Efficient defense strategy against spam and phishing email: An evolutionary game model

Journal of Information Security and Applications - Tập 61 - Trang 102947 - 2021
Mengli Wang1, Lipeng Song2
1The School of Data Science and Technology, North University of China, Taiyuan 030051, China
2The School of Mechanical, Electrical and Information Engineering, Shandong University, Weihai 264209, China

Tài liệu tham khảo

2019 Gangavarapu, 2020, Applicability of machine learning in spam and phishing email filtering: review and approaches, Artif Intell Rev, 53, 5019, 10.1007/s10462-020-09814-9 Chakraborty, 2016, Recent developments in social spam detection and combating techniques: A survey, Inf Process Manage, 52, 1053, 10.1016/j.ipm.2016.04.009 Blanzieri, 2008, A survey of learning-based techniques of email spam filtering, Artif Intell Rev, 29, 63, 10.1007/s10462-009-9109-6 Faris, 2019, An intelligent system for spam detection and identification of the most relevant features based on evolutionary random weight networks, Inf Fusion, 48, 67, 10.1016/j.inffus.2018.08.002 John, 2009, Studying spamming botnets using botlab, 291 Schmidtke, 2013, Fighting spam by breaking the econonmy of advertisment by unsolicited emails, 96 Guzella, 2009, A review of machine learning approaches to spam filtering, Expert Syst Appl, 36, 10206, 10.1016/j.eswa.2009.02.037 Dada, 2019, Machine learning for email spam filtering: review, approaches and open research problems, Heliyon, 5, 10.1016/j.heliyon.2019.e01802 Moh, 2011, Reducing classification times for email spam using incremental multiple instance classifiers, 189 Mujtaba, 2017, Email classification research trends: Review and open issues, IEEE Access, 5, 9044, 10.1109/ACCESS.2017.2702187 2019 Haiyu, 2019, Research on monitoring and tracing of malicious email, Netw Secur Monit Technol, 38, 28 Xie, 2008, Spamming botnets: Signatures and characteristics, 171 Hao S, Syed NA, Feamster N, Gray AG, Krasser S. Detecting spammers with snare: Spatio-temporal network-level automatic reputation engine. In: Usenix security symposium. 2010. Zou, 2007, Modeling and simulation study of the propagation and defense of internet e-mail worms, IEEE Trans Dependable Secure Comput, 4, 105, 10.1109/TDSC.2007.1001 Ridzuan, 2010, Factors involved in estimating cost of email spam, 383 Holme, 2003, Network dynamics of ongoing social relationships, Europhys Lett (EPL), 64, 427, 10.1209/epl/i2003-00505-4 Song, 2010, Limits of predictability in human mobility, Science, 327, 1018, 10.1126/science.1177170 Al-Bataineh A, White G. Detection and prevention methods of botnetgenerate d spam. In: Proceedings MIT spam conference. 2009, p. 1–10. Zhu, 2008, Botnet research survey, 967 Khan, 2015, A comprehensive study of email spam botnet detection, IEEE Commun Surv Tutor, 17, 2271, 10.1109/COMST.2015.2459015 Kessem, 2017 Labs, 2019 Weibull, 1996, Evolutionary game theory, Am J Agric Econ Tanimoto, 2021 Tanimoto, 2019 Tanimoto, 2015 the messaging malware and mobile anti-abuse working group, https://www.m3aawg.org/about-m3aawg. Tanimoto, 2007, Relationship between dilemma occurrence and the existence of a weakly dominant strategy in a two-player symmetric game, Bio Syst, 90, 105 Wang, 2013, Insight into the so-called spatial reciprocity, Phys Rev E, 88, 10.1103/PhysRevE.88.042145 Ito H, Tanimoto J. Scaling the phase-planes of social dilemma strengths shows game-class changes in the five rules governing the evolution of cooperation. R Soc Open Sci 5 (10). Arefin MR, Kabir KMA, Jusup M, Ito H, Tanimoto J. Social efficiency deficit deciphers social dilemmas, Sci Rep 10. Preciado, 2014, Optimal resource allocation for network protection against spreading processes, IEEE Trans Control Netw Syst, 1, 99, 10.1109/TCNS.2014.2310911 Ogura, 2019, Optimal containment of epidemics over temporal activity-driven networks, SIAM J Appl Math, 79, 986, 10.1137/18M1172740 Chen, 2017, Optimal allocation of resources for suppressing epidemic spreading on networks, Phys Rev E, 96, 10.1103/PhysRevE.96.012321 Parameswaran M, Rui H, Sayin S. A game theoretic model and empirical analysis of spammer strategies. In: Collaboration, electronic messaging, antiabuse and spam conf, vol. 7. 2010. Spamhaus dns blacklists, http://www.spamhaus.org. Sorbs: Spam and open relay blocking system, http://www.au.sorbs.net. Spamcop. http://www.spamcop.net/bl.shtml. Khorsi, 2007, An overview of content-based spam filtering techniques, Informatica, 31, 269 S.M, 1998, A bayesian approach to filtering junk e-mail, 55 Drucker, 1999, Support vector machines for spam categorization, Trans Neur Netw, 10, 1048, 10.1109/72.788645 Ramachandran, 2006, Understanding the network-level behavior of spammers, SIGCOMM Comput Commun Rev, 36, 291, 10.1145/1151659.1159947 Ouyang, 2014, A large-scale empirical analysis of email spam detection through network characteristics in a stand-alone enterprise, Comput Netw, 59, 101, 10.1016/j.comnet.2013.08.031 Wuying, 2012, Structured ensemble learning for email spam filtering, J Comput Res Dev, 49, 628 Ruano-Ordás, 2018, Using evolutionary computation for discovering spam patterns from e-mail samples, Inf Process Manage, 54, 303, 10.1016/j.ipm.2017.12.001 Kanich, 2011, Show me the money: Characterizing spam-advertised revenue, 15 Sun, 2019, Data-driven cybersecurity incident prediction: A survey, IEEE Commun Surv Tutor, 21, 1744, 10.1109/COMST.2018.2885561 Back, 1993 Back, 2002 Shang, 2012, Optimal attack strategies in a dynamic botnet defense model, Appl Math Inf Sci, 6, 29 Yang, 2019, Effective repair strategy against advanced persistent threat: A differential game approach, IEEE Trans Inf Forensics Secur, 14, 1713, 10.1109/TIFS.2018.2885251 Androutsopoulos, 2005, A game theoretic model of spam e-mailing Reshef E, Solan E. The effects of anti-spam methods on spam mail. In: 3rd Conference on email and anti-spam. 2006. Jiang, 2014, Qualitative analysis for a class of generalized accompanying system of a class of cubic system, J Syst Sci Math Sci, 34, 888