English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113822/144841 (79%)
Visitors : 51834859      Online Users : 415
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 資訊學院 > 資訊科學系 > 學位論文 >  Item 140.119/152038
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/152038


    Title: 基於區塊鏈的郵件系統與 AI 信任評估
    Blockchain-based Email System with AI Trust Evaluation
    Authors: 張義猷
    Chang, Daniel
    Contributors: 謝佩璇
    Hsieh, Pei-Hsuan
    張義猷
    Chang, Daniel
    Keywords: 區塊鏈
    智能合約
    人工智慧
    監督式學習
    隱私保護
    Blockchain
    Smart contracts
    Artificial Intelligence
    Supervised learning
    Privacy protection
    Date: 2024
    Issue Date: 2024-07-01 12:30:49 (UTC+8)
    Abstract: 在數位時代,詐騙者利用各種方式進入我們的信箱,企圖詐騙個人資訊、財務資訊或金錢。區塊鏈是一種分散式數據庫技術,可以在各個領域應用。區塊鏈的核心特點是去中心化和不可竄改性,確保數據的安全和透明。在郵件管理方面,區塊鏈確保郵件的安全和不可竄改性,防止詐騙和數據外洩。通過將郵件數據記錄在不同節點上,區塊鏈確保了郵件的來源和完整性。智能合約可實現自動加密和解密,增強了隱私保護。此技術還有助於郵件跟蹤和驗證,提高了交流的可追溯性。本研究先開發基於區塊鏈之郵件系統,再整合智能合約,採用 11 種 AI 模型評估,結果 Naive Bayes 模型的訓練結果分數最佳,因此將此演算法嵌入智能合約中,有利於將先前訓練的模型進行預測。開發的郵件系統整體架構包括鏈外和鏈上組件,其中鏈外組件涉及數據和訓練階段,用於對數據進行預處理和特徵提取。一旦訓練階段完
    成,模型可以在智能合約中準備好,用於進行預測,藉著此 AI 技術的加入增強了智能合約的功能,本研究提出的此方式能有效判讀郵件是否為垃圾信件,更能有效地檢測郵件內容的真實性。
    In the digital era, fraudsters employ various means to infiltrate our email inboxes, attempting to deceive individuals into divulging personal information, financial details, or money. Blockchain is a decentralized database technology that finds applications across various domains. The core features of blockchain are decentralization and immutability, ensuring the security and transparency of data. In email management, blockchain ensures the security and tamper resistance of emails, preventing fraud and data leaks. By recording email data across different nodes, blockchain ensures the origin and integrity of emails. Smart contracts enable automatic encryption and decryption, enhancing privacy protection. This technology also aids in email tracking and verification, improving the traceability of communication. This research first develops a blockchain-based email system and then integrates smart contracts, employing 11 AI models for evaluation, with the Naive Bayes
    model yielding the best training results. Therefore, embedding this algorithm into smart contracts facilitates predictive analysis based on previously trained models. The overall architecture of the developed email system includes off-chain and on-chain components, with off-chain components involving data and training phases for preprocessing and feature extraction. Once the training phase is completed, the model can be prepared within the smart contract
    for predictive analysis. By incorporating this AI technology, the functionality of smart contracts is enhanced. This study proposes an effective method for
    determining whether an email is spam and efficiently detecting the authentic-
    ity of email content.
    Reference: [1] AWS Blockchain. https://aws.amazon.com/tw/what-is/blockchain/
    ?aws-products-all.sort-by=item.additionalFields.productNameLowercase&
    aws-products-all.sort-order=asc. Accessed: 2024-03-13.
    [2] CSOSocialEngineering. https://www.csoonline.com/article/571993/
    social-engineering-definition-examples-and-techniques.html. Accessed:
    2022-02-7.
    [3] SocialEngineeringDefinition. https://www.cisco.com/c/en/us/products/
    security/what-is-social-engineering.html.
    [4] Nazmiye Ceren Abay, Cuneyt Gurcan Akcora, Yulia R Gel, Murat Kantarcioglu,
    Umar D Islambekov, Yahui Tian, and Bhavani Thuraisingham. Chainnet: Learning
    on blockchain graphs with topological features. In 2019 IEEE international confer-
    ence on data mining (ICDM), pages 946–951. IEEE, 2019.
    [5] Cuneyt Gurcan Akcora, Yulia R Gel, and Murat Kantarcioglu. Blockchain: A graph
    primer. arXiv preprint arXiv:1708.08749, 2017.
    [6] Rasim Alguliyev and Saadat Nazirova. Two approaches on implementation of cbr
    and crm technologies to the spam filtering problem. 2011.
    [7] Tae-Ki An and Moon-Hyun Kim. A new diverse adaboost classifier. In 2010 International conference on artificial intelligence and computational intelligence, volume 1,
    pages 359–363. IEEE, 2010.
    [8] A Arnold. Promising use cases of blockchain in cybersecurity. Forbes, ed.(Forbes,
    Jersey City, 2019), 4.
    [9] Diana Baby, Sujitha Juliet Devaraj, Jude Hemanth, et al. Leukocyte classification
    based on feature selection using extra trees classifier: Atransfer learning approach.
    Turkish Journal of Electrical Engineering and Computer Sciences, 29(8):2742–
    2757, 2021.
    [10] Mahmoud Bassiouni, M Ali, and EA El-Dahshan. Ham and spam e-mails classi-
    fication using machine learning techniques. Journal of Applied Security Research,
    13(3):315–331, 2018.
    [11] Alexy Bhowmick and Shyamanta M Hazarika. Machine learning for e-mail spam
    filtering: review, techniques and trends. arXiv preprint arXiv:1606.01042, 2016.
    [12] Hanif Bhuiyan, Akm Ashiquzzaman, Tamanna Islam Juthi, Suzit Biswas, and Jinat
    Ara. A survey of existing e-mail spam filtering methods considering machine learn-
    ing techniques. Global Journal of Computer Science and Technology, 18(2):20–29,
    2018.
    [13] Enrico Blanzieri and Anton Bryl. E-mail spam filtering with local svm classifiers.
    2008.
    [14] Enrico Blanzieri and Anton Bryl. A survey of learning-based techniques of email
    spam filtering. Artificial Intelligence Review, 29:63–92, 2008.
    [15] Guang Chen, Bing Xu, Manli Lu, and Nian-Shing Chen. Exploring blockchain technology and its potential applications for education. Smart Learning Environments,
    5(1):1–10, 2018.
    [16] Sudeep Choudhari and Suman Das. Spam e-mail identification using blockchain
    technology. In 2021 International Conference on Communication, Control and In-
    formation Sciences (ICCISc), volume 1, pages 1–5, 2021.
    [17] Stefano Cresci, Marinella Petrocchi, Angelo Spognardi, and Stefano Tognazzi. On
    the capability of evolved spambots to evade detection via genetic engineering. Online
    Social Networks and Media, 9:1–16, 2019.
    [18] Nikolina Cveticanin. What’s on the other side of your inbox –20 spam statistics
    for 2023, July 14, 2023.
    [19] Mohamed Amine Ferrag, Leandros Maglaras, Sotiris Moschoyiannis, and Helge Jan-
    icke. Deep learning for cyber security intrusion detection: Approaches, datasets, and
    comparative study. Journal of Information Security and Applications, 50:102419,
    2020.
    [20] Wilfried N Gansterer, Andreas GK Janecek, and Robert Neumayer. Spam filtering
    based on latent semantic indexing. Survey of Text Mining II: Clustering, Classifica-
    tion, and Retrieval, pages 165–183, 2008.
    [21] José Chamadoira González, Vicente García-Díaz, Edward Rolando Núñez-Valdez,
    Alberto Gómez Gómez, and Ruben Gonzalez Crespo. Replacing email protocols
    with blockchain-based smart contracts. Cluster Computing, 23:1795–1801, 2020.
    [22] José González, Vicente García Díaz, Edward Núñez Valdez, Alberto Gomez, and
    Ruben Gonzalez Crespo. Replacing email protocols with blockchain-based smart
    contracts. Cluster Computing, IP:1–6, 09 2020.
    [23] J Griffey. Blockchain & intellectual property. Internet Librarian, 2016.
    [24] Sumeer Gul and Shohar Bano. Smart libraries: an emerging and innovative techno-
    logical habitat of 21st century. The Electronic Library, 37(5):764–783, 2019.
    [25] Kevin W Hamlen and Bhavani Thuraisingham. Data security services, solutions and
    standards for outsourcing. Computer Standards & Interfaces, 35(1):1–5, 2013.
    [26] Nabi Hasan. Blockchain technology and its application in libraries. Library Herald,
    58(4):118–125, 2020.
    [27] Matthew B Hoy. An introduction to the blockchain and its implications for libraries
    and medicine. Medical reference services quarterly, 36(3):273–279, 2017.
    [28] Investopedia. Blockchain, 2022.
    [29] Md Khairul Islam, Prithula Hridi, Md Shohrab Hossain, and Husnu S Narman. Net-
    work anomaly detection using lightgbm: A gradient boosting classifier. In 2020 30th
    international telecommunication networks and applications conference (ITNAC),
    pages 1–7. IEEE, 2020.
    [30] Ankit Kumar Jain and Brij B Gupta. A novel approach to protect against phishing
    attacks at client side using auto-updated white-list. EURASIP Journal on Information
    Security, 2016:1–11, 2016.
    [31] Ankit Kumar Jain and Brij B Gupta. Towards detection of phishing websites on
    client-side using machine learning based approach. Telecommunication Systems,
    68:687–700, 2018.
    [32] Mahasak Ketcham, Thittaporn Ganokratanaa, Patiyuth Pramkeaw, and Narumol
    Chumuang. Spam text detection using machine learning model. In 2023 International Technical Conference on Circuits/Systems, Computers, and Communications
    (ITC-CSCC), pages 1–6, 2023.
    [33] Sotiris B Kotsiantis, Ioannis Zaharakis, P Pintelas, et al. Supervised machine learn-
    ing: A review of classification techniques. Emerging artificial intelligence applica-
    tions in computer engineering, 160(1):3–24, 2007.
    [34] Nikhil Kumar, Sanket Sonowal, et al. Email spam detection using machine learn-
    ing algorithms. In 2020 Second International Conference on Inventive Research in
    Computing Applications (ICIRCA), pages 108–113. IEEE, 2020.
    [35] Jitendra Singh Kushwah, Atul Kumar, Subhash Patel, Rishi Soni, Amol Gawande,
    and Shyam Gupta. Comparative study of regressor and classifier with decision tree
    using modern tools. Materials Today: Proceedings, 56:3571–3576, 2022.
    [36] Konstantinos Lampropoulos, Giorgos Georgakakos, and Sotiris Ioannidis. Using
    blockchains to enable big data analysis of private information. In 2019 IEEE 24th
    International Workshop on Computer Aided Modeling and Design of Communica-
    tion Links and Networks (CAMAD), pages 1–6. IEEE, 2019.
    [37] Daekyung Lee, Mi Jin Lee, and Beom Jun Kim. Deviation-based spam-filtering
    method via stochastic approach. Europhysics Letters, 121(6):68004, 2018.
    [38] Jiameng Liu, Shaoliang Peng, Chengnian Long, Lijun Wei, Yunhao Liu, and Zhihui
    Tian. Blockchain for data science. In Proceedings of the 2020 The 2nd International
    Conference on Blockchain Technology, pages 24–28, 2020.
    [39] Yue Liu, Qinghua Lu, Shiping Chen, Qiang Qu, Hugo O’Connor, Kim-
    Kwang Raymond Choo, and He Zhang. Capability-based iot access control using
    blockchain. Digital Communications and Networks, 7(4):463–469, 2021.
    [40] Bernard Marr. How blockchain will transform the supply chain and logistics industry.
    Retrieved February, 22:2018, 2018.
    [41] Jose R Mendez, Tomas R Cotos-Yanez, and David Ruano-Ordas. A new semantic-
    based feature selection method for spam filtering. Applied Soft Computing, 76:89–
    104, 2019.
    [42] Monika, Munish Kumar, and Manish Kumar. Xgboost: 2d-object recognition using
    shape descriptors and extreme gradient boosting classifier. In Computational Meth-
    ods and Data Engineering: Proceedings of ICMDE 2020, Volume 1, pages 207–222.
    Springer, 2021.
    [43] Adetoun A Oyelude. What’s trending in blockchain technology and its potential uses
    in libraries. Library Hi Tech News, 36(9):17–18, 2019.
    [44] Mahesh Pal. Random forest classifier for remote sensing classification. International
    journal of remote sensing, 26(1):217–222, 2005.
    [45] Vishwam Jaimini Pandya. Comparing handwritten character recognition by ad-
    aboostclassifier and kneighborsclassifier. In 2016 8th International Conference on
    Computational Intelligence and Communication Networks (CICN), pages 271–274.
    IEEE, 2016.
    [46] MFNK Pathan and Vijaya Kamble. A review various techniques for content based
    spam filtering. Engineering and Technology, 4, 2018.
    [47] Line Nybro Petersen. The ageing body in monty python live (mostly). European
    journal of cultural studies, 21(3):382–394, 2018.
    [48] Abdul Jabbar Saleh, Asif Karim, Bharanidharan Shanmugam, Sami Azam, Krishnan Kannoorpatti, Mirjam Jonkman, and Friso De Boer. An intelligent spam detection
    model based on artificial immune system. Information, 10(6):209, 2019.
    [49] Igor Santos, Yoseba K Penya, Jaime Devesa, and Pablo G Bringas. N-grams-based
    file signatures for malware detection. In International Conference on Enterprise
    Information Systems, volume 1, pages 317–320. SCITEPRESS, 2009.
    [50] Anubhaw Kumar Suman and Madhu Patel. An introduction to blockchain technology
    and its application in libraries. Available at SSRN 4019394, 2021.
    [51] Melanie Swan. Blockchain: Blueprint for a new economy. ” O’Reilly Media, Inc.”,
    2015.
    [52] Paul J Taylor, Tooska Dargahi, Ali Dehghantanha, Reza M Parizi, and Kim-
    Kwang Raymond Choo. A systematic literature review of blockchain cyber security.
    Digital Communications and Networks, 6(2):147–156, 2020.
    [53] Antonio Tenorio-Fornés, Viktor Jacynycz, David Llop-Vila, Antonio Sánchez-Ruiz,
    and Samer Hassan. Towards a decentralized process for scientific publication and
    peer review using blockchain and ipfs. 2019.
    [54] Bhavani Thuraisingham, Murat Kantarcioglu, and Latifur Khan. Integrating cyber
    security and data science for social media: A position paper. In 2018 IEEE Interna-
    tional Parallel and Distributed Processing Symposium Workshops (IPDPSW), pages
    1163–1165. IEEE, 2018.
    [55] Marcos Treviso, Ji-Ung Lee, Tianchu Ji, Betty van Aken, Qingqing Cao, Manuel R
    Ciosici, Michael Hassid, Kenneth Heafield, Sara Hooker, Colin Raffel, et al. Effi-
    cient methods for natural language processing: A survey. Transactions of the Asso-
    ciation for Computational Linguistics, 11:826–860, 2023.
    [56] Sanmeet Singh Vadhava, Suyog Dhadwe, Aditya Katkar, Shubhangi Ghorkhana, and
    Jisha Tinsu. A decentralized mail using blockchain. In 2023 4th International Con-
    ference for Emerging Technology (INCET), pages 1–5, 2023.
    [57] Tarjani Vyas, Payal Prajapati, and Somil Gadhwal. A survey and evaluation of
    supervised machine learning techniques for spam e-mail filtering. In 2015 IEEE
    international conference on electrical, computer and communication technologies
    (ICECCT), pages 1–7. IEEE, 2015.
    [58] Mathias Wien, Heiko Schwarz, and Tobias Oelbaum. Performance analysis of svc.
    IEEE Transactions on Circuits and Systems for Video Technology, 17(9):1194–1203,
    2007.
    [59] Raymond E Wright. Logistic regression. 1995.
    [60] Dawei Xu, Fudong Wu, Liehuang Zhu, Ruiguang Li, Jiaqi Gao, and Yijie She. Bues:
    A blockchain-based upgraded email system. China Communications, 19(10):250–
    264, 2022.
    [61] Shuo Xu, Yan Li, and Zheng Wang. Bayesian multinomial naïve bayes classi-
    fier to text classification. In Advanced Multimedia and Ubiquitous Engineering:
    MUE/FutureTech 2017 11, pages 347–352. Springer, 2017.
    [62] Dylan Yaga, Peter Mell, Nik Roby, and Karen Scarfone. Nistir 8202 blockchain tech-
    nology overview. National Institute of Standards and Technology, US Department
    of Commerce, Washington, USA, 2018.
    [63] Masoumeh Zareapoor, Pourya Shamsolmoali, et al. Application of credit card
    fraud detection: Based on bagging ensemble classifier. Procedia computer science,
    48(2015):679–685, 2015.
    [64] Li Zhuang, John Dunagan, Daniel R Simon, Helen J Wang, Ivan Osipkov, and J Doug
    Tygar. Characterizing botnets from email spam records. Leet, 8(1):1–9, 2008.
    Description: 碩士
    國立政治大學
    資訊科學系
    111753230
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0111753230
    Data Type: thesis
    Appears in Collections:[資訊科學系] 學位論文

    Files in This Item:

    File Description SizeFormat
    323001.pdf2373KbAdobe PDF0View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback