e-mail technology emerged, so did unsolicited e-mail, also known as spam.
Reminiscent of excessive mass solicitations via postal services, facsimile transmissions, and telephone calls, an e-mail recipient may receive hundreds of unsolicited e-mails over a short period of time.
This results in a net loss of time, as workers must open and delete spam e-mails.
Unfortunately, spammers frequently invent new twists designed to ci

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detecting spam email using multiple spam classifiers
  • Detecting spam email using multiple spam classifiers
  • Detecting spam email using multiple spam classifiers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030]FIG. 1 is a block diagram showing a high-level network architecture according to an embodiment of the present invention. FIG. 1 shows an e-mail server 108 connected to a network 106. The e-mail server 108 provides e-mail services to a local area network (LAN) and is described in greater detail below. The e-mail server 108 comprises any commercially available e-mail server system that can be programmed to offer the functions of the present invention. FIG. 1 further shows an e-mail client 110, comprising a client application running on a client computer, operated by a user 104. The e-mail client 110 offers an e-mail application to the user 104 for handling and processing e-mail. The user 104 interacts with the e-mail client 110 to read and otherwise manage e-mail functions.

[0031]FIG. 1 further includes a spam detector 120 for processing e-mail messages and detecting unsolicited, or spam, e-mail, in accordance with one embodiment of the present invention. The spam detector 120 c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for detecting undesirable emails is disclosed. The method combines input from two or more spam classifiers to provide improved classification effectiveness and robustness. The method's effectiveness is improved over that of any one constituent classifier in the sense that the detection rate is increased and/or the false positive rate is decreased. The method's robustness is improved in the sense that, if spammers temporarily elude any one constituent classifier, the other constituent classifiers will still be likely to catch the spam. The method includes obtaining a score from each of a plurality of constituent spam classifiers by applying them to a given input email. The method further includes obtaining a combined spam score from a combined spam classifier that takes as input the plurality of constituent spam classifier scores, the combined spam classifier being computed automatically in accordance with a specified false-positive vs. false-negative tradeoff. The method further includes identifying the given input email as an undesirable email if the combined spam score indicates that the input e-mail is undesirable.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS [0001] Not Applicable. COPYRIGHT [0002] All of the material in this patent application is subject to copyright protection under the copyright laws of the United States and of other countries. As of the first effective filing date of the present application, this material is protected as unpublished material. However, permission to copy this material is hereby granted to the extent that the copyright owner has no objection to the facsimile reproduction by anyone of the patent documentation or patent disclosure, as it appears in the United States Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever. STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT [0003] Not Applicable. INCORPORATION BY REFERENCE OF MATERIAL SUBMITTED ON A COMPACT DISC [0004] Not Applicable. FIELD OF THE INVENTION [0005] The invention disclosed broadly relates to the field of electronic mail or e-mail and more ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F15/16
CPCG06Q10/107H04L12/585H04L51/12H04L51/212
Inventor RAJAN, VADAKKEDATHU T.WEGMAN, MARK N.SEGAL, RICHARD B.CRAWFORD, JASON L.KEPHART, JEFFREY O.HERSHKOP, SHLOMO
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products