Skip to main content

Study on Transformed Keywords Identification in Spam Filtering

  • Conference paper
Trustworthy Computing and Services (ISCTCS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 320))

Included in the following conference series:

  • 3145 Accesses

Abstract

By means of Active-Jamming, spammers deform original keywords into a variety of deformation, which can escape from the traditional filtering based on original keywords matching. In order to identify the transformed keywords, a comprehensive summary of the deformations and corresponding solutions for each case is put forward. Based on the summary, a transformed keywords identification scheme is designed specific to three broad categories. And a technique based on character co-occurrence is proposed to identify the transformed keywords in a flexible way, in which the bidirectional-ranged searching is innovatively put forward.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fumera, G., Pillai, I., Roli, F.: Spam Filtering Based on the Analysis of Text Information Embedded Into Images. Journal of Machine Learning Research (2006)

    Google Scholar 

  2. Subramaniam, T., Jalab, H.A., Taqa, A.Y.: Overview of textual anti-spam filtering techniques. International Journal of the Physical Sciences 5(12), 1869–1882 (2010) (in Chinese)

    Google Scholar 

  3. Beik, A.J.G., Abadi, A.H.: Anti-Spam Filtering keyword-based and multi agent method with personal E-mail messages on the basis of interests of user. Canadian Journal on Artificial Intelligence, Machine Learning and Pattern Recognition 2(4) (May 2011)

    Google Scholar 

  4. Luo, W., Gao, F., Zhou, X.: Summary of Chinese Anti-Active-Jamming Filters. Journal of Jishou University (Natural Science Edition) (May 2011) (in Chinese)

    Google Scholar 

  5. Chen, R., Zhang, Y., Liu, T.: Information Filtering for Modified Specific Chinese Information. High Technology Letters (2005) (in Chinese)

    Google Scholar 

  6. Zhou, X., Zhang, H.: Flexible Pattern Matching Algorithm for Anti-Active-Jamming in Chinese String. J. Wuhan Univ. (Nat. Sci. Ed.) 55(1) (2009) (in Chinese)

    Google Scholar 

  7. Shuai, Z., Zhou, X.: Research and Implementation of Content Flexible Filter in Chinese Webpage. Computer & Digital Engineer 37(11) (2009) (in Chinese)

    Google Scholar 

  8. Shen, X.: Preface of Shuowen. Han Dynasty 100 AD (in Chinese)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xiong, D., Yan, Z., Li, A. (2013). Study on Transformed Keywords Identification in Spam Filtering. In: Yuan, Y., Wu, X., Lu, Y. (eds) Trustworthy Computing and Services. ISCTCS 2012. Communications in Computer and Information Science, vol 320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35795-4_87

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35795-4_87

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35794-7

  • Online ISBN: 978-3-642-35795-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics