skip to main content
10.1145/2490257.2490288acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbciConference Proceedingsconference-collections
research-article

FIMESS: filtering mobile external SMS spam

Published:19 September 2013Publication History

ABSTRACT

The widespread use of mobile devices has attracted the attention of cyber-criminals, who exploit their functionality for malevolent purposes. A very popular and well-known such approach is the use of unsolicited electronic messages, also known as spam. Such messages can be used by attackers in order to tempt the recipient to visit a malicious page, or to reply to a message and be charged at premium rates, or even for advertising goods and offers. Several of the mechanisms developed for fighting mobile spam have been based on the well-known and widely adopted e-mail spam techniques. Mobile spam on the other hand has specific properties, such as limited text size, particular linguistic style with specific abbreviations, also known as "the SMS language" or "textese", etc. Our algorithm, FIMESS (FIltering Mobile External SMS Spam), performs simple, yet effective checks on the message headers so as to classify an SMS as being spam or not. In contrast to linguistic-only approaches of spam detection algorithms, FIMESS is able to utilise the important information in the SMS headers and identify SMS spam messages. Contrary to the email metadata which can easily be manipulated by the spammers, the SMS protocol provides useful information to build more efficient spam filters. The proposed scheme was tested on the Android platform and yielded encouraging results.

References

  1. Taking on the challenge of mobile messaging abuse. White paper, Airwide Solutions Inc., May 2009.Google ScholarGoogle Scholar
  2. mSecurity survey 2010. Technical report, Goode Intelligence, 2010.Google ScholarGoogle Scholar
  3. Technical realization of the short message service (SMS). TS 23.040, 3rd Generation Partnership Project (3GPP), September 2010. Release 9.Google ScholarGoogle Scholar
  4. The Spamhaus Project. http://www.spamhaus.org/ (accessed 2012-03-31), 2012.Google ScholarGoogle Scholar
  5. I. Androulidakis. Mobile Phone Security and Forensics: A Practical Approach. Springer Briefs in Electrical and Computer Engineering. Springer, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. I. Androulidakis and C. Basios. A plain type of mobile attack: Compromise of user's privacy through a simple implementation method. In 3rd International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE), pages 465--470, Bangalore, India, 7--10 January 2008.Google ScholarGoogle ScholarCross RefCross Ref
  7. I. Androutsopoulos, J. Koutsias, K. V. Chandrinos, and C. D. Spyropoulos. An experimental comparison of naive Bayesian and keyword-based anti-spam filtering with personal e-mail messages. In Proceedings of the 23rd annual international ACM SIGIR conference on Research and development in information retrieval, SIGIR '00, pages 160--167, New York, NY, USA, 2000. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. I. Androutsopoulos, G. Paliouras, and E. Michelakis. Learning to filter unsolicited commercial e-mail technical report. Technical Report 2004/2, NCSR Demokritos, 2006.Google ScholarGoogle Scholar
  9. K. Bache and M. Lichman. UCI machine learning repository, 2013.Google ScholarGoogle Scholar
  10. M. Bueti. Anti-spam legislation. In ITU, WSIS Thematic Meeting on Cybersecurity, pages 1--62, 2005.Google ScholarGoogle Scholar
  11. T. Chen and M.-Y. Kan. Creating a live, public short message service corpus: The NUS SMS corpus. Language Resources and Evaluation, pages 1--37, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  12. G. V. Cormack. Email spam filtering: A systematic review. Found. Trends Inf. Retr., 1(4):335--455, Apr. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. B. Coskun and P. Giura. Mitigating SMS spam by online detection of repetitive near-duplicate messages. In IEEE International Conference on Communications (ICC), pages 999--1004, Ottawa, ON, Canada, 10--15 June 2012.Google ScholarGoogle ScholarCross RefCross Ref
  14. S. J. Delany, M. Buckley, and D. Greene. SMS spam filtering: Methods and data. Expert Systems with Applications, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. M. G. Hidalgo, T. A. Almeida, and A. Yamakami. On the validity of a new SMS spam collection. In 11th International Conference on Machine Learning and Applications (ICMLA), Boca Raton, FL, USA, 12--15 December 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. C. Khemapatapan. Thai-English spam SMS filtering. In 16th Asia-Pacific Conference on Communications (APCC), pages 226--230, Auckland, New Zealand, 31 October -- 3 November 2010.Google ScholarGoogle ScholarCross RefCross Ref
  17. D. Lowther. GSMA to address spam and fraudulent messaging threats for consumers. {Online} http://www.gsma.com/articles/gsma-to-address-spam-and-fraudulent-messaging-threats-for-consumers/17642 (accessed 2012-03-28), 24 March 2010.Google ScholarGoogle Scholar
  18. M. T. Nuruzzaman, C. Lee, and D. Choi. Independent and personal SMS spam filtering. In 11th International Conference on Computer and Information Technology (CIT), pages 429--435, Pafos, Cyprus, 31 August -- 2 September 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Z. Rafique and M. Abulaish. Graph-based learning model for detection of SMS spam on smart phones. In 8th International Wireless Communications and Mobile Computing Conference (IWCMC), pages 1046--1051, Limassol, Cyprus, 27--31 August 2012.Google ScholarGoogle ScholarCross RefCross Ref
  20. G. Schryen. Anti-spam legislation: An analysis of laws and their effectiveness. Information & Communications Technology Law, 16(1):17--32, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. G. Schryen. Spam and its economic significance. In Anti-Spam Measures -- Analysis and Design, pages 7--27. Springer Berlin Heidelberg, 2007.Google ScholarGoogle Scholar
  22. M. H. Shirali Shahreza and M. Shirali Shahreza. An anti-SMS-spam using CAPTCHA. In ISECS International Colloquium on Computing, Communication, Control, and Management (CCCM '08), volume 2, pages 318--321, Guangzhou, China, 3--4 August 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. Sillanpaa. Mobile asset security and how to make money on it. In Seminar on Network Security, Publications in Telecommunications Software and Multimedia TML-C7. Helsinki University of Technology, Telecommunications Software and Multimedia Laboratory, 2001. ISSN 1455-9749.Google ScholarGoogle Scholar
  24. K. Yadav, S. K. Saha, P. Kumaraguru, and R. Kumra. Take control of your SMSes: Designing an usable spam SMS filtering system. In IEEE 13th International Conference on Mobile Data Management (MDM), pages 352--355, Bengaluru, Karnataka, India, 23--26 July 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. FIMESS: filtering mobile external SMS spam

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      BCI '13: Proceedings of the 6th Balkan Conference in Informatics
      September 2013
      293 pages
      ISBN:9781450318518
      DOI:10.1145/2490257

      Copyright © 2013 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 19 September 2013

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      BCI '13 Paper Acceptance Rate41of103submissions,40%Overall Acceptance Rate97of250submissions,39%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader