An Improvised Email Spam Detection using FSSDL-ESDC Model
Keywords:
Email spams, Spam filtering, Machine learning, Feature selection, Classification, MetaheuristicsAbstract
Email is a commonly available communication technology used to share information among people via the Internet. But the drastic upsurge in email misuses/abuses has led to a rising quantity of spam emails in recent times. Spam email classification by the use of data mining and machine learning (ML) models has gained significant attention among researchers owing to the positive effect on saving Internet users. Different ML and feature selection (FS) techniques can be employed to design effective email spam detection and classification approaches. In this aspect, this paper devises a novel feature subset selection with deep learning-based email spam detection and classification (FSSDL-ESDC) technique. The FSSDL-ESDC technique encompasses two major processes namely tokenization and stops word removal. In addition, a feature selection approach based on fruitfly optimization (FFO) is used to find an optimum subset of characteristics. Furthermore, for the categorization of email spam, the bidirectional long short-term memory (BiLSTM) approach is applied. In order to boost the email spam detection performance of the BiLSTM model, grasshopper optimization algorithm (GOA) is applied to finely tune the hyper parameters of the BiLSTM model. The improved performance of the FSSDL-ESDC approach is shown by a rigorous simulation study. The experimental results demonstrated that the FSSDL-ESDC approach outperformed the other state-of-the-art procedures.
Downloads
References
S. Youn, 2014. SPONGY (SPamONtoloGY): Email classification using two-level dynamic ontology. The Scientific World Journal, 2014.
S. Youn and D. McLeod, A comparative study for email classification,in Proceedings of the International Joint Conferences on Computer, Information, System Sciences, and Engineering (CISSE ’06), Bridgeport, Conn, USA, December 2006.
I. Androutsopoulos, G.Paliouras, and E. Michelakis, Learning to filter unsolicited commercial E-Mail NCSR “Demokritos,Tech. Rep. 2004/2, March 2004.
S. Shankar and G. Karypis, Weight adjustment schemes for a centroid based classifier,Computer Science Technical Report TR00-035, 2000.
R.MAlguliev,.,Aliguliyev, R.M. and Nazirova, S.A., 2011. Classification of textual e-mail spam using data mining techniques. Applied Computational Intelligence and Soft Computing, 2011.
M. L. Sang, S. K. Dong, and S. P. Jong, Spam detection using feature selection and parameters optimization,in Proceedings of the 4th International Conference on Complex, Intelligent and Software Intensive Systems, (CISIS ’10), pp. 883–888, Krakow , Poland, February 2010.
C. Paulo, L. Clotilde, S. Pedro et al., Symbiotic data mining for personalized spam filtering,in Proceedings of the International Conference on Web Intelligence and Intelligent Agent Technology, (IEEE/WIC/ACM), pp. 149–156, 2009.
P. Cortez, C. Lopes, P. Sousa, M.Rocha, and M. Rio, 2009. Symbiotic data mining for personalized spam filtering. In 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (Vol. 1, pp. 149-156). IEEE.
S.J. Murdoch, and R. Anderson, 2008. Tools and technology of Internet filtering. Access denied: The practice and policy of global internet filtering, 1(1), p.58.
B. Ahmed, 2020. Wrapper Feature Selection Approach Based on Binary Firefly Algorithm for Spam E-mail Filtering. Journal of Soft Computing and Data Mining, 1(2), pp.44-52.
M.Shuaib, S.I.M. Abdulhamid, O.S. Adebayo, O. Osho, I. Idris, J.K.Alhassan, and N. Rana, 2019. Whale optimization algorithm-based email spam feature selection method using rotation forest algorithm for classification.
A. Zamir,H.U. Khan, W. Mehmood, T.Iqbal, and A.U. Akram, 2020. A feature-centric spam email detection model using diverse supervised machine learning algorithms. The Electronic Library.
R.T. Pashiri, Y.Rostami, and M. Mahrami, 2020. Spam detection through feature selection using artificial neural network and sine–cosine algorithm. Mathematical Sciences, 14(3), pp.193-199.
M. Singh, 2019. Classification of spam email using intelligent water drops algorithm with naive bayes classifier. In Progress in Advanced Computing and Intelligent Engineering (pp. 133-138). Springer, Singapore.
R. Nayak, S.A.Jiwani, and B. Rajitha, 2021. Spam email detection using machine learning algorithm. Materials Today: Proceedings.
A.J. Saleh, A. Karim, B. Shanmugam, S. Azam, K. Kannoorpatti, M.Jonkman, and F.D. Boer, 2019. An intelligent spam detection model based on artificial immune system. Information, 10(6), p.209.
A.A. Akinyelu, and A.O. Adewumi, 2014. Classification of phishing email using random forest machine learning technique. Journal of Applied Mathematics, 2014.
L. GuangJun, S. Nazir, H.U. Khan, andA.UHaq, 2020. Spam detection approach for secure mobile message communication using machine learning algorithms. Security and Communication Networks, 2020.
M. Fayaz, A. Khan,J.U. Rahman,A. Alharbi,Uddin, M.I. and Alouffi, B., 2020. Ensemble Machine Learning Model for Classification of Spam Product Reviews. Complexity, 2020.
S. Gibson, B. Issac,L. Zhang, andS.M. Jacob, 2020. Detecting Spam Email with Machine Learning Optimized with Bio-Inspired Meta-Heuristic Algorithms. IEEE Access.
Q.K. Pan, H.Y. Sang,J.H. Duan, andL. Gao, 2014. An improved fruit fly optimization algorithm for continuous function optimization problems. Knowledge-Based Systems, 62, pp.69-83.
F. Long, K. Zhou, andW. Ou, 2019. Sentiment analysis of text based on bidirectional LSTM with multi-head attention. IEEE Access, 7, pp.141960-141969.
H. Jia, Y. Li,C. Lang,X. Peng, K.Sun, and J. Li, 2019. Hybrid grasshopper optimization algorithm and differential evolution for global optimization. Journal of Intelligent & Fuzzy Systems, 37(5), pp.6899-6910.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.