Analysis of Filtering Techniques for Spam Email Detection
A. Ahuja 1
- Department of Computer Science, Guru Nanak Dev University, Amritsar, India.
Section:Review Paper, Product Type: Journal Paper
Volume-6 ,
Issue-5 , Page no. 991-997, May-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i5.991997
Online published on May 31, 2018
Copyright © A. Ahuja . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: A. Ahuja, “Analysis of Filtering Techniques for Spam Email Detection,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.5, pp.991-997, 2018.
MLA Style Citation: A. Ahuja "Analysis of Filtering Techniques for Spam Email Detection." International Journal of Computer Sciences and Engineering 6.5 (2018): 991-997.
APA Style Citation: A. Ahuja, (2018). Analysis of Filtering Techniques for Spam Email Detection. International Journal of Computer Sciences and Engineering, 6(5), 991-997.
BibTex Style Citation:
@article{_2018,
author = {A. Ahuja},
title = {Analysis of Filtering Techniques for Spam Email Detection},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2018},
volume = {6},
Issue = {5},
month = {5},
year = {2018},
issn = {2347-2693},
pages = {991-997},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2098},
doi = {https://doi.org/10.26438/ijcse/v6i5.991997}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i5.991997}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2098
TI - Analysis of Filtering Techniques for Spam Email Detection
T2 - International Journal of Computer Sciences and Engineering
AU - A. Ahuja
PY - 2018
DA - 2018/05/31
PB - IJCSE, Indore, INDIA
SP - 991-997
IS - 5
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
613 | 286 downloads | 247 downloads |
Abstract
Email is considered to be one of the most effective ways of communication source. It has gained attention because of the fastest and cost-effective means of source of communication. But with the enormous increase in its usage leads to its exploitation as it has become fascinated approach for the today’s businesses. Email spam is the sending of unsolicited email in bulk to the randomly selected recipients for the purpose of advertising has become a serious concern. These unwanted emails not only occupy network bandwidth and memory space for communicating but can be used by the attackers in order to steal the user’s identity. By looking at the prevailing scenarios there is a need for a solution that can manage the spam issue quite efficiently. The goal of this paper is to provide insight into an issue of spam email, and the highlight of this paper is the key findings of filtering techniques used for spam detection based on analysis of the content and non-content part of email.
Key-Words / Index Term
Spamming, Whitelist, Blacklist, Greylist , ham, CR systems, Heuristics, Signatures
References
[1] Rekha, S. Negi, “ A Review on Different Spam Detection Approaches”, International Journal of Emerging Trends and Technology , Vol. 11, No.6, pp. 315-318, 2014.
[2] G. V. Cormack, T. R. Lynam, “On-line Supervised Spam Filter Evaluation” , ACM Transactions on Information Systems (TOIS), Vol.25, No.3, 2007.
[3] P. Sharma, U. Bhardwaj, “ Machine Learning Based Spam E-Mail Detection” , International Journal of Intelligent Engineering & Systems , Vol.11, No.3, pp. 1-10, 2018.
[4] R. Bansod, R. S. Mangrulkar, V.G.Bhujade, “Text and Image based Spam Email Classification using an ANN Model- an Approach”, International Journal on Recent and Innovation Trends in Computing and Communication , Vol. 3, No. 5, pp.115-118, 2015.
[5] O. Saad, A. Darwish, R. Faraj, “A Survey of machine learning techniques for Spam Filtering” , International Journal of Computer Science and Network Security, Vol.12, No.2, pp.66-73, 2012.
[6] H. Kaur, P. Verma, “SURVEY OF E-MAIL SPAM DETECTION USING SUPERVISED APPROACH WITH FEATURE SELECTION”, INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY (IJESRT) , Vol.6, No. 4, pp. 1-10, 2017.
[7] G. Fumera, I. Pillai, F. Roli, “ Spam Filtering Based On The Analysis Of Text Information Embedded Into Images” , Journal of Machine Learning Research, Vol.7, pp.2699-2720, 2006.
[8] A. Bhowmick, S. M. Hazarika, “ Advances in Electronics,Communication and Computing”, Springer Publication, Singapore, pp. 573-582, 2016
[9] C.C. Wang, S.Y. Chen, ‘Using Header Session Messages to Anti-Spamming’, Computers & Security, Vol.26, No.5, pp. 381-390, 2007.
[10] M. Z. Hayat, J. Basiri, L. Seyedhossein, A. Shakery, “Content-Based Concept Drift Detection for Email Spam Filtering”, In the Proceedings of 2010 5th International Symposium on TeleCommunications (IST’2010), pp. 531-536, 2010.
[11] O. Al-jarrah, I. Khater, B. Al-duwairi, “Identifying Potentially Useful Email Header Features for Email Spam Filtering”, In the Proceedings of The Sixth International Conference on Digital Society, pp. 140-145, 2012.
[12] E. P. Sanz, “E-mail Spam Filtering”, Advances in Computers, Vol. 74, pp. 45-114, 2008.
[13] M. Andreolini, A. Bulgarelli, M. Colajanni, F. Mazzoni, “Honeyspam : Honeypots Fighting Spam at the Source”, In the Proceedings of 2005 the Steps to Reducing Unwanted Traffic on the internet Workshop, Cambridge, MA, pp. 77-83, 2005.
[14] M. Dagar, R. Popli, “Honeypots: Virtual Network Intrusion Monitoring System”, International Journal of Scientific Research in Network Security and Communication, Vol. 6, No. 2, pp.45-49, 2018.
[15] D. Mallampati, “An Efficient Spam Filtering using Supervised Machine Learning Techniques”, International Journal of Scientific Research in Computer Sciences and Engineering”, Vol. 6, No. 2, pp.33-37, 2018.