Skip to main content

Handling Web Spamming Using Logic Approach

  • Conference paper
  • First Online:
Advances in Computing and Data Sciences (ICACDS 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 906))

Included in the following conference series:

  • 864 Accesses

Abstract

In the current years, we’ve seen a sensational addition within the volume of spam email. Other connected types of spam are increasingly uncovering as an issue of significance, extraordinarily the spam on Instant electronic messaging administrations, and Short Message Service (SMS) or portable spam. Like email spam, the SMS spam issue is drawn nearer with lawful, monetary or specialized measures. Among the extensive variety of specialized measures. There are two types of messages, first one is wanted messages from those people whom we know and other is unsolicited or unwanted messages, these unsolicited messages are called spams. Over the last 1.5 decade it has become a very big problem. Every day a very huge amount of spam messages is received by the users. This paper introduces an approach to classify the messages into spam/legitimate categories using the Rapid miner tool. In this Paper we have used Stop-word Removal in initial stages to filter spam of a Spam SMS Dataset on the basis of Content Based Filtering Technique. Then after getting the desired result that is when we have filtered the Messages. After that we have applied Nave-Bayes Classification with the Help of Rapid-Miner Tool which will help us in getting the desired out-come that is These messages will get categorized into Spam (bad) messages and Ham (Good) messages. This paper endeavors to order the predominant famous procedures for arranging messages as spam or ham and recommend the possible techniques

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hidalgo, G., Mara, J., et al.: Content based SMS spam filtering. In: Proceedings of the 2006 ACM Symposium on Document Engineering, pp. 107–114. ACM (2006)

    Google Scholar 

  2. Kanchan, H., Laxmi, A., Mutto, S.K.: Approaches for web spam detection. Int. J. Comput. Appl. 101(1), 38–44 (2014)

    Google Scholar 

  3. Zhu, Z.: Research on spam filtering techniques and trend analysis. IPASJ Int. J. Manag. (IIJM) 3(8), 16–19 (2015)

    Google Scholar 

  4. Hall, R.J.: How to avoid unwanted email. Commun. ACM 41, 88–95 (1998)

    Article  Google Scholar 

  5. Rathod, S.B., Pattewar, T.M.: Content based spam detection in email using Bayesian classifier. In: IEEE ICCSP 2015 Conference, pp. 1257–1261 (2015)

    Google Scholar 

  6. Sain, J.R., Raulji, J.K.: Stop-word removal algorithm and its implementation for Sanskrit language. Int. J. Comput. Appl. 150(2), 15–17 (2016)

    Google Scholar 

  7. Rekha, S.N.: A review on different spam detection approaches. Int. J. Eng. Trends Technol. (IJETT) 11(6), 315–318 (2014)

    Article  Google Scholar 

  8. Chuan, Z., Lu, X.-I., Zhou, X., Hou, M.: An improved Bayesian with application to anti-spam email. J. Electron. Sci. Technol. China 3(1), 30–33 (2005)

    Google Scholar 

  9. Ranganayakulu, D., Chellappan, C.: Detecting malicious URLs in E-Mail: an implementation. In: AASRl Conference on Intelligent Systems and Control, vol. 4, pp. 125–131 (2013)

    Article  Google Scholar 

  10. Sahami, M., Dumais, S., Heckerman, D., Horvitz, E.: A Bayesian approach to filtering junk e-mail. AAAi Technical report, WS-98-05, pp. 55–62

    Google Scholar 

  11. Christina, V.: A study on email spam filtering techniques. Int. J. Comput. Appl. 12(1), 7–9 (2010)

    Google Scholar 

  12. Ariaeinejad, R., Sadeghian, A.: Spam detection system: a new approach based on interval type-2 fuzzy sets. In: 2011 24th Canadian Conference on Electrical and Computer Engineering (CCECE), pp. 000379–000384. IEEE (2011)

    Google Scholar 

  13. Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Sakkis, G., Spy-ropoulos, C.D., Stamatopoulos, P.: Learning to filter spam e-mail: a comparison of a naive bayesian and a memory based approach. In: Proceedings of the Workshop on Machine Learning and Textual information Access, 4th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD 2000), pp. 1–13 (2000)

    Google Scholar 

  14. Qi, M., Mousoli, R.: Semantic analysis for spam filtering. In: International Conference on Fuzzy Systems and Knowledge Discovery, vol. 6, pp. 2914–2917 (2010)

    Google Scholar 

  15. Chuan, Z., Lu, X.-I., Zhou, X., Hou, M.: An improved Bayesian with application to anti-spam email. J. Electron. Sci. Technol. China 3(1) (2005)

    Google Scholar 

  16. Geerthik, S., Anish, T.P.: Filtering spam: current trends and techniques. Int. J. Mechatron. Electr. Comput. Technol. 3(8), 208–223 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Laxmi Ahuja .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ahuja, L. (2018). Handling Web Spamming Using Logic Approach. In: Singh, M., Gupta, P., Tyagi, V., Flusser, J., Ören, T. (eds) Advances in Computing and Data Sciences. ICACDS 2018. Communications in Computer and Information Science, vol 906. Springer, Singapore. https://doi.org/10.1007/978-981-13-1813-9_38

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1813-9_38

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1812-2

  • Online ISBN: 978-981-13-1813-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics