A fast spam filter written in Python inspired by SpamAssassin integrated with machine learning.
spam-analyzer is a CLI (Command Line Interface) application that aims be a viable alternative to spam filter services.
This program can classify the email given in inputs in spam or non-spam using a machine learning algorithm (Random Forest), the model is trained using a dataset of 19900 emails. Anyway it could be wrong sometimes, if you want to improve the accuracy of the model you can train it with your persolized dataset.
The main features of spam-analyzer are:
- spam recognition with the option to display a detailed analysis of the email
- JSON output
- it can be used as a library in your Python project to extract features from an email
- it is written in Python with its most modern features to ensure software correctness
- extensible with plugins
- 100% containerized with Docker
The analysis takes in consideration the following main aspects:
- the headers of the email
- the body of the email
- the attachments of the email
The most significant parts are the headers and the body of the email. The headers are analyzed to extract the following features:
- SPF (Sender Policy Framework)
- DKIM (DomainKeys Identified Mail)
- DMARC (Domain-based Message Authentication, Reporting & Conformance)
- If the sender domain is the same as the first in received headers
- The subject of the email
- The send date
- If the send date is compliant to the RFC 2822 and if it was sent from a valid time zone
- The date of the first received header
While the body is analyzed to extract the following features:
- If there are links
- If there are images
- If links are only http or https
- The percentage of the body that is written in uppercase
- The percentage of the body that contains blacklisted words
- The polarity of the body calculated with TextBlob
- The subjectivity of the body calculated with TextBlob
- If it contains mailto links
- If it contains javascript code
- If it contains html code
- If it contains html forms
The task could be solved in a programmatic way, chaining a long set of if
statements based on the features extracted from the email. However, this approach is not scalable and it is not easy to maintain. Moreover, it is not possible to improve the accuracy of the model without changing the code and, the most important, the analysis would be based on the conaissance of the programmer and not on the data. Since we live in the data era, we should use the data to solve the problem, not the programmer's knowledge. So I decided to use a machine learning algorithm to solve the problem using all the features extracted from the email.
spam-analyzer is available on PyPI, so you can install it with pip:
pip install spam-analyzer
For the latest version, you can install it from the source code:
git clone https://github.com/matteospanio/spam-analyzer.git
cd spam-analyzer
pip install .
spam-analyzer can be used as a CLI application:
Usage: spam-analyzer [OPTIONS] COMMAND [ARGS]...
A simple program to analyze emails.
Options:
-h, --help Show this message and exit.
-v, --verbose Enables verbose mode.
--version Show the version and exit.
-C, --config CONFIG_PATH Location of the configuration file. Supports glob
pattern of local path and remote URL.
Commands:
analyze Analyze emails from a file or directory.
configure Configure the program.
plugins Show all available plugins.
spam-analyzer analyze <file>
: classify the email given in inputspam-analyzer -v analyze <file>
: classify the email given in input and display a detailed analysis1spam-analyzer analyze -fmt json <file>
: classify the email given in input and display the result in JSON format (useful for integration with other programs)spam-analyzer analyze -fmt json -o <outpath> <file>
: classify the email given in input and write the result in JSON format in the file given in input2spam-analyzer analyze -l <wordlist> <file>
: classify the email given in input using the wordlist given in input
spam-analyzer
is thought to be highly configurable: on its first execution it will create a configuration file in ~/.config/spamanalyzer/
with some other default files. You can change the configuration file to customize the behavior of the program. At the moment of writing there are only paths to the wordlist and the model, but in the future there will be more options (e.g. senders blacklist and whitelist, a default path where to copy classified emails,...).
from spamanalyzer import SpamAnalyzer
analyzer = SpamAnalyzer(forbidden_words=["viagra", "cialis"])
analysis = await analyzer.analyze("path/to/email.txt")
The spamanalyzer
library provides a really simple interface to extract features from an email. The SpamAnalyzer
class provides the analyze
method that takes in input the path to the email and returns a SpamAnalyzer
object containing the analysis of the email.
Furthermore, the MailAnalysis
class provides the is_spam
method that returns True
if the email is spam, False
otherwise. Further examples are available in the folder examples
of the source code.
Contributions are welcome! Please read the contribution guidelines first.
spam-analyzer is licensed under the GPLv3 license.
Footnotes
-
The
--verbose
option is available only for the first use case, it will not work in combination with the--output-format
option. ↩ -
You should use the
--output-file
instead of the>
operator to write the output in a file, because thespam-analyzer
program prints some other information on the standard output while processing the email(s). ↩