These emails usually appear to come from trusted
organizations, such as banks, government agencies,
or e-commerce platforms. They remind users to
update their account details, reset passwords, or claim
that the user's information needs to be checked.
Phishing attacks can have serious consequences.
Most of the time, victims suffer financial losses.
Sometimes victims also suffer identity theft. For
companies and institutions, phishing can lead to data
breaches.
3.3 Second Section
Scam emails prey on simple human emotions to
deceive the recipient. These emotions are usually
greed, urgency, fear, or lust. They will tell the
recipient that they have won a lottery or a
competition. Even if the person did not buy or enter
any lottery or competition. After the victim pays a fee,
they will disappear. Sometimes, the fraudster will say
that the recipient has inherited a fortune from a distant
relative. Again, a fee must be paid upfront. They will
tell investors about non-existent investment
opportunities. These investment opportunities appear
to be high-return projects, but in fact, the money will
be used for fraudulent business activities. Although
scam emails have been around for decades, they are
still evolving and becoming more and more difficult
to identify. There are even many AI-driven scams
emerging, where attackers use automated systems to
create more convincing messages, thereby increasing
the effectiveness of these fraudulent activities.
4 DISADVANTAGES OF
TRADITIONAL FILTRATION
METHODS
The current traditional spam filtering methods mainly
include Rule-based filtering, Bayesian filtering and
IP-based blacklists, but these methods have many
limitations and are difficult to effectively deal with
modern spam strategies. These filters help people
identify and lock spam, so people can reduce losses.
However, while traditional spam filters are useful,
they have significant limitations. Especially with the
increasing popularity of artificial intelligence, it
hinders their effectiveness in detecting modern spam
strategies.
4.1 Rule-Based Filtering
Rule-based filtering is an earlier detection method. It
classifies emails according to some rules, usually
including pre-defined ones. The system automatically
detects keywords such as "free", "lottery", "product",
etc. contained in the email. In this way, it analyzes
whether the email is spam. In addition, some rules
analyze the format and attachments of the email.
However, spammers can easily circumvent the
rules. They can replace keywords with words that the
system cannot detect. For example, "lott3ry" instead
of "lottery". In addition, due to the rise of artificial
intelligence, spam has become more and more elusive.
The forms and types of spam are changing all the time.
But the rules need to be constantly updated and
maintained. This is very inefficient and time-
consuming. And the accuracy rate is not high.
4.2 Bayesian Filtering
Bayesian Filtering analyzes the frequency of words in
an email and calculates the probability of spam. In
this process, Bayesian Filtering uses a statistical
theorem, namely ”Bayes' rule“, to calculate and
identify spam (Han,2023).
Bayesian filtering is a spam classification method
based on statistical probability. It analyzes the
frequency of words in an email and calculates the
probability that the email is spam or normal (Lu &
Yin, 2008). This method is considered to be more
accurate than rule-based filtering because it can
gradually learn email features as users use it and
improve detection accuracy (Chakraborty, 2012).
However, Bayesian filtering also has its
limitations. Spammers can also use many methods to
avoid Bayesian Filtering detection. Spammers can
choose to add some normal words or words that are
unlikely to appear in spam to confuse Bayesian
Filtering. This phenomenon is called "Bayes
poisoning". For example, spammers can choose to
add scientific and technological words, political
current affairs words, or the names of legitimate large
companies to evade detection. Also, Bayesian
Filtering lacks the test of spam with artificial
intelligence.
4.3 IP-based Blacklists
Internet Protocol addresses are addresses used to
identify devices in a computer network. An IP address
is a unique identifier for a device on a computer
network and is used to enable communication
between devices. IP blacklists are a common spam
filtering strategy. When people find known spammers,
they can record the IP addresses in a blacklist. That is,
all emails from these IP addresses will be considered
spam. This method has a certain effect on blocking
spam from known malicious servers.