Open Access

Spam filter based on geographical location of the sender


Cite

[1] I.Poese,S.Uhlig, M. A.Kaafar, B. Donnet, and B.Gueye, “Ip geolocation databases”, ACM SIGCOMM Computer Communication Review, vol. 41, no. 2, pp. 5356, 2011-04-15. https://dl.acm.org/doi/10.1145/1971162., 1971171.10.1145/1971162.1971171 Search in Google Scholar

[2] J. Taylor, J. Devlin, and K. Curran, “Bringing location to IP addresses with IP geolocation,”, Journal of Emerging Technologies in Web Intelligence, vol. 4, 08 2012.10.4304/jetwi.4.3.273-277 Search in Google Scholar

[3] D. Komosny, “Retrospective ip address geolocation for geography-aware internet services”, Sensors, vol. 21, no. 15, https://www.mdpi.com/1424-8220/21/15/4975, 2021.10.3390/s21154975834816934372212 Search in Google Scholar

[4] M. Kovařík, “GitHub MartinKovarik/Geolock: Plugin for SpamAssassin for blocking e-mails based on the geolocation of the sender using a IP2Location database”, https://github.com/MartinKovarik/Geolock, 2022. Search in Google Scholar

[5] S. Magdy, Y. Abouelseoud, and M. Mikhail, “Efficient spam and phishing emails filtering based on deep learning”, Computer Networks, vol. 206, pp. 108826, https://www.sciencedirect.com/science/article/pii/S1389128622000469, 2022.10.1016/j.comnet.2022.108826 Search in Google Scholar

[6] K. Roy, S. Keshari, and S. Giri, “Enhanced Bayesian spam filter technique employing lcs”, International Conference on Computer, Electrical Communication Engineering (ICCECE), pp. 16, 2016.10.1109/ICCECE.2016.8009553 Search in Google Scholar

[7] C.-N. Lee, Y.-R. Chen, and W.-G. Tzeng, “An online subject-based spam filter using natural language features”, IEEE Conference on Dependable and Secure Computing, pp. 479487, 2017.10.1109/DESEC.2017.8073830 Search in Google Scholar

[8] I. Youn, B. L. Mark, and D. Richards, “Statistical geolocation of internet hosts”, Proceedings of 18th International Conference on Computer Communications and Networks, IEEE, pp. 16. http://ieeexplore.ieee.org/document/5235373/, 2009.10.1109/ICCCN.2009.5235373 Search in Google Scholar

[9] B. Du, M. Candela, B. Huffaker, A. C. Snoeren, and K. Claffy, “Ripe ipmap active geolocation: Mechanism and performance evaluation”, SIGCOMM Comput. Commun. Rev, vol. 50, no. 2, pp. 310, May, https://doi.org/10.1145/3402413.3402415, 2020. Search in Google Scholar

[10] M. Gharaibeh, A. Shah, B. Huffaker, H. Zhang, R. Ensafi, and C. Papadopoulos, “A look at router geolocation in public and commercial databases”, Proceedings of the Internet Measurement Conference, ser. IMC 17. New York, NY, USA: Association for Computing Machinery, pp. 463469. https://doi.org/10.1145/3131365.3131380, 2017. Search in Google Scholar

[11] P. W. Resnick, “Internet message format”, Internet Requests for Comments, RFC Editor, RFC 5322, October, http://www.rfc-editor.org/rfc/rfc5322.txt, 2008. Search in Google Scholar

[12] J. Klensin, “Simple mail transfer protocol”, Internet Requests for Comments, RFC Editor, RFC 5321, October, http://www.rfc-editor.org/rfc/rfc5321.txt.http://www.rfc-editor.org/rfc/rfc5321.txt, 2008. Search in Google Scholar

[13] L. Zhuang, J. Dunagan, D. R. Simon, H. J. Wang, and J. D. Tygar, “Characterizing botnets from email spam records”, Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, ser. LEET08. USA: USENIX Association, https://www.microsoft.com/en-us/research/wp-content/uploads/2016/12/zhuang.pdf, 2008. Search in Google Scholar

[14] D. Chicco and G. Jurman, “The advantages of the matthews correlation coefficient (mcc) over f1 score and accuracy in binary classification evaluation”, BMC Genomics, vol. 21, no. 1, https://bmcgenomics.biomedcentral.com/articles/10.1186/s12864-019-6413-7, 2020.10.1186/s12864-019-6413-7 Search in Google Scholar

eISSN:
1339-309X
Language:
English
Publication timeframe:
6 times per year
Journal Subjects:
Engineering, Introductions and Overviews, other