Abstract
The identification of non-genuine or malicious messages poses a variety of challenges due to the continuous changes in the techniques utilised by cyber-criminals. In this article, we propose a hybrid detection method based on a combination of image and text spam recognition techniques. In particular, the former is based on sparse representation-based classification, which focuses on the global and local image features, and a dictionary learning technique to achieve a spam and a ham sub-dictionary. On the other hand, the textual analysis is based on semantic properties of documents to assess the level of maliciousness. More specifically, we are able to distinguish between meta-spam and real spam. Experimental results show the accuracy and potential of our approach.






Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Notes
This database is available at http://www.cs.jhu.edu/~mdredze/datasets/image_spam/.
References
Aharon M, Elad M, Bruckstein A (2006) K-SVD: an algorithm for designing overcomplete dictionaries for sparse representation. Signal Process IEEE Trans 54(11):4311–4322
Ahonen T, Hadid A, Pietikainen M (2006) Face description with local binary patterns: application to face recognition. Pattern Anal Mach Intell IEEE Trans 28(12):2037–2041
Al-Duwairi B, Khater I, Al-Jarrah O (2012) Detecting image spam using image texture features. Int J Inf Secur Res (IJISR) 2(3/4):344–353
Byun B, Lee C, Webb S, Pu C (2007) A discriminative classifier learning approach to image modeling and spam image identification. In: Proceedings of CEAS 2007
Castiglione A, De Santis A, Fiore U, Palmieri F (2012) An asynchronous covert channel using spam. Comput Math Appl 63(2):437–447
Castiglione A, De Santis A, Fiore U, Palmieri F (2011) E-mail-based covert channels for asynchronous message steganography.In: Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS)
Davis S, Craney G (2004) How Do I Stop Spam? http://www.spamhelp.org/articles/HowDoIStopSpam
Dredze M, Gevaryahu R, Elias-Bachrach A (2007) Learning fast classifiers for image spam. In: Proceedings of the Conference on Email and Anti-Spam (CEAS 2007), pp 487–493
Drucker H, Wu S, Vapnik VN (1999) Support vector machines for spam categorization. IEEE Trans Neural Netw 10(5)
Frey BJ, Dueck D (2007) Clustering by passing messages between data points. Science 315(5814):972–976
Fumera G, Pillai I, Roli F (2006) spam filtering based on the analysis of text information embedded into images. J Mach Learn Res 7:2699–2720
Ghit B, Voicu O, Pop F, Cristea V (2009) Distributed agent platform with intrusion detection capabilities.In: Proceedings of international conference on intelligent networking and collaborative systems (INCOS ’09 )
Hare JS, Sinclair PAS, Lewis PH, Martinez K, Enser PGB, Sandom CJ (2006) Bridging the semantic gap in multimedia information retrieval: topdown and bottom-up approaches.In: Proceedings of mastering the gap: from information extraction to semantic representation/3rd European Semantic Web Conference
Issac B, Raman V (2006) Spam detection proposal in regular and text-based image emails. In: 2006 IEEE Region 10 Conference TENCON, Hong Kong, pp 1–4
Kellett S (2005) Legislative Definition of Spam for New Zealand. http://www.victoria.ac.nz/law/research/publications/vuwlr/prev-issues/pdf/vol-36-2005/issue-3/kellet
Kreutz-Delgado K et al (2003) Dictionary learning algorithms for sparse representation. Neural Comput. 15(2):349–396
Kuropka D (2003) Modelle zur Reprasentation naturlichsprachlicher Dokumente. Logos Verlag, Berlin
Lee H et al (2006) Efficient sparse coding algorithms. In: Advances in neural information processing systems
Mairal J et al (2009) Online dictionary learning for sparse coding. In: Proceedings of the 26th Annual International Conference on Machine Learning. ACM
Mehta B et al (2008) Detecting image spam using visual features and near duplicate detection. In: Proceedings of the 17th international conference on World Wide Web. ACM
Menard S (2002) Applied logistic regression analysis. Vol. 106. Sage
Nhung, NP, Phuong TM (2007) An efficient method for filtering image-based spam. In: Research, Innovation and Vision for the Future, 2007 IEEE International Conference on IEEE
Nitin J, Bing L (2007) Review spam detection. In: Proceedings of the 16th International Conference on World Wide Web
Palmieri F, Fiore U, Castiglione A, De Santis A (2013) On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines. Appli Soft Comput 13(1):615–627
Palmieri F, Fiore U, Castiglione A (2014) A distributed approach to network anomaly detection based on independent component analysis. Concurr Comput Pract Exp 26(5)
Scholkopft B, Mullert KR (1999) Fisher discriminant analysis with kernels. Neural Netw Signal Process IX
Serbanescu V, Pop F, Cristea V, Antoniu G (2015) A formal method for rule analysis and validation in distributed data aggregation service. World Wide Web 18(6):1717–1736
Serbanescu V, Pop F, Cristea V, Antoniu G (2014) Architecture of distributed data aggregation service. In: Proceedings of IEEE 28th international conference on advanced information networking and applications (AINA)
Trovati M, Bessis N (2015) An influence assessment method based on co-occurrence for topologically reduced big data sets. Soft Comput. doi:10.1007/s00500-015-1621-9
Wertheimer M (2015) The Mathematics Community and the NSA, Notices of the AMS Volume 62, Number 2
Win ZM, Aye N (2013) Identification of image spam by using histogram and hough transform. Intern J Sci Res 2(11)
Youn S, McLeod D (2009) Improved spam filtering by extraction of information from text embedded image email. In: SAC 2009, ACM, Honolulu, pp. 1754–1755
Zhang C (2009) Image spam clustering: an unsupervised approach. In: Proceedings of the First ACM workshop on Multimedia in forensics. ACM
Zhang C et al (2009) A multimodal data mining framework for revealing common sources of spam images. J Multimed 4(5):313–320
Zhong J, Zhou Y, Deng W (2013) Filtering image-based Spam Using Multifractal analysis and active learning feedback-driven semi-supervised support vector machine. In: Conference Anthology, IEEE
Zhu M, Martinez AM (2006) Subclass discriminant analysis. Pattern Anal Mach Intell IEEE Trans 28(8):1274–1286
Acknowledgments
The paper is supported by the National Science Foundation of China (61171132), the Natural Science Foundation of Jiangsu Province (BK2015022392), the Talent Project of Jiangsu Province of China (2014WLW029), and the Technology Platform Projects of Nantong (CP2013001).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Communicated by V. Loia.
Rights and permissions
About this article
Cite this article
Shao, Y., Trovati, M., Shi, Q. et al. A hybrid spam detection method based on unstructured datasets. Soft Comput 21, 233–243 (2017). https://doi.org/10.1007/s00500-015-1959-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00500-015-1959-z