Filtering Network Spam Message using Approximated Logistic Regression
نویسندگان
چکیده
The development of telecom network and Internet provides effective ways for communication. As an important way in communication, Short Messaging Service (SMS) via both telecom network and Internet has played an increasing important role in daily life. However, it usually suffers from spam SMS that causes misunderstanding and cheat. The highly varying content, network environment make the identification of spam message difficult. Although the previous methods to some extent can filter the spam messages, it usually fails to capture the semantic information because it simply relies on keywords. Thus, its accuracy is not satisfied enough. Also, their further applications to some difficult situations of spam SMS filtering are still limited by their shortcomings, i.e., their adaptation ability to network environment and their robustness to noise. Therefore, high efficiency spam SMS filtering method is of greatly important. In this paper, to overcome the shortcomings of previous methods for spam message filtering, we propose a new approach, linear discrimination based keyword selection with approximated logistic regression (KW-ALR). The proposed approach KW-ALR first extracts feature or keywords using linear discrimination analysis, and then trains spam recognition model based on approximated logistic regression over the extraced keywords. We evaluate the proposed approach KW-ALR over a standard data set SMS Spam Collection. The experimental result shows that our method KW-ALR for spam message filtering achieves higher accuracy over other methods.
منابع مشابه
Feature Weight Optimization Mechanism for Email Spam Detection based on Two-Step Clustering Algorithm and Logistic Regression Method
This research proposed an improved filtering spam technique for suspected emails, messages based on feature weight and the combination of two-step clustering and logistic regression algorithm. Unique, important features are used as the optimum input for a hybrid proposed approach. This study adopted a spam detector model based on distance measure and threshold value. The aim of this model was t...
متن کاملPrivacy Preserving Spam Filtering
Email is a private medium of communication, and the inherent privacy constraints form a major obstacle in developing effective spam filtering methods which require access to a large amount of email data belonging to multiple users. To mitigate this problem, we envision a privacy preserving spam filtering system, where the server is able to train and evaluate a logistic regression based spam cla...
متن کاملAn Effective Model for SMS Spam Detection Using Content-based Features and Averaged Neural Network
In recent years, there has been considerable interest among people to use short message service (SMS) as one of the essential and straightforward communications services on mobile devices. The increased popularity of this service also increased the number of mobile devices attacks such as SMS spam messages. SMS spam messages constitute a real problem to mobile subscribers; this worries telecomm...
متن کاملEvaluation of Anti-spam Method Combining Bayesian Filtering and Strong Challenge and Response
Recently, various schemes against spam are proposed because of rapid increasing of spam. Some schemes are based on sender whitelisting with auto registration, a principle that a recipient reads only messages from senders who are registered by the recipient, and a sender have to perform some procedure to be registered (challenge-response.) In these schemes, some exceptions are required to show e...
متن کاملTowards Proactive Spam Filtering
With increasing security measures in network services, remote exploitation is getting harder. As a result, attackers concentrate on more reliable attack vectors like email: victims are infected using either malicious attachments or links leading to malicious websites. Therefore efficient filtering and blocking methods for spam messages are needed. Unfortunately, most spam filtering solutions pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- JNW
دوره 9 شماره
صفحات -
تاریخ انتشار 2014