Open Access Open Access  Restricted Access Subscription or Fee Access

Novel Approaches to Prevent Spams

Bastin Rogers, Jasmine Chandralega


Spam is nothing but an unwanted or unsolicited email sent in bulk. The Spam Messages contains Fraudulent offers, Incentives, viruses etc. The Spammers can flood the net with thousands of messages at an negligible cost. These Spam messages will decrease the throughput, reduces the bandwidth speed and also it will give stress to the individual users. For eliminating spam’s various spam filtering techniques are available. This paper presents a detail survey on various spam filtering techniques that are currently used.


Spam, Ham, Camouflage Attack, False Positive

Full Text:



Z.Zhong, L. Ramaswamy, and K. Li, “Privacy-Aware Collaborative Spam Filtering,” Proc. IEEE INFOCOM ’09, Apr. 2009.

V.Schryver, Distributed Checksum Clearinghouse, http:// spam/dcc/, Nov. 2005.

Vipul’s Razor Anti-Spam System, Vipul Ved Prakash, http://, 2008.

D. Lowd and C. Meek, “Good Word Attacks on Statistical Spam Filter,” Proc. SecondEmail and Anti-SPAM Conf. (CEAS ’05),July 2005.

G.V. Cormark and T. Lynam, “Spam Corpus Creation for TREC,”Proc. Second Emailand Anti-SPAM Conf. (CEAS), 2005.

A. Broder, “Some Applications of Rabins Fingerprinting Method,”Sequences II: Methodsin Communications, Security, and Computer Science. Springer-Verlag, pp. 143-152, 1993.

G.L. Wittel and S.F. Wu, “On Attacking Statistical Spam Filters,”Proc. First Email and Anti-SPAM Conf. (CEAS ’04), July 2004.

D. Lowd and C. Meek, “Good Word Attacks on Statistical Spam Filter,” Proc. Second Email and Anti-SPAM Conf. (CEAS ’05), July 2005.

] M.W. Wang, Sender Authentication: What to Do, Anti-Abuse WorkingGroup White Paper,,2008.

A. Gray and M. Haahr, “Personalised, Collaborative SpamFiltering,” Proc. Second Email and Anti-SPAM Conf. (CEAS), 2005.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.