A Robust Approach for Effective Spam Detection Using Supervised Learning Techniques

Authors

  • K Usha Rani  Associate Professor & HOD, Department of CSE, Bhoj Reddy Engineering College for Women, Hyderabad, Telangana, India
  • Dosala Srinishma  Department of CSE, Bhoj Reddy Engineering College for Women, Hyderabad, Telangana, India
  • Ancha Vidisha  Department of CSE, Bhoj Reddy Engineering College for Women, Hyderabad, Telangana, India

Keywords:

Collection of data, Authorization, Anomalous detection, Support Vector Machine, K-nearest neighbour, Spam.

Abstract

A collection of millions of devices with sensors and actuators that are linked via wired or wireless channels for data transmission. Over the last decade, it has grown rapidly, with more than 25 billion devices expected to be connected by 2020. The amount of data released by these devices will multiply many times over in the coming years. In addition to increased volume, the device generates a large amount of data in a variety of modalities with varying data quality defined by its speed in terms of time and position dependency. In such an environment, machine learning algorithms can play an important role in ensuring biotechnology based security and authorization, as well as anomalous detection to improve usability and security. On the other hand, attackers frequently use learning algorithms to exploit system vulnerabilities. As a result of these considerations, we propose that the security of devices be improved by employing machine learning to detect spam. Spam Detection Using Machine Learning Framework is proposed to attain this goal. Four machine learning models are assessed using multiple metrics and a vast collection of input feature sets in this framework. Each model calculates a spam score based on the input attributes that have been adjusted. This score represents the device's trustworthiness based on a variety of factors. In comparison to other current systems, the findings collected demonstrate the effectiveness of the proposed method.

References

  1. Aaisha Makkar, Sahil (GE) Garg, Neeraj Kumar, M. Shamim Hossain, Ahmed Ghoneim, Mubarak Alrashoud,”An Efficient Spam Detection Technique for IoT Devices using Machine Learning” ,IEEE Transactions on Industrial Informatics ( Volume: 17, Issue: 2, Feb. 2021)
  2. Z. K. Zhang, M. C. Y. Cho, C.-W. Wang, C.-W. Hsu, C.-K. Chen, andS. Shieh, “Iot security: ongoing challenges and research opportunities,”in 2014 IEEE 7th international conference on service-oriented computing and applications. IEEE, 2014, pp. 230–234.
  3. A. Dorri, S. S. Kanhere, R. Jurdak, and P. Gauravaram, “Blockchain for iot security and privacy: The case study of a smarthome,” in 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops). IEEE, 2017, pp. 618–623.
  4. E. Bertino and N. Islam, “Botnets and internet of things security,” Computer, no. 2, pp. 76–79, 2017.
  5. C. Zhang and R. Green, “Communication security in internet of thing: preventive measure and avoid ddos attack over iot network,” Proceedings of the 18th Symposium on Communications & Networking. Society for Computer Simulation International, 2015, pp. 8–15.
  6. W. Kim, O.-R. Jeong, C. Kim, and J. So, “The dark side of the internet: Attacks, costs and responses,” Information systems, vol. 36, no. 3, pp.675–705, 2011.
  7. H. Eun, H. Lee, and H. Oh, “Conditional privacy preserving security protocol for nfc applications,” IEEE Transactions on Consumer Electronics, vol. 59, no. 1, pp. 153–160, 2013.
  8. R. V. Kulkarni and G. K. Venayagamoorthy, “Neural network based secure media access control protocol for wireless sensor networks,” in 2009 International Joint Conference on Neural Networks. IEEE, 2009, pp. 1680–1687.
  9. M. A. Alsheikh, S. Lin, D. Niyato, and H.-P. Tan, “Machine learning in wireless sensor networks: Algorithms, strategies, and applications,”IEEE Communications Surveys & Tutorials, vol. 16, no. 4, pp. 1996–2018, 2014.
  10. A. L. Buczak and E. Guven, “A survey of data mining and machine learning methods for cyber security intrusion detection,” IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1153–1176, 2015.
  11. F. A. Narudin, A. Feizollah, N. B. Anuar, and A. Gani, “Evaluation of machine learning classifiers for mobile malware detection,” Soft Computing, vol. 20, no. 1, pp. 343–357, 2016.
  12. N. Sutta, Z. Liu, and X. Zhang, “A study of machine learningalgorithms on email spam classification,” in Proceedings of the 35th International Conference, ISC High Performance 2020, vol. 69, pp. 170–179,Frankfurt,Germa.
  13. L. Xiao, Y. Li, X. Huang, and X. Du, “Cloud-based malware detection game for mobile devices with offloading,” IEEE Transactions on Mobile Computing, vol. 16, no. 10, pp. 2742–2750, 2017.
  14. J. W. Branch, C. Giannella, B. Szymanski, R. Wolff, and H. Kargupta, “In-network outlier detection in wireless sensor networks,” Knowledge and information systems, vol. 34, no. 1, pp. 23–54, 2013.
  15. I. Jolliffe, Principal component analysis. Springer, 2011.

Downloads

Published

2023-07-09

Issue

Section

Research Articles

How to Cite

[1]
K Usha Rani, Dosala Srinishma, Ancha Vidisha "A Robust Approach for Effective Spam Detection Using Supervised Learning Techniques" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 10, Issue 4, pp.49-54, July-August-2023.