http://issues.apache.org/SpamAssassin/show_bug.cgi?id=5701

           Summary: Enhancing SpamAssassin Anti-Phishing Detection
                    Capability
           Product: Spamassassin
           Version: unspecified
          Platform: All
               URL: http://cups.cs.cmu.edu/trust.php
        OS/Version: All
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: Plugins
        AssignedTo: [email protected]
        ReportedBy: [EMAIL PROTECTED]


SUMMARY: Enhancing SpamAssassin Anti-Phishing Detection Capability

BACKGROUND: Carnegie Mellon University would like to make its PILFER
anti-phishing technology available to the SpamAssassin community
(http://cups.cs.cmu.edu/trust.php)

PROJECT GOALS: Enhancing the detection performance of SpamAssassin on phishing
emails with rules built using PILFER 

TECHNICAL OBJECTIVES: 
        0) Adding anti-phishing detection mechanism to SA, without effecting the
performance of SA’s spam detection
        1) Introducing new SA-rules that are required by PILFER
        2) Evaluating a first version of SA trained using these new rules
        3) Evaluating a more advanced version of PILFER in the form of a 
plug-in that
uses decision-rules derived by PILFER’s learning algorithm
        4) Evaluating field performance & collecting feedback from the community

TENTATIVE TIMELINE:
        By Nov 23: Collection of Feedback on our proposal 

        By Dec 7: Test and fine tune PILFER-based SA-rules using corpus from
SpamAssassin. We will start by introducing new SA-rules identified by PILFER.
This first test will rely on the SA learning algorithm and evaluate the
improvement of SA’s overall performance. One open issue will be to see to what
extent we want to/can differentiate between spam and phishing email in training
the system. We understand that we may need to treat spam and phish as being the
same in SA training.

        December 14-January 11: Test and fine tune PILFER plug-in. Here we will 
use our
PILFER technology to produce a new set of decision-rules. These decision-rules
will be produced offline using our own learning algorithms and will be used in a
SA plugin that will execute them. This module is intended to catch phishing
emails that are not caught by the default SA-rules. This enhanced version of SA
will be evaluated on a fresh SA corpus. Some tweaking may be required. Assuming
that the results look good, the plugin will be released in early 2008.

PARTNERS:
        Umut Topkara (main point of contact)
        Ian Fette
        Norman Sadeh

SPONSORS: PILFER is one of several tools developed by Carnegie Mellon University
as part of its “Supporting Trust Decision” project
(http://cups.cs.cmu.edu/trust.php), a research effort funded by NSF Cyber Trust
initiative (Grant #0524189) and in part under ARO research grant
DAAD19-02-1-0389 (“Perpetually Available and Secure Information Systems”) to
Carnegie Mellon University’s CyLab.
        
SKILLS & EXPERTISE NEEDED: All the programming will be done at Carnegie Mellon.
Our team will need advice and  support from SA core-contributors, e.g. to help
with some design decisions and handle potential technical difficulties.

SUPPORTING DOCUMENT: 
        PILFER WWW'07 paper (http://www2007.org/paper550.php)



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

Reply via email to