Machine Learning and Applied CryptographyView this Special Issue
Research Article | Open Access
Luo GuangJun, Shah Nazir, Habib Ullah Khan, Amin Ul Haq, "Spam Detection Approach for Secure Mobile Message Communication Using Machine Learning Algorithms", Security and Communication Networks, vol. 2020, Article ID 8873639, 6 pages, 2020. https://doi.org/10.1155/2020/8873639
Spam Detection Approach for Secure Mobile Message Communication Using Machine Learning Algorithms
The spam detection is a big issue in mobile message communication due to which mobile message communication is insecure. In order to tackle this problem, an accurate and precise method is needed to detect the spam in mobile message communication. We proposed the applications of the machine learning-based spam detection method for accurate detection. In this technique, machine learning classifiers such as Logistic regression (LR), K-nearest neighbor (K-NN), and decision tree (DT) are used for classification of ham and spam messages in mobile device communication. The SMS spam collection data set is used for testing the method. The dataset is split into two categories for training and testing the research. The results of the experiments demonstrated that the classification performance of LR is high as compared with K-NN and DT, and the LR achieved a high accuracy of 99%. Additionally, the proposed method performance is good as compared with the existing state-of-the-art methods.
Mobile message is a way of communication among the people, and billions of mobile device users exchange numerous messages. However, such type of communication is insecure due to lack of proper message filtering mechanisms. One cause of such insecurity is spam, and it makes the mobile message communication insecure. Spam is considered to be one of the serious problems in e-mail and instance message services. Spam is a junk mail or message. Spam e-mails and messages are unwanted for receivers which are sent to the users without their prior permission. It contains different forms such as adult content, selling item or services, and so on . The spam increased in these days due more mobile devices deployed in environment for e-mail and message communication. Currently, 85% of mails and messages received by mobile users are spam . The cost of mails and messages are very low for senders but high for receipts of these messages. The cost paid some time by service providers and the cost of spam can be measured in the loss of human time and loss of important messages or mails . Due to these spam mails and messages, the values able e-mails and messages are affected because each user have limited Internet services, short time, and memory .
To handle these problems caused by the spam, researchers proposed different techniques to detect the spam e-mails and messages and secure the communication. Details of some of the techniques are presented in this article. Sharaff  proposed a method based on machine learning classifiers to classify ham and spam. In the proposed methods, they used four classifiers including iterative dichotomiser, decision tree, simple cart and active directory tree. The weka tool was used for experimental simulations. The proposed method achieved high performance in terms of accuracy. In , the e-mail classification method was proposed for the detection of spam. In the system, four predictive machine learning classifiers were used with various data partitions for training and testing of the models. Additionally different hyper parameters values were used in the models. The system obtained good results. Bhat  designed ensemble methods based on techniques such as bagging, boosting, and stacking for classification of spam and ham. The data set used in the study was collected from Facebook. The experimental results demonstrated that the bagging ensemble learning approach, using J48 (decision tree) base classifier, performs well than its individual model, and the method achieved high performance in terms of detection accuracy. In , a method is proposed for ham and spam detection and principle components analysis and support vector machine were used in the designing of the system. Additionally, the performance evaluation and cross validation methods were used in the system. The proposed technique achieved high performance, and the method effectively detected the spam. Kumar  used various classifiers for ham and spam detection. They used different feature selection algorithms for selection of suitable features. The experimental results show that the classifier random tree with fisher algorithm achieved high results. The proposed method achieved 99% accuracy. In , the spam detection method was proposed using machine learning classifiers and 92% accuracy was achieved. Yang at al.  proposed spam detection approach based on multimodal fusion (SDAMF). They used the deep neural networks model for detection of spam and achieved 98.48% accuracy. In , a spam detection method was proposed based on the artificial immune system (ISAIS) and 98.05% accuracy was achieved. In , the Phishing e-mail detection system framework was proposed based on supervised and unsupervised methods. Ruano-Ordás et al.  proposed the spam detection method. They used evolutionary computation for discovering spam patterns from e-mail samples.
In this research study, we proposed a spam detection method using machine learning algorithms such as LR, k-nearest neighbor, and decision tree for classification of ham and spam messages. The SMS spam collection dataset was considered for testing of the current research. The dataset was divided into two categories: 30% for testing and 70% for training purpose for the predictive models. The evaluation metrics for performance such as specificity, accuracy, and sensitivity were considered evaluating the proposed study. The results obtained from experiments confirmed that the proposed research achieved high accuracy.
The remaining paper is organized as follows: Section 2 is about the related work to the methodology. In Section 3, experimental work is analyzed and presented in detail. The paper concludes in Section 4.
2. Methods and Materials
This section shows the research methods and materials of the paper.
The dataset considered in the current research is available on kaggle, a machine learning repository . The dataset “SMS spam collection dataset” contains 5572 instances and two attributes v1 and v2. The v2 is the input messages which are either spam or nonspam. The predicted label v1 has two classes: 0 = nonspam and 1 spam. In the data, 4900 are nonspam samples and 672 are spam samples. The dataset is given in Table 1.
2.2. Classification Algorithms
The following machine learning algorithms were considered for classifications of ham and spam.
2.2.1. Logistic Regression
LR is a classifier [16, 17]. The problem in binary classification is computing the value of predictive y while y ∈ [0, 1]; 0 and 1 are for class negative and positive. The LR predicts the variable value of multiclassification such as y ∈ [0, 1, 2, 3].
2.2.2. Decision Tree
A DT is a supervised machine learning algorithm [18, 19]. Its shape is like a tree in which each node is a decision node or leaf. This technique of DT is easily understandable and simple for making the decisions. A DT contains external and internal nodes interlinked with each other. Decision can be made based on the internal nodes and the child node to access the preceding node. There is no child of the leaf node and is linked with a label.
2.2.3. K-Nearest Neighbor
K-NN is a classification supervised learning algorithm . It predicts the label of class as a fresh input and utilizes the same to its inputs in the training set. The performance of K-NN is not enough good. Let (x, y) be the the training observation and the learning function h: X ⟶ Y, so that an observation x, h (x) can establish y value.
2.2.4. Division of Dataset
The set data were split into 30% and 70% for validation and training of the predictive model.
2.2.5. Measure for Evaluation of Performance
To validate the classifier performance, we used metrics such as specificity, accuracy, sensitivity, and execution time which are expressed in equations (1), (2), and (3) which are computed from confusion matrix as given in Table 2.
The formulation of measures is as follows:
3. Experiments and Result Analysis
Diverse approaches are used for spam detection. Abayomi-Alli et al.  presented a comprehensive review of the soft techniques in spam classifications. Acceptability users of SMS spam application on the store of Android App were assessed. Roy et al.  proposed a technique to identify short-text spam messages. The proposed model is helpful for different strategies of business. Kaur et al.  presented a detailed report on techniques of detection-cum-analysis of compromised accounts and spam detection. Jeong et al.  presented a spam detection approach. Cheah et al.  proposed an approach for security testing of automotive interface of Bluetooth. Halabi and Bellaiche  presented an approach to quantify the performance and service evaluation of cloud security. Tsui et al. used diverse composition for the consequences of development of components on the properties of security . Zhang et al.  presented a novel method for evaluating the crowd security of OSN trustworthiness. Mao et al.  made a security network of dependency from the access behavior to measure the significance of object security from with broad perspectives.
We performed experiments to classify the ham and spam using the SMS spam collection dataset. Classifiers LR, decision tree, and k-nearest neighbor were used for the classification in this study. The dataset is divided as follows: 30% for validation and 70% for training. The results obtained from experiments are shown in tables and presented in figures graphically. The python on an Intel (R) Core™ i5 -2400CPU and Windows 10 were used for the experiments and setup to obtain the computation results of the experimental work.
3.1. Visualization of SVM Spam Collection Dataset
In the data, 4900 are ham samples and 672 are spam samples which are shown in Figure 1.
Figure 2 shows the ratio of spam and ham messages.
3.2. Classification Results of Classifiers
To perform the classification of the ham and spam messages, in this paper, we used the classification algorithms such as LR, decision tree, and K-nearest neighbor with essential basic hyperparameters. The dataset was divided into two parts for training and testing. The classifiers were trained with 70% of the samples and validated with 30% samples of the data set. All the experiential results are reported in Table 3. According to Table 3, the LR at hyperparameter C = 1 achieved 99% accuracy, 100% specificity, sensitivity 86%, and MCC, 93% and the processing time is 0.494 seconds. The classifier decision tree obtained 98% accuracy, 94% specificity, sensitivity 86%, and MCC 95%, and the processing time is 46.032 seconds. Similarly, the k-nearest neighbor classifier achieved 95% accuracy, 100% specificity, sensitivity 60%, and MCC 80%, and the processing time is 0.630 seconds. The experimental results (according to Table 3), the classification performance of LR is high as compared with the decision and k-nearest neighbor in terms of accuracy. The classification accuracy of classifiers is shown in Figure 3. Similarly, the computation time of LR is low as compared with k-NN and DT. Figure 4 shows the processing time graphically for better understanding. From these experiential results analysis, we concluded that the LR effectively classifies the ham and spam because the achieved accuracy is high. The 100% specificity of the LR model correctly detected the ham messages. Similarly, 86% sensitivity shows that LR spam message capability is good. Thus, the experimental results suggest that LR is a the best classifier for the classifications of ham and spam successfully.
Figure 3 shows the performance of classifications for classifiers including LR, K-NN, and DT.
The classifier processing time for K-NN, LR, and DT is shown in Figure 4.
3.3. Comparison of Performance with Existing Methods
The comparison performance of classifications of the current approach is done with the existing approaches in term of accuracy. The current approach achieved an accuracy of 99% which is high as compared with the available approaches. Table 4 shows the accuracy obtained from the current approach along with other approaches available.
The performance comparison is graphically shown in Figure 5.
Detection of spam is important for securing message and e-mail communication. The accurate detection of spam is a big issue, and many detection methods have been proposed by various researchers. However, these methods have a lack of capability to detect the spam accurately and efficiently. To solve this issue, we have proposed a method for spam detection using machine learning predictive models. The method is applied for the purpose of detection of spam. The experimental results obtained show that the proposed method has a high capability to detect spam. The proposed method achieved 99% accuracy which is high as compared with the other existing methods. Thus, the results suggest that the proposed method is more reliable for accurate and on-time detection of spam, and it will secure the communication systems of messages and e-mails.
No data were used to support the study.
Conflicts of Interest
The authors declare that there are no conflicts of interest regarding the publication of this paper.
This study was supported by the Key scientific research of the Ministry of Education, China (Grant no. DCA190332).
- L. Zhang, J. Zhu, and T. Yao, “An evaluation of statistical spam filtering techniques,” ACM Transactions on Asian Language Information Processing (TALIP), vol. 3, no. 4, pp. 243–269, 2004.
- M. Bassiouni, M. Ali, and E. A. El-Dahshan, “Ham and spam E-mails classification using machine learning techniques,” Journal of Applied Security Research, vol. 13, no. 3, pp. 315–331, 2018.
- I. Alsmadi and I. Alhami, “Clustering and classification of email contents,” Journal of King Saud University—Computer and Information Sciences, vol. 27, no. 1, pp. 46–57, 2015.
- B. Yu and Z.-B. Xu, “A comparative study for content-based dynamic spam classification using four machine learning algorithms,” Knowledge-Based Systems, vol. 21, no. 4, pp. 355–362, 2008.
- A. Sharaff, “Comparative study of classification algorithms for spam email detection,” in Emerging Research in Computing, Information, Communication and Applications, pp. 237–244, Springer, Berlin, Germany, 2016.
- S. Youn and D. McLeod, “A comparative study for email classification,” in Advances and Innovations in Systems, Computing Sciences and Software Engineering, pp. 387–391, Springer, Berlin, Germany, 2007.
- S. Y. Bhat, “Spammer classification using ensemble methods over structural social network features,” in Proceedings of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT), pp. 454–458, Warsaw, Poland, August 2014.
- J. C. Gomez and M.-F. Moens, “PCA document reconstruction for email classification,” Computational Statistics & Data Analysis, vol. 56, no. 3, pp. 741–751, 2012.
- R. K. Kumar, “Comparative study on email spam classifier using data mining techniques,” in Proceedings of the International MultiConference of Engineers and Computer Scientists, pp. 14–16, Hong Kong, March 2012.
- S. K. Trivedi and S. Dey, “Interplay between probabilistic classifiers and boosting algorithms for detecting complex unsolicited emails,” Journal of Advances in Computer Networks, vol. 1, pp. 132–136, 2013.
- H. Yang, Q. Liu, S. Zhou, and Y. Luo, “A spam filtering method based on multi-modal fusion,” Applied Sciences, vol. 9, no. 6, p. 1152, 2019.
- A. J. Saleh, A. Karim, B. Shanmugam et al., “An intelligent spam detection model based on artificial immune system,” Information, vol. 10, no. 6, p. 209, 2019.
- S. Smadi, N. Aslam, and L. Zhang, “Detection of online phishing email using dynamic evolving neural network based on reinforcement learning,” Decision Support Systems, vol. 107, pp. 88–102, 2018.
- D. Ruano-Ordás, F. Fdez-Riverola, and J. R. Méndez, “Using evolutionary computation for discovering spam patterns from e-mail samples,” Information Processing & Management, vol. 54, no. 2, pp. 303–317, 2018.
- SMS, “Spam collection dataset,” 2019, https://www.kaggle.com/datasets.
- K. Larsen, J. H. Petersen, E. Budtz-Jørgensen, and L. Endahl, “Interpreting parameters in the logistic regression model with random effects,” Biometrics, vol. 56, no. 3, pp. 909–914, 2000.
- V. Vapnik, The Nature of Statistical Learning Theory, Springer Science & Business Media, Berlin, Germany, 2013.
- X. Wu, V. Kumar, J. Ross Quinlan et al., “Top 10 algorithms in data mining,” Knowledge and Information Systems, vol. 14, no. 1, pp. 1–37, 2008.
- A. U. Haq, “A hybrid intelligent system framework for the prediction of heart disease using machine learning algorithms,” Mobile Information Systems, vol. 2018, Article ID 3860146, 21 pages, 2018.
- A. U. Haq, J. P. Li, M. H. Memon et al., “Feature selection based on L1-norm support vector machine and effective recognition system for Parkinson’s disease using voice recordings,” IEEE Access, vol. 7, pp. 37718–37734, 2019.
- A. U. Haq, “Comparative analysis of the classification performance of machine learning classifiers and deep neural network classifier for prediction of Parkinson disease,” in Proceedings of the 2018 15th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), pp. 101–106, Chengdu, China, December 2018.
- O. Abayomi-Alli, S. Misra, A. Abayomi-Alli, and M. Odusami, “A review of soft techniques for SMS spam classification: methods, approaches and applications,” Engineering Applications of Artificial Intelligence, vol. 86, pp. 197–212, 2019.
- P. K. Roy, J. P. Singh, and S. Banerjee, “Deep learning to filter SMS Spam,” Future Generation Computer Systems, vol. 102, pp. 524–533, 2020.
- R. Kaur, S. Singh, and H. Kumar, “Rise of spam and compromised accounts in online social networks: a state-of-the-art review of different combating approaches,” Journal of Network and Computer Applications, vol. 112, pp. 53–88, 2018.
- S. Jeong, G. Noh, H. Oh, and C.-K. Kim, “Follow spam detection based on cascaded social information,” Information Sciences, vol. 369, pp. 481–499, 2016.
- M. Cheah, S. A. Shaikh, O. Haas, and A. Ruddle, “Towards a systematic security evaluation of the automotive Bluetooth interface,” Vehicular Communications, vol. 9, pp. 8–18, 2017.
- T. Halabi and M. Bellaiche, “Towards quantification and evaluation of security of cloud service providers,” Journal of Information Security and Applications, vol. 33, pp. 55–65, 2017.
- F. Tsui, E. Jung, and S. Duggins, “Software composition of different security level components,” Computer Technology and Application, vol. 2, no. 11, pp. 835–842, 2011.
- Z. Zhang, J. Wen, X. Wang, and C. Zhao, “A novel crowd evaluation method for security and trustworthiness of online social networks platforms based on signaling theory,” Journal of Computational Science, vol. 26, pp. 468–477, 2017.
- W. Mao, Z. Cai, D. Towsley, Q. Feng, and X. Guan, “Security importance assessment for system objects and malware detection,” Computers & Security, vol. 68, pp. 47–68, 2017.
Copyright © 2020 Luo GuangJun et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.