6
@ IJTSRD | Available Online @ www ISSN No: 245 Inte R E-Mail Sec Spam E-m Departme G.K.M. College of Eng ABSTRACT Email has turned out to be a standou most essential types of correspond everybody utilizes email. Ordinary messages are being passed around an messages are additionally sent. Spam essentially messages that are intended item or benefit and are conveyed in m email addresses. Spam is a major issue from the individual home Internet clien national organization that relies on correspondences to direct business. Not it a disturbance, it can likewise show a s to our system. It requires a great deal of sift through the spam from which are t Spam shirking is vital from a security v point is to locate the best strategy importance of the email is coming in w misclassification rate. Keywords: Spam, Machine Learning Te INTRODUCTION As the Internet keeps on developing, better approaches for correspondence. U is subsequently the significant action wh Internet. This type of correspondence s large number of clients worldwide insi in any case, this opportunity of correspo abused. Over the most recent few yea turned into a marvel that undermines the of correspondence by means of e-mail. S the spring of 1978 by a man named. Ga needed everybody to think about h company. w.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 56 - 6470 | www.ijtsrd.com | Volum ernational Journal of Trend in Sc Research and Development (IJT International Open Access Journ curity Algorithm to Filter Out mails using Machine Learning R. Aswin, E. Ganesh, M. Babu ent of Computer Science and Engineering, gineering and Technology, Chennai, Tamil Nadu ut amongst the dence. Lately, y billions of nd many spam messages are to advance an mass to various for everybody nt to the multi - n upon email t exclusively is security danger f investment to truly essential. viewpoint. The to decide the with the littlest echniques it has opened Utilizing email hen surfing the scopes out to a ide a moment; ondence can be ars, spam has e reasonability Spam begun in ary Thuerk. He his new DCE Utilizing a preparation set, C tree as indicated by the part each inside point, the figu property that most successful occasions into subsets. It r choice focus and picks the id parts are possible. The taking the estimation: (1) If all cases class, the tree is a leaf in thi back with this class; (2) Ca data given by a test on the probabilities of each case ha force for the quality) for ea enroll the get in data that wo because of a test on the trade probabilities of each case wit for the trait being of a specific best credit to branch on ward illustrate. As shown by Trevino, "Head life". Results of his tests examination is fit for recog current spam with short of w false positive. These tests readiness and processing5 co just on the header of the email quantifiable filter(such as ph spam) are still adequately reco A survey done by Wang and Session for threatening to sp examination also. Wang and Header fields as flag for spa instance, "To", "CC", "From", r 2018 Page: 223 me - 2 | Issue 3 cientific TSRD) nal t u, India C4.5 fabricates a choice focus point strategy. At uring picks a solitary lly parts its blueprint of recursively visits every deal part until no further g after premises controls s are of the comparative is way the leaf is come alculate the conceivable trait (in context of the aving a specific driving ach property. Likewise ould happen as intended emark (in context of the th a specific inspiration c class); and (3) Find the upon the present choice der examination still has s showed that header gnizing over (90%) of what one percent (1%) similarly require no ontrol. Since it focused l, messages that can trap hishing traps or picture ognized and murdered. d Chen, utilizing Header pam focused on header d Chen made usage of am filtering, fields, for , "X-Mailer", "Message-

E-Mail Security Algorithm to Filter Out Spam E-mails using Machine Learning

  • Upload
    ijtsrd

  • View
    7

  • Download
    0

Embed Size (px)

DESCRIPTION

Email has turned out to be a standout amongst the most essential types of correspondence. Lately, everybody utilizes email. Ordinary billions of messages are being passed around and many spam messages are additionally sent. Spam messages are essentially messages that are intended to advance an item or benefit and are conveyed in mass to various email addresses. Spam is a major issue for everybody from the individual home Internet client to the multi national organization that relies on upon email correspondences to direct business. Not exclusively is it a disturbance, it can likewise show a security danger to our system. It requires a great deal of investment to sift through the spam from which are truly essential. Spam shirking is vital from a security viewpoint. The point is to locate the best strategy to decide the importance of the email is coming in with the littlest misclassification rate. R. Aswin | E. Ganesh | M. Babu "E-Mail Security Algorithm to Filter Out Spam E-mails using Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: https://www.ijtsrd.com/papers/ijtsrd10815.pdf Paper URL: http://www.ijtsrd.com/engineering/computer-engineering/10815/e-mail-security-algorithm-to-filter-out-spam-e-mails-using-machine-learning/r-aswin

Citation preview

Page 1: E-Mail Security Algorithm to Filter Out Spam E-mails using Machine Learning

@ IJTSRD | Available Online @ www.ijtsrd.com

ISSN No: 2456

InternationalResearch

E-Mail Security Algorithm to Filter OutSpam E-mails using Machine Learning

Department of CoG.K.M. College of Engineering and Technology

ABSTRACT Email has turned out to be a standout amongst the most essential types of correspondence. Lately, everybody utilizes email. Ordinary billions of messages are being passed around and many spam messages are additionally sent. Spam messages are essentially messages that are intended to advance an item or benefit and are conveyed in mass to various email addresses. Spam is a major issue for everybody from the individual home Internet client to the multinational organization that relies on upon email correspondences to direct business. Not exclusively is it a disturbance, it can likewise show a security danger to our system. It requires a great deal of investment to sift through the spam from which are truly essSpam shirking is vital from a security viewpoint. The point is to locate the best strategy to decide the importance of the email is coming in with the littlest misclassification rate.

Keywords: Spam, Machine Learning Techniques

INTRODUCTION

As the Internet keeps on developing, it has opened better approaches for correspondence. Utilizing email is subsequently the significant action when surfing the Internet. This type of correspondence scopes out to a large number of clients worldwide inside a momenin any case, this opportunity of correspondence can be abused. Over the most recent few years, spam has turned into a marvel that undermines the reasonability of correspondence by means of e-mail. Spam begun in the spring of 1978 by a man named. Gary needed everybody to think about his new DCE company.

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018

ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume

International Journal of Trend in Scientific Research and Development (IJTSRD)

International Open Access Journal

Mail Security Algorithm to Filter Outmails using Machine Learning

R. Aswin, E. Ganesh, M. Babu

Department of Computer Science and Engineering, G.K.M. College of Engineering and Technology, Chennai, Tamil Nadu

Email has turned out to be a standout amongst the most essential types of correspondence. Lately, everybody utilizes email. Ordinary billions of messages are being passed around and many spam

additionally sent. Spam messages are essentially messages that are intended to advance an item or benefit and are conveyed in mass to various email addresses. Spam is a major issue for everybody from the individual home Internet client to the multi-

l organization that relies on upon email correspondences to direct business. Not exclusively is it a disturbance, it can likewise show a security danger to our system. It requires a great deal of investment to sift through the spam from which are truly essential. Spam shirking is vital from a security viewpoint. The point is to locate the best strategy to decide the importance of the email is coming in with the littlest

Spam, Machine Learning Techniques

Internet keeps on developing, it has opened better approaches for correspondence. Utilizing email is subsequently the significant action when surfing the Internet. This type of correspondence scopes out to a large number of clients worldwide inside a moment; in any case, this opportunity of correspondence can be abused. Over the most recent few years, spam has turned into a marvel that undermines the reasonability

mail. Spam begun in the spring of 1978 by a man named. Gary Thuerk. He needed everybody to think about his new DCE

Utilizing a preparation set, C4.5 fabricates a choice tree as indicated by the part focus point strategy. At each inside point, the figuring picks a solitary property that most successfully paoccasions into subsets. It recursively visits every choice focus and picks the ideal part until no further parts are possible. The taking after premises controls the estimation: (1) If all cases are of the comparative class, the tree is a leaf in this way the leaf is come back with this class; (2) Calculate the conceivable data given by a test on the trait (in context of the probabilities of each case having a specific driving force for the quality) for each property. Likewise enroll the get in data that would happen as intended because of a test on the trademark (in context of the probabilities of each case with a specific inspiration for the trait being of a specific class); and (3) Find the best credit to branch on ward upon the preseillustrate.

As shown by Trevino, "Header examination still has life". Results of his tests showed that header examination is fit for recognizing over (90%) of current spam with short of what one percent (1%) false positive. These tests similarly readiness and processing5 control. Since it focused just on the header of the email, messages that can trap quantifiable filter(such as phishing traps or picture spam) are still adequately recognized and murdered.

A survey done by Wang and ChenSession for threatening to spam focused on header examination also. Wang and Chen made usage of Header fields as flag for spam filtering, fields, for instance, "To", "CC", "From", "X

Apr 2018 Page: 223

6470 | www.ijtsrd.com | Volume - 2 | Issue – 3

Scientific (IJTSRD)

International Open Access Journal

Mail Security Algorithm to Filter Out

Chennai, Tamil Nadu, India

Utilizing a preparation set, C4.5 fabricates a choice tree as indicated by the part focus point strategy. At each inside point, the figuring picks a solitary property that most successfully parts its blueprint of occasions into subsets. It recursively visits every choice focus and picks the ideal part until no further parts are possible. The taking after premises controls the estimation: (1) If all cases are of the comparative

s a leaf in this way the leaf is come back with this class; (2) Calculate the conceivable data given by a test on the trait (in context of the probabilities of each case having a specific driving force for the quality) for each property. Likewise

e get in data that would happen as intended because of a test on the trademark (in context of the probabilities of each case with a specific inspiration for the trait being of a specific class); and (3) Find the best credit to branch on ward upon the present choice

As shown by Trevino, "Header examination still has life". Results of his tests showed that header examination is fit for recognizing over (90%) of current spam with short of what one percent (1%) false positive. These tests similarly require no readiness and processing5 control. Since it focused just on the header of the email, messages that can trap quantifiable filter(such as phishing traps or picture spam) are still adequately recognized and murdered.

A survey done by Wang and Chen, utilizing Header Session for threatening to spam focused on header examination also. Wang and Chen made usage of Header fields as flag for spam filtering, fields, for instance, "To", "CC", "From", "X-Mailer", "Message-

Page 2: E-Mail Security Algorithm to Filter Out Spam E-mails using Machine Learning

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 224

ID". These fields are the fundamental explanation behind examination in their audit, they researched these fields and found escape conditions and illustration that are made as sign in describing an email as spam or not spam. Such measures are used as a piece of requesting spam, sender address is invalid and the recipient is not in the messages „To‟ or „CC‟ fields. As the fight for spam assembles, spammers find more ways to deal with hide their recognizing bits of verification when sending spam messages and by-pass isolating procedures. Thusly, header examination is considered as one of the essential approaches to manage counter spam strikes with contaminated header information. The preparation set and test set that were utilized as a part of the review are just from the picked corpuses. The messages that were utilized are in plain-content and HTML design just, and did not cover the examination of email connections. The recurrence table made comprises just of unigrams a solitary thing from an arrangement. Email messages are conveyed in a flash and remove the worry from imparting time-touchy data. Email is a dependable wellspring of correspondence that takes into account individual to-individual virtual conveyance rather than sitting tight for a message to be conveyed through postal mail. The email administration is generally free and it enables correspondence to stream to anybody around the world. There is no restriction to the measure of messages that can be sent or got. Spam is a major issue. Up to 66% of sends got are spam. It requires a considerable measure of investment to sift through the spam from which are truly essential. Content arrangement is the undertaking of relegating predefined classifications to free-content archives. Content arrangement is spam separating, where email messages are ordered into the two classifications of spam and non-spam, individually. Email will be abused. One such abuse is the posting of unwelcome, undesirable messages known as spam or garbage messages. Email spam has different outcomes. It lessens efficiency, consumes additional room in letter drops, additional time, amplify programming harming infections, and materials that contains conceivably hurtful data for Internet clients, obliterate dependability of mail servers, and accordingly clients invest loads of energy for sorting approaching mail and erasing undesirable correspondence. So there is a need of spam recognition so that its outcomes can be lessened. The goal is to group each email as either spam or not spam and furthermore discover the

viability of various diverse procedure connected to the characterization of messages.

RELATED WORKS

IP Blacklisting, Blacklisting is finished by taking a gander at the sender's IP Address and cross referencing it against a nearby or appropriate Blacklist.Pros-Rapid order to recognize new spam battles. Can prevent future spam from the same server Cons-High Risk of FP for shared IP servers .Sender Verification Handle source address ridiculing by mechanizing the procedure of recognizing senders. Confirms that a SMTP server is on the rundown of approved servers. Pros-Permit SMTP servers to confirm distinguish of senders.Can be utilized to lessen spam backscatter.Cons1.Simple for spammers to receive the plan. 2. Postures issues with email forwarders Sender Policy System SenderID ,DomainKeys Distinguished Mail .

PROPOSED SYSTEM

Fig 3.1 Proposed Systems

Environment : R-Studio

Language : R-Programming

MODULE DESCRIPTION AND RESULT

A. Dataset:

The data set was found on the UCI Machine Learning Repository and it contains word and character frequencies from actual emails.

Page 3: E-Mail Security Algorithm to Filter Out Spam E-mails using Machine Learning

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com

Fig 3.2 Dataset

B. Methodology:

Random Forests.

Irregular woods utilize the indistinguishable strategy as that in stowing, aside from the mtry is set to default i.e. the square foundation of the quantity of factors in the dataset. At each split, (the square foundation of p ) factors are evacuated. This reductions change and subsequently, expands strength in the display. The model still loses its interpretability however we can distinguish vital factors. The model produces a misclassification rate of 4.75\%. With reference to the plot, we trust that shout marks, "evacuate", dollar signs and the length of character letter consideare the factors that effect the order the most.

Artificial Neural Network

Neural systems have dependably been a standout amongst the most intriguing machine learning model as I would like to think, on account of the favor back propagation calculation, as well as in view of their unpredictability (consider profound learning with many concealed layers) and structure enlivened by the brain. The objective of the neural system is to take care of issues similarly that a human would, albeit a few neural system classes are more conceptual.

New cerebrum inquire about regularly fortifies examples in neural systems. One new approach is utilization of associations which traverse further to interface handling layers instead of nearby neurons. Other research being investigated with the diverse sorts of flag after some time that axons engenexample, profound learning, introduces more noteworthy multifaceted nature than an arrangement of Boolean factors being basically on or off. More up to date sorts of system are all the more free streaming as far as incitement and restraint, with a

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018

Irregular woods utilize the indistinguishable strategy aside from the mtry is set to default

i.e. the square foundation of the quantity of factors in the dataset. At each split, (the square foundation of p ) factors are evacuated. This reductions change and subsequently, expands strength in the display. The

del still loses its interpretability however we can distinguish vital factors. The model produces a

%. With reference to the plot, we trust that shout marks, "evacuate", dollar signs and the length of character letter consideration are the factors that effect the order the most.

Neural systems have dependably been a standout amongst the most intriguing machine learning model as I would like to think, on account of the favor back propagation calculation, as well as in view of their unpredictability (consider profound learning with many concealed layers) and structure enlivened by the brain. The objective of the neural system is to take care of issues similarly that a human would, albeit a few neural system classes are more conceptual.

New cerebrum inquire about regularly fortifies new examples in neural systems. One new approach is utilization of associations which traverse further to interface handling layers instead of nearby neurons. Other research being investigated with the diverse sorts of flag after some time that axons engender, for example, profound learning, introduces more noteworthy multifaceted nature than an arrangement of Boolean factors being basically on or off. More up to date sorts of system are all the more free streaming as far as incitement and restraint, with associations

interfacing in more tumultuous and complex ways. Dynamic neural systems are the most exceptional, in that they powerfully can, in light of principles, frame new associations and even new neural units while handicapping others.

As you can see the best execution of counterfeit neural systems is 6.4 %misclassification with a neural system demonstrate with just a single concealed layer and 37 or 40 covered up factors on the shrouded layer. The two models have comparable exhibitions.

Bagging

Bagging was first directed utilizing the entire informational collection so as to recognize subsets with reiterations. Packing (bootstrap collection) is the strategy for applying bootstrap philosophy to the whole model fitting procedure rather than simply producing standard mistakes.

Bootstrap tests normally forget In this manner, cross-validation is basically incorporated with the show. By utilizing the preparation and testing set, we endeavor to gauge the rehashed perceptions what'smisclassification rate. We have utilized the mtry as 57 in light of the fact that we have 57 forecast factors. This is utilized to produce a model that again characterizes spam versus nonspam as calculate factors. The quantity of trees in the model are 500 and creates a misclassification rate of 5.24%. Since stowing is a normal of models, it misfortunes its interpretability, it simply has the end arrangement.

Logistic Regression

Logistic regression is similar to the normal linear model however this model assumes the output to be classification into groups as opposed to on the continuous scale from 0 N.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

Apr 2018 Page: 225

interfacing in more tumultuous and complex ways. Dynamic neural systems are the most exceptional, in that they powerfully can, in light of principles, frame new associations and even new neural units while

e best execution of counterfeit neural systems is 6.4 %misclassification with a neural system demonstrate with just a single concealed layer and 37 or 40 covered up factors on the shrouded layer. The two models have comparable exhibitions.

Bagging was first directed utilizing the entire informational collection so as to recognize subsets with reiterations. Packing (bootstrap collection) is the strategy for applying bootstrap philosophy to the whole model fitting procedure rather than simply

Bootstrap tests normally forget ⅓ of the perceptions. validation is basically

incorporated with the show. By utilizing the preparation and testing set, we endeavor to gauge the rehashed perceptions what's more, ascertain the misclassification rate. We have utilized the mtry as 57 in light of the fact that we have 57 forecast factors. This is utilized to produce a model that again characterizes spam versus nonspam as calculate

in the model are 500 and creates a misclassification rate of 5.24%. Since stowing is a normal of models, it misfortunes its interpretability, it simply has the end arrangement.

Logistic regression is similar to the normal linear l however this model assumes the output to be

classification into groups as opposed to on the

Page 4: E-Mail Security Algorithm to Filter Out Spam E-mails using Machine Learning

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 226

This regression was also uniquely using all the variables with no form of selection to lower the variables to the most significant. After creating the logistic model on the training set it was predicted to the test set and then compared to the decision column to decide how bad the classification of spam email was to the actual determination of emails. The results for this model were actually very good and it performed above the expectation with a misclassification rate of 6.8\% which is within the threshold of acceptable misclassification. The summary of the model is too long to bring into the report.

Quadratic Discriminant Analysis

A quadratic discriminant investigation (QDA) model was worked with a model recipe made by the stepAIC work in R, which performed in reverse determination on the whole informational index to discover a appropriate model equation. The quadratic discriminant examination was performed on the whole informational index of 4601 perceptions and the reaction factors were anticipated for the whole informational index also.The quadratic discriminant examination figured the probabilities that a perception would be in a particular gathering by parameter estimation. Not at all like in the straight discriminant investigation (LDA), all the covariance grids fluctuate in quadratic discriminant analysis; along these lines there are significantly more parameters to be evaluated.

Since there are more parameters to be evaluated, the preparation set did not have enough perceptions to gauge every one of the parameters, in this way one needed to utilize the whole information set to play out this particular measurable examination. After every one of the estimations are done, the quadratic discriminant investigation display characterizes perceptions to the gathering that they no doubt would have a place within view of greatest probability estimation, however QDA has diverse choice limits than LDA. The aftereffect of the quadratic discriminant examination was 17.12671% misclassification on the whole informational index. The reaction variable, for this situation the gathering

that a perception has a place with was given by the class characteristic of the direct discriminant investigation show.

Quadratic Discriminant Analysis with cross validation

Leaveoneout crossvalidation was utilized with a quadratic discriminant investigation model to get more exact outcomes by approving the forecasts on the whole informational collection. The expectations were cross approved by forgetting one perception and making 4601 approvals sets, then averaging out the outcomes to concoct a more exact forecast for every perception's reaction variable. The outcome acquired on this specific measurable examination was 16.90937 % misclassification on the whole informational collection.

Linear Discriminant Analysis

A straight discriminant investigation model was worked with a model equation made by the stepAIC work in R, which utilized in reverse determination to locate an appropriate model recipe. The direct discriminant examination was performed on the preparation informational collection of 3601 perceptions and the reaction factors were anticipated for a 1000 perception testing informational collection.

The straight discriminant investigation figured the probabilities that a perception would be in a particular gathering by parameter estimation. For direct discriminant examination all the covariance matriced are the same, in this way there are not the same number of parameters to gauge as a quadratic discriminant examination would require. After every one of the estimations are accomplished for the parameters that should have been evaluated, the

Page 5: E-Mail Security Algorithm to Filter Out Spam E-mails using Machine Learning

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 227

straight discriminant examination display arranges perceptions to the gathering that they undoubtedly would have a place with in light of most extreme probability estimation. The consequences of the straight discriminant examination performed on the spam informational index were 11.0% misclassification on the testing set. The reaction variable, for this situation the gathering that a perception has a place with was given by the class characteristic of the straight discriminant examination show.

Linear Discriminant Analysis With cross Validation

Leaveoneout crossvalidation was utilized with a direct discriminant examination model to get more exact outcomes by approving the expectations on the testing informational index. The expectations were cross approved by forgetting one perception and making 1000 approvals sets, then averaging out the outcomes to think of a more precise expectations for every perception's reaction variable. The outcome acquired on this specific factual investigation was 11.8 % misclassification on testing informational index.

KNearestNeighbors

KNearestNeighbors was utilized to attempt and group the dataset. The rule behind the investigation is to foresee the point utilizing the indicator factors then in view of the knearest neighbors it arranges that point into the class that has the most astounding rate of a specific aggregate in those k neighbors. For the outcomes k = 5 was found to the best k through experimentation of distinctive k values, k =5 yielded the littlest misclassification rate. This was first prepared on the prepare set and after that anticipated utilizing the testing set of qualities for every one of the factors in the informational collection. The results were then contrasted with the genuine outcomes to

perceive how shut the model was at foreseeing the comes about. The misclassification rate was 18.6\% which is sufficiently vast to establish that this technique is sufficiently bad to characterize the spam email informational index.

K-Means Clustering

Kmeans bunching was utilized on the dataset to perceive how valuable this technique would be. This is the place you select an irregular k focuses in the informational collection and it gradually changes over the focuses around them to be a piece of the k gatherings. On account of this informational collection k = 2 since the mail must be spam or not spam. It was first utilized on the preparation set then used to foresee the outcomes utilizing the test information and all factors. Contrasting and the real arrangement yielded a misclassification of 36.4% which was one of the most exceedingly awful outcomes acquired. Kmeans ought not be utilized for the kind of investigation.

CONCLUSIONS

Bagging, random Forests, Neural networks and Logistic regression worked the best. The Future work of this project is Real email data can be applicable for E-mail spam classification.

REFERENCES

1. J. Levine. “DNS Blacklists and Whitelists,” IRTF Anti-Spam ResearchGroup, February 2010. http://tools.ietf.org/html/rfc5782

2. Sender Policy Framework,” [Online]. Available: http://www.openspf.org/ [Accessed: 4 May 2011]. J. Goodman, G. V. Cormack, D. Heckerman. “Spam and the ongoingbattle for the inbox,”

Page 6: E-Mail Security Algorithm to Filter Out Spam E-mails using Machine Learning

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 228

Communications of the ACM, vol.50, issue 2, Feb.2007.

3. J. R. Levine. “Experiences with greylisting,” in Proc. of the Second Conf. on Email and Anti-Spam, 2005

4. “Tagged Message Delivery Agent,” [Online]. Available: http://www.tmda.net [Accessed: May 6, 2011].

5. “The Apache SpamAssassin Project,” [Online]. Available: http://spamassassin.apache.org/ [Accessed: Apr. 7, 2011].

6. Wang, C. and Chen S. 2007. Using header session messages to anti-spamming.