vioft2nntf2t|tblJournal|Abstract_paper|0xf4ffc29b080000007464010001000500 E-mail is one of the most popular and frequently used ways of communication due to its worldwide accessibility, relatively fast message transfer, and low sending cost. The flaws in the e-mail protocols and the increasing amount of electronic business and financial transactions directly contribute to the increase in e-mail-based threats. Email spam is one of the major problems of the today’s Internet, bringing financial damage to companies and annoying individual users. Spam emails are invading users without their consent and filling their mail boxes. They consume more network capacity as well as time in checking and deleting spam mails. The vast majority of Internet users are outspoken in their disdain for spam, although enough of them respond to commercial offers that spam remains a viable source of income to spammers. While most of the users want to do right think to avoid and get rid of spam, they need clear and simple guidelines on how to behave. In spite of all the measures taken to eliminate spam, they are not yet eradicated. Also when the counter measures are over sensitive, even legitimate emails will be eliminated. Among the approaches developed to stop spam, filtering is the one of the most important technique. Many researches in spam filtering have been centered on the more sophisticated classifier-related issues. In recent days, Machine learning for spam classification is an important research issue. The effectiveness of the proposed work is explores and identifies the use of different learning algorithms for classifying spam messages from e-mail. A comparative analysis among the algorithms has also been presented.
T. HamsapriyaM1, D. Karthika Renuka2 and M. Raja Chakkaravarthi3 PSG College of Technology, Tamil Nadu, India
Machine Learning, J48, MLP, Naive Bayesian, Spam Classification,
FBL, Feature Subset Selection
January | February | March | April | May | June | July | August | September | October | November | December |
1 | 0 | 1 | 0 | 3 | 3 | 2 | 0 | 2 | 0 | 0 | 0 |
| Published By : ICTACT
Published In :
ICTACT Journal on Communication Technology ( Volume: 2 , Issue: 4 , Pages: 457-462 )
Date of Publication :
December 2011
Page Views :
696
Full Text Views :
17
|