Open Access   Article Go Back

Review Paper on Spam Detection Antiphishing Techniques

Namrata 1 , Suman 2

  1. Dept. of Computer science, DCRUST, Murthal, Sonipat, India.
  2. Dept. of Computer science, DCRUST, Murthal, Sonipat, India.

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-5 , Page no. 1156-1161, May-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i5.11561161

Online published on May 31, 2018

Copyright © Namrata, Suman . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Namrata, Suman, “Review Paper on Spam Detection Antiphishing Techniques,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.1156-1161, 2018.

MLA Style Citation: Namrata, Suman "Review Paper on Spam Detection Antiphishing Techniques." International Journal of Computer Sciences and Engineering 6.5 (2018): 1156-1161.

APA Style Citation: Namrata, Suman, (2018). Review Paper on Spam Detection Antiphishing Techniques. International Journal of Computer Sciences and Engineering, 6(5), 1156-1161.

BibTex Style Citation:
@article{_2018,
author = {Namrata, Suman},
title = {Review Paper on Spam Detection Antiphishing Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {1156-1161},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2124},
doi = {https://doi.org/10.26438/ijcse/v6i5.11561161}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.11561161}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2124
TI - Review Paper on Spam Detection Antiphishing Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - Namrata, Suman
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 1156-1161
IS - 5
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
724 310 downloads 244 downloads
  
  
           

Abstract

Internet nowadays is very important share of our day to day life solving many problems on a daily basis. It turns out to be a helping hand to human in so many ways. Among the many advantages of internet, one is sharing of knowledge. Email is that application which is used by all to fulfill the purpose of sharing information. Our email inbox contains some mails which are not required or are unwanted or whose sender is not an authorized person. These types of mails are called the Spam. To detect the spam among the required mails is one kind of hectic task. So many methods have been implemented for this. A spam could be in the form of picture or text which is very harmful for the computer. Thus, Spam has been categorized into the category of problems which occurs frequently and should be handled by the internet user with the help of some better technique. A number of methods have been designed to overcome the issue of spam messages and mail. Already implemented techniques for spam detection have been described in this paper.

Key-Words / Index Term

Email, Heuristics, Phishing, Supervised and unsupervised learning, Spam Filter

References

[1] Junod .J, “Serves to Spam: Drop Dead”, Computer and Security Elsevier, Vol.16, 1997
[2] Alaa H. Ahmed and Mohammed Mikki, “Improved Spam Detection using DBSCAN and Advanced Digest Algorithm”, International Journal of Computer Applications, Vol. 6 May 2013.
[3] Faraz Ahmed and Muhammad Abulaish, “An MCL Based Approach for Spam Profile Detection Social Network”, IEEE 11th International Conference on Trust, Security and Privacy.
[4] J. Vandana and Nidhi Sood, “Spam Detection System Using Hidden Markov Model”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume-3,Issue-7, July-2013
[5] R.Malarvizhi and K.Saraswathi, “Content – Based Spam Filtering and Detection Algorithms-An Efficient Analysis and Comparison”, International Journal of Engineering Trends and Technology, Vol.4,Issue 9,Septmber 2013
[6] LongfeiWu, Xiaojiang Du, Jie Wu. “Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms”, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY , AUGUST 2016.
[7] Guang-Gang Geng, Qiu-Dan Li and Xin-Chang Zhang, “Link Based Small Sample Learning for Web Spam Detection”, ACM, April 2009
[8] Loredana Firte, Camelia Lemnaru and Rodica Potolea, “Spam Detection Filter Using KNN Algorithm and Resampling”, IEEE Conference, 2010
[9] M.Basavaraju and Dr.R.Prahakar, “A Novel Method of Spam Mail Detection using Text Based Clustering Approach”, International journal of Computer Applications, Volume-5, August 2010
[10] Siddu p.Algur and Neha tarannumPendari, “Hybrid Spamicity Approach to web Spam Detection”, IEEE Conference on Pattern Recognition, Informatics and Medical Engineering, March 2012
[11] Saadat Nazirova, “Survey on Spam Filtering Techniques”, Communication and Network, August 2011
[12] Jae Woong Joo , Seo Yeon Moon, Saurabh Singh, Jong Hyuk Park. “S-Detector: an enhanced security model f for detecting Smishing attack for mobile computing” ,Springer 2017.
[13] Bottazzi, G., Casalicchio, E., Cingolani, D., Marturana, F., & Piu, M. (2015). MP-Shield: A framework for phishing detection in mobile devices. In 2015 IEEE International Conference on Computer and Information Technology.
[14] Zhang, J., & Wang, Y. (2012). A real-time automatic detection of phishing URLs. In: 2012 2nd International Conference on Computer Science and Network Technology (ICCSNT), IEEE (pp. 1212–1216).
[15] Foozy, C. F. M., Ahmad, R., & Abdollah, M. F. (2013). Phishing detection taxonomy for mobile device. International Journal of Computer Science Issues (IJCSI), 10(1), 338–344.
[16] Jiayi, M., Cui, A., & Rao, J. (2013). Android mobile security– threats and protection. In International Conference on Computer, Networks and Communication Engineering (ICCNCE 2013) (pp. 683-686). Atlantis Press, Paris
[17] Chaitrali Amrutkar, Young Seuk Kim, Patrick Traynor. “Detecting Mobile Malicious Webpages in Real Time”, IEEE Transactions on mobile computing, 2017.
[18] Abura`ed, Nour, et al. "Mobile phishing attack for Android platform." Innovations in Information Technology (INNOVATIONS), 2014 10th International Conference on. IEEE, 2014.
[19] Mukhopadhyay, Syamantak, and David Argles. "An Anti-Phishing mechanism for single sign-on based on QR-code." Information Society (i-Society), 2011 International Conference on. IEEE, 2011.
[20] T. A. Almeida, T. P. Silva, I. Santos, and J. M. G. Hidalgo, ‘‘Text normalization and semantic indexing to enhance instant messaging and SMS spam filtering,’’ Knowl.-Based Syst., vol. 108, pp. 25–32, Sep. 2016.
[21] Asmeeta Mali, “Spam Detection Using Baysian with Pattren Discovery”, International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-2, Issue-3, July 2013.
[22] T.-J. Liu, W.-L. Tsao and C.-L. Lee, “A High Performance Image-Spam Filtering System”, 19th International Symposium on distributed Computing and Application to Business, Engineering and Science, August 2010
[23] Ann Nossier, khaled kagati, and Islam Taj-Eddin, “Intelligent Word- Based Spam Filter Detection Using Multi Neural Networks”, International Journal of Computer Science Issues, Vol 10, Issues 2, No 1, March 2013 ISSN(Print): 1694 -0814|ISSN(Online): 1664- 0784
[24] Geerthik. S and Anish .T.P, “Filtering Spam: Current Trends and Techniques”, International Journal of Mechatronics, Electrical and Computer Technology Vol. 3(8), Jul, 2013, pp 208-223, ISSN: 2305-0543 © Austrian E-Journals of Universal Scientific Organization
[25] A. M. Adrian, ‘‘A challenge response system for filtering automated SMS spam,’’ M.S. thesis, Dept. Comput. Sci. Inf. Eng., Nat. Taiwan Univ. Sci. Technol., Taipei, Taiwan, 2010.

[26] L. Cao, G. Nie, and P. Liu, ‘‘Ontology-based spam detection filtering system,’’ in Proc. Int. Conf. Bus. Manage. Electron. Inf. (BMEI), May 2011, pp. 282–284.
[27]
K. Yadav, P. Kumaraguru, A. Goyal, A. Gupta, and V. Naik, ‘‘SMSAssas- sin: Crowdsourcing driven mobile-based system for SMS spam filtering,’’ in Proc. 12th Workshop Mobile Comput. Syst. Appl., 2011, pp. 1–6.
[28] I. Joe and H. Shim, ‘‘An SMS spam filtering system using support vector machine,’’ in Future Generation Information Technology. Berlin, Germany: Springer, 2010, pp. 577–584.
[29] I. Vural and H. Venter, ‘‘Detecting mobile spam botnets using artificial immune systems,’’ in Advances in Digital Forensics VII. Springer, 2011, pp. 183–192.
[30] D.-N. Sohn, J.-T. Lee, S.-W. Lee, J.-H. Shin, and H.-C. Rim, ‘‘Korean mobile spam filtering system considering characteristics of text messages,’’ J. Korea Acad.-Ind. Cooper. Soc., vol. 11, no. 7, pp. 2595–2602, 2010.
[31] B. Coskun and P. Giura, ‘‘Mitigating SMS spam by online detection of repetitive near-duplicate messages,’’ in Proc. IEEE Int. Conf. Commun. (ICC), Jun. 2012, pp. 999–1004.
[32] M.Z.Rafique,N.Alrayes,andM.K.Khan,‘‘Applicationofevolutionary algorithms in detecting SMS spam at access layer,’’ in Proc. 13th Annu. Conf. Genet. Evol. Comput., 2011, pp. 1787–1794.
[33] Gupta, S., & Sanghwan, S. (2015). Load balancing in cloud computing: A review. International Journal of Science, Engineering and Technology Research (IJSETR), 4(6).
[34] B. Reaves, L. Blue, D. Tian, P. Traynor, and K. R. B. Butler, ‘‘Detecting SMS spam in the age of legitimate bulk messaging,’’ in Proc. 9th ACM Conf. Secur. Privacy Wireless Mobile Netw., 2016, pp. 165–170.
[35] E.-S. M. El-Alfy and A. A. AlHasan, ‘‘Spam filtering framework for multimodal mobile communication based on dendritic cell algorithm,’’ Future Generat. Comput. Syst., vol. 64, pp. 98–107, Nov. 2016.
[36] Gupta, S., & Sanghwan, S. (2015). Load balancing in cloud computing: A review. International Journal of Science, Engineering and Technology Research (IJSETR), 4(6).