A Review on Different Spam Detection Approaches
Journal: International Journal of Computer Techniques (Vol.4, No. 4)Publication Date: 2017-07-01
Authors : K.Ravikumar P.Gandhimathi;
Page : 6-9
Keywords : Spam Filtering; E-mail; Images; Text Tagging; Web Application Web Services;
Abstract
The spam mails are used by spammers to pilfer the data of the users and organizations online. Quick growth rate of the use of the internet has increased the spam mails. There are several methods employed for filtering spam. Most of the spam filtering techniques are based on objective methods such as the content filtering and DNS/reverse DNS checks. Recently, some cooperative subjective spam filtering techniques are proposed. Objective methods suffer from the false positive and false negative classification. Objective methods based on the content filtering are time con-suming and resource demanding. They are inaccurate and require continuous update to cope with newly invented spammer's tricks. On the other side, the existing subjective proposals have some drawbacks like the attacks from mali-cious users that make them unreliable and the privacy. In this paper, we propose an efficient spam filtering system that is based on a smart cooperative subjective technique for content filtering in addition to the fastest and the most reliable non-content-based objective methods. The growing use of internet has promoted an easy and fast way of ecommunication. The well-known example for this is E-MAIL. The increasing use of e-mail and the growing trend of Internet users sending unsolicited bulk e-mail, the need for an antispam filtering or have created, Filter large poster have been produced in this area, each with its own method and some parameters are to recognize spam.
Other Latest Articles
- Analysis & Induction Hardening On Excavator Pins
- Enhancing Data Security in Cloud Computing Growth Security
- Review of Load Flow Analysis for Three Phase Radial Distribution System
- A Buck-Boost AC-AC Converter Topology Eliminating Commutation Problem with Multiple Mode of Operations
- Secure Data Aggregation Using Multi objective Metaheuristic Approach for WSN
Last modified: 2018-05-18 20:41:17