Spam detection approaches with case study implementation on spam corpora

Biju Issac*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

Email has been considered as one of the most efficient and convenient ways of communication since the users of the Internet has increased rapidly. E-mail spam, known as junk e-mail, UBE (unsolicited bulk e-mail) or UCE (unsolicited commercial e-mail), is the act of sending unwanted e-mail messages to e-mail users. Spam is becoming a huge problem to most users since it clutter their mailboxes and waste their time to delete all the spam before reading the legitimate ones. They also cost the user money with dial up connections, waste network bandwidth and disk space and make available harmful and offensive materials. In this chapter, initially we would like to discuss on existing spam technologies and later focus on a case study. Though many anti-spam solutions have been implemented, the Bayesian spam detection approach looks quite promising. A case study for spam detection algorithm is presented and its implementation using Java is discussed, along with its performance test results on two independent spam corpuses - Ling-spam and Enron-spam. We use the Bayesian calculation for single keyword sets and multiple keywords sets, along with its keyword contexts to improve the spam detection and thus to get good accuracy. The use of porter stemmer algorithm is also discussed to stem keywords which can improve spam detection efficiency by reducing keyword searches.

Original languageEnglish
Title of host publicationCases on ICT Utilization, Practice and Solutions
Subtitle of host publicationTools for Managing Day-to-Day Issues
PublisherIGI Global
Chapter12
Pages194-212
Number of pages19
ISBN (Electronic)9781609600174
ISBN (Print)9781609600150
DOIs
Publication statusPublished - 1 Dec 2010
Externally publishedYes

Fingerprint Dive into the research topics of 'Spam detection approaches with case study implementation on spam corpora'. Together they form a unique fingerprint.

Cite this