Abstract
Bandwidth, time, and storage space are the major three assets in computational world. Spam emails affect all the three, thus degrade the overall efficiency of the system. Spammers are using new tricks and traps to land these frivolous mails into our inbox. To make mailboxes more intelligent, our effort will be to devise a new algorithm that will help to classify emails in much smarter and efficient way. This paper analyzes various spam classification techniques and thereby put forward a new way of classifying spam emails. This paper thoroughly compares the results that various authors have got while simulating their architectures. Our approach of classification works efficiently and more accurately on varied length and type of datasets during training and testing phases. We tried to minimize the error ratio and increase classifier efficiency by implementing Genetic Algorithm concept.
References
N. Sarwat, M. Nasrullah, G. Mathies, and M. Dong Duong Nguyen, “Detection of fraudulent emails by employing advanced feature abundance,” Egyptian Informatics Journal (2014) 15, 169–174.
S. Nizamani, N. Memon and P. Karampelas, “A text classification model by clustering,” International conference on advances in social networks analysis and mining (ASONAM), IEEE; 2011. p. 461–7.
S. Nazirova, Survey on Spam Filtering Techniques Communications and Network 2011, 3, 153 160.
J. Ramos, “Using TF-IDF to determine word relevance in document queries,” In: Proceedings of the first instructional conference on machine learning; 2003.
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, IH. Witten, “The WEKA data mining software: an update,” ACM SIGKDD Explor Newsl 2009;11(1):10–8.
Androutsopoulos, G. Paliouras, V. Karkaletsis, G. Sakkis, C. Spyropoulos, and P. Stamatopoulos, “Machine Learning and Textual Information Access”, 4th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD), pages 1–13, 2000.
S. Nizamani, Memon, N., Wiil U.K., and Karampelas, P., “Modeling suspicious email detection using enhanced feature selection,” Int. J. Modeling and Optimization, vol. 2, pp. 371–377, 2012.
S. Nizamani, N. Memon, UK. Wiil and P. Karampelas, “CCM: a text classification model by clustering,” In: 2011 International conference on advances in social networks analysis and mining (ASONAM), IEEE; 2011. p. 461–7.
A. McCallum, K. Nigam, “A comparison of event models for Naïve Bayes text classification,” In: AAAI-98 workshop on learning for text categorization, vol. 752; 1998. p. 41–8.
W.A. Awad and S.M. ELseuofi, International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 1, Feb 2011.
Wang, Huiyu, Kai Lei, and Kuai Xu. “Profiling the followers of the most influential and verified users on Sina Weibo”, 2015 IEEE International Conference on Communications (ICC), 2015.
S. Puri, D. Gosain, M. Ahuja, I. Kathuria, and N. Jatana, “comparison and analysis of spam detection algorithms,” International Journal of Application or Innovation in Engineering & Management Volume 2, Issue 4, April 2013.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shah, N.F., Kumar, P. (2018). A Comparative Analysis of Various Spam Classifications. In: Sa, P., Sahoo, M., Murugappan, M., Wu, Y., Majhi, B. (eds) Progress in Intelligent Computing Techniques: Theory, Practice, and Applications. Advances in Intelligent Systems and Computing, vol 719. Springer, Singapore. https://doi.org/10.1007/978-981-10-3376-6_29
Download citation
DOI: https://doi.org/10.1007/978-981-10-3376-6_29
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3375-9
Online ISBN: 978-981-10-3376-6
eBook Packages: EngineeringEngineering (R0)