Efficient defense strategy against spam and phishing email: An evolutionary game model
Tài liệu tham khảo
2019
Gangavarapu, 2020, Applicability of machine learning in spam and phishing email filtering: review and approaches, Artif Intell Rev, 53, 5019, 10.1007/s10462-020-09814-9
Chakraborty, 2016, Recent developments in social spam detection and combating techniques: A survey, Inf Process Manage, 52, 1053, 10.1016/j.ipm.2016.04.009
Blanzieri, 2008, A survey of learning-based techniques of email spam filtering, Artif Intell Rev, 29, 63, 10.1007/s10462-009-9109-6
Faris, 2019, An intelligent system for spam detection and identification of the most relevant features based on evolutionary random weight networks, Inf Fusion, 48, 67, 10.1016/j.inffus.2018.08.002
John, 2009, Studying spamming botnets using botlab, 291
Schmidtke, 2013, Fighting spam by breaking the econonmy of advertisment by unsolicited emails, 96
Guzella, 2009, A review of machine learning approaches to spam filtering, Expert Syst Appl, 36, 10206, 10.1016/j.eswa.2009.02.037
Dada, 2019, Machine learning for email spam filtering: review, approaches and open research problems, Heliyon, 5, 10.1016/j.heliyon.2019.e01802
Moh, 2011, Reducing classification times for email spam using incremental multiple instance classifiers, 189
Mujtaba, 2017, Email classification research trends: Review and open issues, IEEE Access, 5, 9044, 10.1109/ACCESS.2017.2702187
2019
Haiyu, 2019, Research on monitoring and tracing of malicious email, Netw Secur Monit Technol, 38, 28
Xie, 2008, Spamming botnets: Signatures and characteristics, 171
Hao S, Syed NA, Feamster N, Gray AG, Krasser S. Detecting spammers with snare: Spatio-temporal network-level automatic reputation engine. In: Usenix security symposium. 2010.
Zou, 2007, Modeling and simulation study of the propagation and defense of internet e-mail worms, IEEE Trans Dependable Secure Comput, 4, 105, 10.1109/TDSC.2007.1001
Ridzuan, 2010, Factors involved in estimating cost of email spam, 383
Holme, 2003, Network dynamics of ongoing social relationships, Europhys Lett (EPL), 64, 427, 10.1209/epl/i2003-00505-4
Song, 2010, Limits of predictability in human mobility, Science, 327, 1018, 10.1126/science.1177170
Al-Bataineh A, White G. Detection and prevention methods of botnetgenerate d spam. In: Proceedings MIT spam conference. 2009, p. 1–10.
Zhu, 2008, Botnet research survey, 967
Khan, 2015, A comprehensive study of email spam botnet detection, IEEE Commun Surv Tutor, 17, 2271, 10.1109/COMST.2015.2459015
Kessem, 2017
Labs, 2019
Weibull, 1996, Evolutionary game theory, Am J Agric Econ
Tanimoto, 2021
Tanimoto, 2019
Tanimoto, 2015
the messaging malware and mobile anti-abuse working group, https://www.m3aawg.org/about-m3aawg.
Tanimoto, 2007, Relationship between dilemma occurrence and the existence of a weakly dominant strategy in a two-player symmetric game, Bio Syst, 90, 105
Wang, 2013, Insight into the so-called spatial reciprocity, Phys Rev E, 88, 10.1103/PhysRevE.88.042145
Ito H, Tanimoto J. Scaling the phase-planes of social dilemma strengths shows game-class changes in the five rules governing the evolution of cooperation. R Soc Open Sci 5 (10).
Arefin MR, Kabir KMA, Jusup M, Ito H, Tanimoto J. Social efficiency deficit deciphers social dilemmas, Sci Rep 10.
Preciado, 2014, Optimal resource allocation for network protection against spreading processes, IEEE Trans Control Netw Syst, 1, 99, 10.1109/TCNS.2014.2310911
Ogura, 2019, Optimal containment of epidemics over temporal activity-driven networks, SIAM J Appl Math, 79, 986, 10.1137/18M1172740
Chen, 2017, Optimal allocation of resources for suppressing epidemic spreading on networks, Phys Rev E, 96, 10.1103/PhysRevE.96.012321
Parameswaran M, Rui H, Sayin S. A game theoretic model and empirical analysis of spammer strategies. In: Collaboration, electronic messaging, antiabuse and spam conf, vol. 7. 2010.
Spamhaus dns blacklists, http://www.spamhaus.org.
Sorbs: Spam and open relay blocking system, http://www.au.sorbs.net.
Spamcop. http://www.spamcop.net/bl.shtml.
Khorsi, 2007, An overview of content-based spam filtering techniques, Informatica, 31, 269
S.M, 1998, A bayesian approach to filtering junk e-mail, 55
Drucker, 1999, Support vector machines for spam categorization, Trans Neur Netw, 10, 1048, 10.1109/72.788645
Ramachandran, 2006, Understanding the network-level behavior of spammers, SIGCOMM Comput Commun Rev, 36, 291, 10.1145/1151659.1159947
Ouyang, 2014, A large-scale empirical analysis of email spam detection through network characteristics in a stand-alone enterprise, Comput Netw, 59, 101, 10.1016/j.comnet.2013.08.031
Wuying, 2012, Structured ensemble learning for email spam filtering, J Comput Res Dev, 49, 628
Ruano-Ordás, 2018, Using evolutionary computation for discovering spam patterns from e-mail samples, Inf Process Manage, 54, 303, 10.1016/j.ipm.2017.12.001
Kanich, 2011, Show me the money: Characterizing spam-advertised revenue, 15
Sun, 2019, Data-driven cybersecurity incident prediction: A survey, IEEE Commun Surv Tutor, 21, 1744, 10.1109/COMST.2018.2885561
Back, 1993
Back, 2002
Shang, 2012, Optimal attack strategies in a dynamic botnet defense model, Appl Math Inf Sci, 6, 29
Yang, 2019, Effective repair strategy against advanced persistent threat: A differential game approach, IEEE Trans Inf Forensics Secur, 14, 1713, 10.1109/TIFS.2018.2885251
Androutsopoulos, 2005, A game theoretic model of spam e-mailing
Reshef E, Solan E. The effects of anti-spam methods on spam mail. In: 3rd Conference on email and anti-spam. 2006.
Jiang, 2014, Qualitative analysis for a class of generalized accompanying system of a class of cubic system, J Syst Sci Math Sci, 34, 888