Skip to main content

2018 | OriginalPaper | Buchkapitel

A Comparative Analysis of Various Spam Classifications

verfasst von : Nasir Fareed Shah, Pramod Kumar

Erschienen in: Progress in Intelligent Computing Techniques: Theory, Practice, and Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Bandwidth, time, and storage space are the major three assets in computational world. Spam emails affect all the three, thus degrade the overall efficiency of the system. Spammers are using new tricks and traps to land these frivolous mails into our inbox. To make mailboxes more intelligent, our effort will be to devise a new algorithm that will help to classify emails in much smarter and efficient way. This paper analyzes various spam classification techniques and thereby put forward a new way of classifying spam emails. This paper thoroughly compares the results that various authors have got while simulating their architectures. Our approach of classification works efficiently and more accurately on varied length and type of datasets during training and testing phases. We tried to minimize the error ratio and increase classifier efficiency by implementing Genetic Algorithm concept.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat N. Sarwat, M. Nasrullah, G. Mathies, and M. Dong Duong Nguyen, “Detection of fraudulent emails by employing advanced feature abundance,” Egyptian Informatics Journal (2014) 15, 169–174. N. Sarwat, M. Nasrullah, G. Mathies, and M. Dong Duong Nguyen, “Detection of fraudulent emails by employing advanced feature abundance,” Egyptian Informatics Journal (2014) 15, 169–174.
2.
Zurück zum Zitat S. Nizamani, N. Memon and P. Karampelas, “A text classification model by clustering,” International conference on advances in social networks analysis and mining (ASONAM), IEEE; 2011. p. 461–7. S. Nizamani, N. Memon and P. Karampelas, “A text classification model by clustering,” International conference on advances in social networks analysis and mining (ASONAM), IEEE; 2011. p. 461–7.
3.
Zurück zum Zitat S. Nazirova, Survey on Spam Filtering Techniques Communications and Network 2011, 3, 153 160. S. Nazirova, Survey on Spam Filtering Techniques Communications and Network 2011, 3, 153 160.
4.
Zurück zum Zitat J. Ramos, “Using TF-IDF to determine word relevance in document queries,” In: Proceedings of the first instructional conference on machine learning; 2003. J. Ramos, “Using TF-IDF to determine word relevance in document queries,” In: Proceedings of the first instructional conference on machine learning; 2003.
5.
Zurück zum Zitat M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, IH. Witten, “The WEKA data mining software: an update,” ACM SIGKDD Explor Newsl 2009;11(1):10–8. M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, IH. Witten, “The WEKA data mining software: an update,” ACM SIGKDD Explor Newsl 2009;11(1):10–8.
6.
Zurück zum Zitat Androutsopoulos, G. Paliouras, V. Karkaletsis, G. Sakkis, C. Spyropoulos, and P. Stamatopoulos, “Machine Learning and Textual Information Access”, 4th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD), pages 1–13, 2000. Androutsopoulos, G. Paliouras, V. Karkaletsis, G. Sakkis, C. Spyropoulos, and P. Stamatopoulos, “Machine Learning and Textual Information Access”, 4th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD), pages 1–13, 2000.
7.
Zurück zum Zitat S. Nizamani, Memon, N., Wiil U.K., and Karampelas, P., “Modeling suspicious email detection using enhanced feature selection,” Int. J. Modeling and Optimization, vol. 2, pp. 371–377, 2012. S. Nizamani, Memon, N., Wiil U.K., and Karampelas, P., “Modeling suspicious email detection using enhanced feature selection,” Int. J. Modeling and Optimization, vol. 2, pp. 371–377, 2012.
8.
Zurück zum Zitat S. Nizamani, N. Memon, UK. Wiil and P. Karampelas, “CCM: a text classification model by clustering,” In: 2011 International conference on advances in social networks analysis and mining (ASONAM), IEEE; 2011. p. 461–7. S. Nizamani, N. Memon, UK. Wiil and P. Karampelas, “CCM: a text classification model by clustering,” In: 2011 International conference on advances in social networks analysis and mining (ASONAM), IEEE; 2011. p. 461–7.
9.
Zurück zum Zitat A. McCallum, K. Nigam, “A comparison of event models for Naïve Bayes text classification,” In: AAAI-98 workshop on learning for text categorization, vol. 752; 1998. p. 41–8. A. McCallum, K. Nigam, “A comparison of event models for Naïve Bayes text classification,” In: AAAI-98 workshop on learning for text categorization, vol. 752; 1998. p. 41–8.
10.
Zurück zum Zitat W.A. Awad and S.M. ELseuofi, International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 1, Feb 2011. W.A. Awad and S.M. ELseuofi, International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 1, Feb 2011.
11.
Zurück zum Zitat Wang, Huiyu, Kai Lei, and Kuai Xu. “Profiling the followers of the most influential and verified users on Sina Weibo”, 2015 IEEE International Conference on Communications (ICC), 2015. Wang, Huiyu, Kai Lei, and Kuai Xu. “Profiling the followers of the most influential and verified users on Sina Weibo”, 2015 IEEE International Conference on Communications (ICC), 2015.
12.
Zurück zum Zitat S. Puri, D. Gosain, M. Ahuja, I. Kathuria, and N. Jatana, “comparison and analysis of spam detection algorithms,” International Journal of Application or Innovation in Engineering & Management Volume 2, Issue 4, April 2013. S. Puri, D. Gosain, M. Ahuja, I. Kathuria, and N. Jatana, “comparison and analysis of spam detection algorithms,” International Journal of Application or Innovation in Engineering & Management Volume 2, Issue 4, April 2013.
Metadaten
Titel
A Comparative Analysis of Various Spam Classifications
verfasst von
Nasir Fareed Shah
Pramod Kumar
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3376-6_29