Skip to main content

A Comparative Analysis of Various Spam Classifications

  • Conference paper
  • First Online:
Progress in Intelligent Computing Techniques: Theory, Practice, and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 719))

Abstract

Bandwidth, time, and storage space are the major three assets in computational world. Spam emails affect all the three, thus degrade the overall efficiency of the system. Spammers are using new tricks and traps to land these frivolous mails into our inbox. To make mailboxes more intelligent, our effort will be to devise a new algorithm that will help to classify emails in much smarter and efficient way. This paper analyzes various spam classification techniques and thereby put forward a new way of classifying spam emails. This paper thoroughly compares the results that various authors have got while simulating their architectures. Our approach of classification works efficiently and more accurately on varied length and type of datasets during training and testing phases. We tried to minimize the error ratio and increase classifier efficiency by implementing Genetic Algorithm concept.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. N. Sarwat, M. Nasrullah, G. Mathies, and M. Dong Duong Nguyen, “Detection of fraudulent emails by employing advanced feature abundance,” Egyptian Informatics Journal (2014) 15, 169–174.

    Google Scholar 

  2. S. Nizamani, N. Memon and P. Karampelas, “A text classification model by clustering,” International conference on advances in social networks analysis and mining (ASONAM), IEEE; 2011. p. 461–7.

    Google Scholar 

  3. S. Nazirova, Survey on Spam Filtering Techniques Communications and Network 2011, 3, 153 160.

    Google Scholar 

  4. J. Ramos, “Using TF-IDF to determine word relevance in document queries,” In: Proceedings of the first instructional conference on machine learning; 2003.

    Google Scholar 

  5. M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, IH. Witten, “The WEKA data mining software: an update,” ACM SIGKDD Explor Newsl 2009;11(1):10–8.

    Google Scholar 

  6. Androutsopoulos, G. Paliouras, V. Karkaletsis, G. Sakkis, C. Spyropoulos, and P. Stamatopoulos, “Machine Learning and Textual Information Access”, 4th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD), pages 1–13, 2000.

    Google Scholar 

  7. S. Nizamani, Memon, N., Wiil U.K., and Karampelas, P., “Modeling suspicious email detection using enhanced feature selection,” Int. J. Modeling and Optimization, vol. 2, pp. 371–377, 2012.

    Google Scholar 

  8. S. Nizamani, N. Memon, UK. Wiil and P. Karampelas, “CCM: a text classification model by clustering,” In: 2011 International conference on advances in social networks analysis and mining (ASONAM), IEEE; 2011. p. 461–7.

    Google Scholar 

  9. A. McCallum, K. Nigam, “A comparison of event models for Naïve Bayes text classification,” In: AAAI-98 workshop on learning for text categorization, vol. 752; 1998. p. 41–8.

    Google Scholar 

  10. W.A. Awad and S.M. ELseuofi, International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 1, Feb 2011.

    Google Scholar 

  11. Wang, Huiyu, Kai Lei, and Kuai Xu. “Profiling the followers of the most influential and verified users on Sina Weibo”, 2015 IEEE International Conference on Communications (ICC), 2015.

    Google Scholar 

  12. S. Puri, D. Gosain, M. Ahuja, I. Kathuria, and N. Jatana, “comparison and analysis of spam detection algorithms,” International Journal of Application or Innovation in Engineering & Management Volume 2, Issue 4, April 2013.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nasir Fareed Shah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Shah, N.F., Kumar, P. (2018). A Comparative Analysis of Various Spam Classifications. In: Sa, P., Sahoo, M., Murugappan, M., Wu, Y., Majhi, B. (eds) Progress in Intelligent Computing Techniques: Theory, Practice, and Applications. Advances in Intelligent Systems and Computing, vol 719. Springer, Singapore. https://doi.org/10.1007/978-981-10-3376-6_29

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3376-6_29

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3375-9

  • Online ISBN: 978-981-10-3376-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics