scispace - formally typeset
Open Access

Spam Detection System Using Hidden Markov Model

Vandana Jaswal, +1 more
Reads0
Chats0
TLDR
An image spam detection system that uses detect spam words to detect stemming words of spam images and then use Hidden Markov Model of spam filters to detect all the spam images.
Abstract
Spams are the textual context of the system which can damage our system. E-mail is an essential communication tool that has been greatly abused by spam sender to disseminate unwanted information and spread malicious contents to Internet users. Spam filters provide better protective mechanisms that are able to design a system to recognize the spams. We propose an image spam detection system that uses detect spam words. We rely on filtering methods to detect stemming words of spam images and then use Hidden Markov Model of spam filters to detect all the spam images. In the first section of the paper analysis the Introduction of Spam. In the second section of the paper described the related work. In the third section analyzed the problem formulation. In the fourth section described spam detection techniques, different steps for spam detection. In the fifth section described methodology of spam detection and then the different spam feature extraction. Finally present the Conclusion & future works with the references.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

E-Mail Spam Detection Using SVM and RBF

TL;DR: This paper proposed an efficient spam filtering technique based on neural network RBF a neural network technique in which neuron are trained and the results obtained are compared with SVM.
Journal Article

E-Mail Spam Detection and Classfication Using SVM and Feature Extraction

TL;DR: A novel method for email spam detection using SVM and feature extraction which achieves accuracy of 98% with the test datasets is proposed.

A Review on Different Spam Detection Approaches

Sandeep Negi
TL;DR: This paper discusses some approaches for spam detection and states that spam messages sent to indiscriminate set of recipients for advertising purpose can be used for some attack.
Book ChapterDOI

Stochastic Methods to Find Maximum Likelihood for Spam E-mail Classification

TL;DR: Stochastic methods are utilizes to refine the preliminary spam detection and to find maximum likelihood for spam e-mail classification based on the Bayesian theorem, hidden Markov model (HMM), and the Viterbi algorithm.
Journal ArticleDOI

A survey on spam detection techniques

TL;DR: Various spam detection techniques are presented and it is shown how these techniques can be used to reduce the consequences of e-mail spam.
References
More filters
Journal ArticleDOI

A vector space model for automatic indexing

TL;DR: An approach based on space density computations is used to choose an optimum indexing vocabulary for a collection of documents, demonstating the usefulness of the model.
Journal ArticleDOI

An HMM-based threshold model approach for gesture recognition

TL;DR: A new method is developed using the hidden Markov model (HMM) based technique that calculates the likelihood threshold of an input pattern and provides a confirmation mechanism for the provisionally matched gesture patterns.

Phinding Phish: Evaluating Anti-Phishing Tools

TL;DR: An automated test bed for testing antiphishing tools is developed and it is demonstrated that the source of phishing URLs and the freshness of the URLs tested can significantly impact the results of anti-phishing tool testing.
Book

Statistical Language Models for Information Retrieval

TL;DR: A great deal of recent work has shown that statistical language models not only achieve superior empirical performance, but also facilitate parameter tuning and provide a more principled way for modeling various kinds of complex and non-traditional retrieval problems.
Book ChapterDOI

Modeling and preventing phishing attacks

TL;DR: A theoretical yet practically applicable model covering a large set of phishing attacks, aimed towards developing an understanding of threats relating to phishing and how to perform economic analysis on the viability of attacks is discussed.
Related Papers (5)