Title: SIMS 290-2: Applied Natural Language Processing
1SIMS 290-2 Applied Natural Language Processing
Marti Hearst October 18, 2004
2How might we analyze email?
- Identify different parts
- Reply blocks, signature blocks
- Integrate email with workflow tasks
- Build a social network
- Who do you know, and what is their contact info?
- Reputation analysis
- Useful for anti-spam too
3Today
- Email analysis
- Spam filtering
4Recognizing Email Structure
- Three tasks
- Does this message contain a signature block?
- If so, which lines are in it?
- Which lines are reply lines?
- Three-way classification for each line
- Representation
- A sequence of lines
- Each line has features associated with it
- Windows of lines important for line classification
Victor R. Carvalho William W. Cohen, Learning
to Extract Signature and Reply Lines from Email,
in CEAS 2004.
5Victor R. Carvalho William W. Cohen, Learning
to Extract Signature and Reply Lines from Email,
in CEAS 2004.
6Victor R. Carvalho William W. Cohen, Learning
to Extract Signature and Reply Lines from Email,
in CEAS 2004.
7Victor R. Carvalho William W. Cohen, Learning
to Extract Signature and Reply Lines from Email,
in CEAS 2004.
8Victor R. Carvalho William W. Cohen, Learning
to Extract Signature and Reply Lines from Email,
in CEAS 2004.
9Victor R. Carvalho William W. Cohen, Learning
to Extract Signature and Reply Lines from Email,
in CEAS 2004.
10Victor R. Carvalho William W. Cohen, Learning
to Extract Signature and Reply Lines from Email,
in CEAS 2004.
11The Cost of Spam
- Most of the cost of spam is paid for by the
recipients - Typical spam batch is 1,000,000 spams
- Spammer averages 250 commission per batch
- Cost to recipients to delete the load of spam _at_ 2
seconds/spam, 5.15/hour - 2,861
12The Cost of Spam
- Theft efficiency ratio of spammer
- profit to thief
- ------------------------ 10
- cost to victims
- 10 theft efficiency ratio is typical in many
other lines of criminal activity such as fencing
stolen goods (jewelery, hubcaps, car stereos).
13How to Recognize Spam?
- What features and algorithms should we use?
14Anti-spam Approaches
- Legislation
- Technology
- White listing of Email addresses
- Black Listing of Email addresses/domains
- Challenge Response mechanisms
- Content Filtering
- Learning Techniques
- Bayesian filtering for spam has got a lot of
press, e.g. - How to spot and stop spam, BBC News,
26/5/2003http//news.bbc.co.uk/2/hi/technology/30
14029.stm - Sorting the ham from the spam, Sydney Morning
Herald, 24/6/2003http//www.smh.com.au/articles/2
003/06/23/1056220528960.html - The Bayesian filtering they are talking about
is actually Naïve Bayes Classification
15Research in Spam Classification
- Spam filtering is really a classification problem
- Each email needs to be classified as either spam
or not spam (ham) - W. Cohen (1996)
- RIPPER, Rule Learning System
- Rules in a human-comprehensible format
- Pantel Lin (1998)
- Naïve-Bayes with words as features
- Sahami, Dumais, Heckerman, Horvitz (1998)
- Naïve-Bayes with a mutual information measure to
select features with strongest resolving power - Words and domain-specific attributes of spam used
as features
16Research in Spam Classification
- Paul Graham (2002) A Plan for spam
- Very popular algorithm credited with starting the
craze for Bayesian Filters - Uses naïve bayes with words as features
- Bill Yerazunis (2002) CRM114 sparse binary
polynomial hashing algorithm - Very accurate (over 99.7 accuracy)
- Distinctive because of its powerful feature
extraction technique - Uses Bayesian chain rule for combining weights
- Available via sourceforge
- Others have used SVMs, etc.
- New work First email and anti-spam conference
just held - http//www.ceas.cc/papers-2004/
17Yerazunis CRM114 Algorithm
- Other naïve-bayes approaches focused on
single-word features - CRM114 creates a huge number of n-grams and
represents them efficiently - The goal is to create a LOT of features, many of
which will be invariant over a large body of spam
(or nonspam). - (The name is a reference to a program in Dr.
StrangeLove)
Sparse Binary Polynomial Hashing and the CRM114
Discriminator, William S. Yerazunis,
http//crm114.sourceforge.net/CRM114_paper.html
18CRM114
- Slide a window N words long over the incoming
text - For each window position, generate a set of
order-preserving sub-phrases containing
combinations of the windowed words - Calculate 32-bit hashes of these order-preserved
sub-phrases (for efficiency reasons)
19CRM114 Feature Extraction Example
- Step 1 slide a window N words long over the
incoming text. ex - You can Click here to buy viagra online NOW!!!
- Yields
- You can Click here to buy viagra online NOW!!!
- You can Click here to buy viagra online NOW!!!
- You can Click here to buy viagra online NOW!!!
- You can Click here to buy viagra online NOW!!!
- ... and so on... (on to step 2)
20SBPH Example
Step 2 generate order-preserving sub-phrases
from the words in each of the sliding windows
Sliding Window Text Click here to buy
viagra
Click Click here Click to Click here
to Click buy Click here
buy Click to buy Click here to buy
Click viagra Click here
viagra Click to
viagra Click here to viagra Click
buy viagra Click here buy
viagra Click to buy viagra Click here
to buy viagra
...yields all these feature sub-phrases
Note the binary counting pattern this is the
binary in sparse binary polynomial hashing
21SBPH Example
Step 3 make 32-bit hash value features from
the sub-phrases
Click Click here Click to Click here
to Click buy Click here
buy Click to buy Click here to
buy Click viagra Click here
viagra Click to
viagra Click here to viagra Click
buy viagra Click here buy
viagra Click to buy viagra Click here
to buy viagra
E06BF8AA 12FAD10F 7B37C4F9 113936CF 1821F0E8 46B99
AAD B7EE69BF 19A78B4D 56626838 AE1B0B61 5710DE73 3
3094DBB ..... and so on
32-bit hash
22How to use the terms
- For each phrase you can build
- Keep track of how many times you see that phrase
in both the spam and nonspam categories. - When you need to classify some text,
- Build up the phrases
- Each extra word adds 15 features
- Count up how many times all of the phrases appear
in each of the two different categories. - The category with the most phrase matches wins.
- But really it uses the Bayesian chain rule
23Learning and Classifying
- Learning each feature is bucketed into one of
two bucket files ( spam or nonspam) - Classifying the comparable bucket counts of the
two files generate rough estimates of each
feature's spamminess - P(FC) 0.5 ( Fc - Fc ) / ( 2 MaxF )
24The Bayesian Chain Rule (BCR)
- P ( FC ) P ( C
) - P (CF ) -------------------------------------
----- - P( FC ) P( C ) P ( FC)
P(C)
- Start with P(C ) P(C) .5
- For a new msg, compute this for both P(spam) and
P(not-spam) - Which ever has the higher score wins.
- The denominator renormalizes to take into account
if most of the email is mainly one class or the
other
25Evaluation
- The feature set created by the SBPH feature hash
gives better performance than single-word
Bayesian systems. - Phrases in colloquial English are much more
standardized than words alone - this makes filter
evasion much harder - A bigger corpus of example text is better
- With 400Kbytes selected spams, 300Kbytes selected
nonspams trained in, no blacklists, whitelists,
or other shenanigans
26Results
- gt99.915
- The actual performance of CRM114 Mailfilter from
Nov 1 to Dec 1, 2002. - 5849 messages, (1935 spam, 3914 nonspam)
- 4 false accepts, ZERO false rejects, (and 2
messages I couldn't make head nor tail of). - All messages were incoming mail 'fresh from the
wild'. No canned spam. - For comparison, a human is only about 99.84
accurate in classifying spam v. nonspam in a
rapid classification environment.
27Results Stats
- Filtering speed classification about 20Kbytes
per second, learning time about 10Kbytes per
second (on a Transmeta 666 MHz laptop) - Memory required about 5 megabytes
- 404K spam features, 322K nonspam features
28Downsides?
- The bad news SPAM MUTATES
- Even a perfectly trained Bayesian filter will
slowly deteriorate. - New spams appear, with new topics, as well as old
topics with creative twists to evade antispam
filters.
29Revenge of the Spammers
- How do the spammers game these algorithms?
- Break the tokenizer
- Split up words, use html tags, etc
- Throw in randomly ordered words
- Throw off the n-gram based statistics
- Use few words
- Harder for the classifier to work
On Attacking Statistical Spam Filters. Gregory L.
Wittel and S. Felix Wu, CEAS 04.
30Next Time
- In-class work
- creating categories for the Enron email corpus