Email is one of the most popular communication media in the current century; it has become an effective and fast method to share and information exchangeall over the world. In recent years, emails users are facing problem which is spam emails. Spam emails are unsolicited, bulk emails are sent by spammers. It consumes storage of mail servers, waste of time and consumes network bandwidth.Many methods used for spam filtering to classify email messages into two groups spam and non-spam. In general, one of the most powerful tools used for data classification is Artificial Neural Networks (ANNs); it has the capability of dealing a huge amount of data with high dimensionality in better accuracy. One important type of ANNs is the Radial Basis Function Neural Networks (RBFNN) that will be used in this work to classify spam message. In this paper, we present a new approach of spam filtering technique which combinesRBFNN and Particles Swarm Optimization (PSO) algorithm (HC-RBFPSO). The proposed approach uses PSO algorithm to optimize the RBFNN parameters, depending on the evolutionary heuristic search process of PSO. PSO use to optimize the best position of the RBFNN centers c. The Radii r optimize using K-Nearest Neighbors algorithmand the weights w optimize using Singular Value Decomposition algorithm within each iterative process of PSO depending the fitness (error) function. The experiments are conducted on spam dataset namely SPAMBASE downloaded from UCI Machine Learning Repository. The experimental results show that our approach is performed in accuracy compared with other approaches that use the same dataset.
This document summarizes a research paper that develops an ant colony optimization (ACO) approach for filtering spam emails. It begins by noting the negative impacts of spam and how machine learning techniques have improved spam filtering over traditional rule-based methods. It then provides an overview of how ACO has been applied to data mining problems. The document proposes an ACO-based spam filtering model called AntSFilter and evaluates its performance on a public email dataset compared to other classifiers like Naive Bayes and Ripper. The preliminary results found AntSFilter yielded better accuracy with smaller rule sets, highlighting important features for identifying email categories.
An Approach for Malicious Spam Detection in Email with Comparison of Differen...IRJET Journal
This document summarizes a research paper that proposes a model to improve detection of malicious spam emails through feature selection. The model employs a novel dataset for feature selection to optimize classification parameters, prediction accuracy, and computation time. Feature selection is expected to improve training time and classification accuracy. The paper also compares various classifiers, including Naive Bayes and Support Vector Machine, on the selected feature subset. The goal is to automatically learn to detect malicious spam emails, which threaten privacy and security by spreading malware, phishing links, and sensitive data theft.
A Deep Analysis on Prevailing Spam Mail Filteration Machine Learning Approachesijtsrd
In this work, we have reviewed the issue of spam mail which is a big problem in the area of Internet. The growing size of uncalled mass e mail or spam has produced the requirement of a dependable anti spam filter. Now a days the Machine learning ML proedures are being employed to spontaneously filter the spam e mail in an effective manner. In this work, we have reviewed some of the prevalent ML approaches such as Rough sets, Bayesian classification, SVMs, k NN, ANNs and Artificial immune system and of their use fullness in the issue of spam Email taxonomy. We have provided the depictions of the procedures and the divergence of their enactment on the basis of the quantity of Spam Assassin. Anu | Ms. Preeti "A Deep Analysis on Prevailing Spam Mail Filteration Machine Learning Approaches" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33261.pdf Paper Url: https://www.ijtsrd.com/computer-science/data-processing/33261/a-deep-analysis-on-prevailing-spam-mail-filteration-machine-learning-approaches/anu
OPTIMIZING HYPERPARAMETERS FOR ENHANCED EMAIL CLASSIFICATION AND FORENSIC ANA...IJNSA Journal
Electronic mail, commonly known as email, is a crucial technology that enables streamlined operations and communications in corporate environments. Empowering swift and dependable transactions, email is a driving force behind heightened productivity and organizational effectiveness. However, its versatility also renders it susceptible to misuse by cybercriminals engaging in activities such as hacking, spoofing, phishing, email bombing, whaling, and spamming. As a result, effective and efficient data analysis is important in avoiding and detecting cyber-attacks and crime on times. To overcome the above challenges, a novel approach named Aquila Optimization (AO) is used in this paper to find the best set of hyperparameters of the Stacked Auto Encoder (SAE) classifier. The purpose of increasing the hyperparameters of the SAE using the AO is to obtain a higher text classification accuracy. Then the optimized SAE classifies the selected features into different classes. The experimental results showed that the proposed AO-SAE model outperforms the existing models such as Logistic Regression (LR) and Long Short-Term Model based Gated Current Unit (LSTM based GRU) in terms of Accuracy.
Identification of Spam Emails from Valid Emails by Using VotingEditor IJCATR
In recent years, the increasing use of e-mails has led to the emergence and increase of problems caused by mass unwanted
messages which are commonly known as spam. In this study, by using decision trees, support vector machine, Naïve Bayes theorem
and voting algorithm, a new version for identifying and classifying spams is provided. In order to verify the proposed method, a set of
a mails are chosen to get tested. First three algorithms try to detect spams, and then by using voting method, spams are identified. The
advantage of this method is utilizing a combination of three algorithms at the same time: decision tree, support vector machine and
Naïve Bayes method. During the evaluation of this method, a data set is analyzed by Weka software. Charts prepared in spam
detection indicate improved accuracy compared to the previous methods.
This document summarizes a research paper that proposes a new email spam detection framework using feature selection and similarity coefficients. The framework first applies feature selection to identify the most important features for distinguishing spam and non-spam emails. It then calculates similarity coefficients between email pairs to quantify their similarity based on the selected features. The researchers claim this approach improves spam detection accuracy and rate by removing irrelevant and redundant features before classification. They test their framework on a standard email dataset and find that detection performance is better after applying feature selection compared to using all original features.
Spam filtering by using Genetic based Feature SelectionEditor IJCATR
Spam is defined as redundant and unwanted electronica letters, and nowadays, it has created many problems in business life such as
occupying networks bandwidth and the space of user’s mailbox. Due to these problems, much research has been carried out in this
regard by using classification technique. The resent research show that feature selection can have positive effect on the efficiency of
machine learning algorithm. Most algorithms try to present a data model depending on certain detection of small set of features.
Unrelated features in the process of making model result in weak estimation and more computations. In this research it has been tried
to evaluate spam detection in legal electronica letters, and their effect on several Machin learning algorithms through presenting a
feature selection method based on genetic algorithm. Bayesian network and KNN classifiers have been taken into account in
classification phase and spam base dataset is used.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes a research paper that develops an ant colony optimization (ACO) approach for filtering spam emails. It begins by noting the negative impacts of spam and how machine learning techniques have improved spam filtering over traditional rule-based methods. It then provides an overview of how ACO has been applied to data mining problems. The document proposes an ACO-based spam filtering model called AntSFilter and evaluates its performance on a public email dataset compared to other classifiers like Naive Bayes and Ripper. The preliminary results found AntSFilter yielded better accuracy with smaller rule sets, highlighting important features for identifying email categories.
An Approach for Malicious Spam Detection in Email with Comparison of Differen...IRJET Journal
This document summarizes a research paper that proposes a model to improve detection of malicious spam emails through feature selection. The model employs a novel dataset for feature selection to optimize classification parameters, prediction accuracy, and computation time. Feature selection is expected to improve training time and classification accuracy. The paper also compares various classifiers, including Naive Bayes and Support Vector Machine, on the selected feature subset. The goal is to automatically learn to detect malicious spam emails, which threaten privacy and security by spreading malware, phishing links, and sensitive data theft.
A Deep Analysis on Prevailing Spam Mail Filteration Machine Learning Approachesijtsrd
In this work, we have reviewed the issue of spam mail which is a big problem in the area of Internet. The growing size of uncalled mass e mail or spam has produced the requirement of a dependable anti spam filter. Now a days the Machine learning ML proedures are being employed to spontaneously filter the spam e mail in an effective manner. In this work, we have reviewed some of the prevalent ML approaches such as Rough sets, Bayesian classification, SVMs, k NN, ANNs and Artificial immune system and of their use fullness in the issue of spam Email taxonomy. We have provided the depictions of the procedures and the divergence of their enactment on the basis of the quantity of Spam Assassin. Anu | Ms. Preeti "A Deep Analysis on Prevailing Spam Mail Filteration Machine Learning Approaches" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd33261.pdf Paper Url: https://www.ijtsrd.com/computer-science/data-processing/33261/a-deep-analysis-on-prevailing-spam-mail-filteration-machine-learning-approaches/anu
OPTIMIZING HYPERPARAMETERS FOR ENHANCED EMAIL CLASSIFICATION AND FORENSIC ANA...IJNSA Journal
Electronic mail, commonly known as email, is a crucial technology that enables streamlined operations and communications in corporate environments. Empowering swift and dependable transactions, email is a driving force behind heightened productivity and organizational effectiveness. However, its versatility also renders it susceptible to misuse by cybercriminals engaging in activities such as hacking, spoofing, phishing, email bombing, whaling, and spamming. As a result, effective and efficient data analysis is important in avoiding and detecting cyber-attacks and crime on times. To overcome the above challenges, a novel approach named Aquila Optimization (AO) is used in this paper to find the best set of hyperparameters of the Stacked Auto Encoder (SAE) classifier. The purpose of increasing the hyperparameters of the SAE using the AO is to obtain a higher text classification accuracy. Then the optimized SAE classifies the selected features into different classes. The experimental results showed that the proposed AO-SAE model outperforms the existing models such as Logistic Regression (LR) and Long Short-Term Model based Gated Current Unit (LSTM based GRU) in terms of Accuracy.
Identification of Spam Emails from Valid Emails by Using VotingEditor IJCATR
In recent years, the increasing use of e-mails has led to the emergence and increase of problems caused by mass unwanted
messages which are commonly known as spam. In this study, by using decision trees, support vector machine, Naïve Bayes theorem
and voting algorithm, a new version for identifying and classifying spams is provided. In order to verify the proposed method, a set of
a mails are chosen to get tested. First three algorithms try to detect spams, and then by using voting method, spams are identified. The
advantage of this method is utilizing a combination of three algorithms at the same time: decision tree, support vector machine and
Naïve Bayes method. During the evaluation of this method, a data set is analyzed by Weka software. Charts prepared in spam
detection indicate improved accuracy compared to the previous methods.
This document summarizes a research paper that proposes a new email spam detection framework using feature selection and similarity coefficients. The framework first applies feature selection to identify the most important features for distinguishing spam and non-spam emails. It then calculates similarity coefficients between email pairs to quantify their similarity based on the selected features. The researchers claim this approach improves spam detection accuracy and rate by removing irrelevant and redundant features before classification. They test their framework on a standard email dataset and find that detection performance is better after applying feature selection compared to using all original features.
Spam filtering by using Genetic based Feature SelectionEditor IJCATR
Spam is defined as redundant and unwanted electronica letters, and nowadays, it has created many problems in business life such as
occupying networks bandwidth and the space of user’s mailbox. Due to these problems, much research has been carried out in this
regard by using classification technique. The resent research show that feature selection can have positive effect on the efficiency of
machine learning algorithm. Most algorithms try to present a data model depending on certain detection of small set of features.
Unrelated features in the process of making model result in weak estimation and more computations. In this research it has been tried
to evaluate spam detection in legal electronica letters, and their effect on several Machin learning algorithms through presenting a
feature selection method based on genetic algorithm. Bayesian network and KNN classifiers have been taken into account in
classification phase and spam base dataset is used.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Heuristic Approach for Network Data Clusteringidescitation
In this growing world of technology there are lots of security threats received by
each and every area of computer networks. Most of the time the network security threats
produce high false positive and negative ratios, this creates an obstacle for any security
system to work improperly. The overwhelming threats make it challenging to understand
and manage the network data.
To address this problem we present a novel approach which eventually understand the
network data by clustering them without background knowledge of any threats according to
various parameters like source IP, Destination IP etc. And this approach saves
administrator’s time and energy in processing of large amount threats.
Integration of feature sets with machine learning techniquesiaemedu
This document summarizes a research paper that proposes a novel approach for spam filtering using selective feature sets combined with machine learning techniques. The paper presents an algorithm and system architecture that extracts feature sets from emails and uses machine learning to classify emails and generate rules to identify spam. Several metrics are identified to evaluate the efficiency of the feature sets, including false positive rate. An experiment is described that uses keyword lists as feature sets to train filters and compares the proposed approach to other spam filtering methods.
A multi layer architecture for spam-detection systemcsandit
As the email is becoming a prominent mode of commun
ication so are the attempts to misuse it to
take undue advantage of its low cost and high reach
ability. However, as email communication
is very cheap, spammers are taking advantage of it
for advertising their products, for
committing cybercrimes. So, researchers are working
hard to combat with the spammers. Many
spam detections techniques and systems are built to
fight spammers. But the spammers are
continuously finding new ways to defeat the existin
g filters. This paper describes the existing
spam filters techniques and proposes a multi-level
architecture for spam email detection. We
present the analysis of the architecture to prove t
he effectiveness of the architecture
A multi layer architecture for spam-detection systemcsandit
As the email is becoming a prominent mode of communication so are the attempts to misuse it to
take undue advantage of its low cost and high reachability. However, as email communication
is very cheap, spammers are taking advantage of it for advertising their products, for
committing cybercrimes. So, researchers are working hard to combat with the spammers. Many
spam detections techniques and systems are built to fight spammers. But the spammers are
continuously finding new ways to defeat the existing filters. This paper describes the existing
spam filters techniques and proposes a multi-level architecture for spam email detection. We
present the analysis of the architecture to prove the effectiveness of the architecture.
Pre-filters in-transit malware packets detection in the networkTELKOMNIKA JOURNAL
Conventional malware detection systems cannot detect most of the new malware in the network
without the availability of their signatures. In order to solve this problem, this paper proposes a technique
to detect both metamorphic (mutated malware) and general (non-mutated) malware in the network using a
combination of known malware sub-signature and machine learning classification. This network-based
malware detection is achieved through a middle path for efficient processing of non-malware packets.
The proposed technique has been tested and verified using multiple data sets (metamorphic malware,
non-mutated malware, and UTM real traffic), this technique can detect most of malware packets in
the network-based before they reached the host better than the previous works which detect malware in
host-based. Experimental results showed that the proposed technique can speed up the transmission of
more than 98% normal packets without sending them to the slow path, and more than 97% of malware
packets are detected and dropped in the middle path. Furthermore, more than 75% of metamorphic
malware packets in the test dataset could be detected. The proposed technique is 37 times faster than
existing technique.
Detection of Spam in Emails using Machine LearningIRJET Journal
The document discusses detecting spam emails using machine learning techniques. It evaluates various machine learning algorithms for classifying emails as spam or ham (not spam) and finds that the Multinomial Naive Bayes algorithm provides the highest accuracy. The study uses an email dataset to train classifiers including Naive Bayes, Decision Trees, Random Forest, KNN, SVM and evaluates their performance based on precision, accuracy and other metrics. It finds that while Naive Bayes performs best, it has some limitations and ensemble methods like random forests generally provide more robust performance. The paper contributes to improving email spam detection through comparative analysis of machine learning algorithms.
A Survey on Spam Filtering Methods and Mapreduce with SVMIRJET Journal
This document summarizes a research paper that surveys different spam filtering techniques, including machine learning approaches like Naive Bayes, KNN, decision trees, and SVM. It discusses how SVM is commonly used for spam filtering due to its ability to handle large datasets, but it has drawbacks of being slow for training on large data. The paper proposes using MapReduce with SVM to address this issue by enabling parallel processing of large input datasets to speed up SVM training for spam filtering. It provides background on various machine learning techniques used for spam filtering and discusses how MapReduce can help improve the scalability of SVM for classification of large volumes of email data as spam or not spam.
EMAIL SPAM DETECTION USING HYBRID ALGORITHMIRJET Journal
The document describes a study that introduces a hybrid machine learning algorithm for email spam detection. The algorithm combines logistic regression and neural networks. Logistic regression is first used to identify spam indicators in emails, which are then further analyzed using neural networks for deeper analysis and classification. The hybrid approach achieves higher accuracy than individual models alone in differentiating spam from legitimate emails. The document provides background on the problem of email spam, describes related work on spam detection techniques, and outlines the methodology used to develop and evaluate the hybrid machine learning model.
An intelligent auto-response short message service categorization model using...IJECEIAES
Short message service (SMS) is one of the quickest and easiest ways used for communication, used by businesses, government organizations, and banks to send short messages to large groups of people. Categorization of SMS under different message types in their inboxes will provide a concise view for receivers. Former studies on the said problem are at the binary level as ham or spam which triggered the masking of specific messages that were useful to the end user but were treated as spam. Further, it is extended with multi labels such as ham, spam, and others which is not sufficient to meet all the necessities of end users. Hence, a multi-class SMS categorization is needed based on the semantics (information) embedded in it. This paper introduces an intelligent auto-response model using a semantic index for categorizing SMS messages into 5 categories: ham, spam, info, transactions, and one time password’s, using the multi-layer perceptron (MLP) algorithm. In this approach, each SMS is classified into one of the predefined categories. This experiment was conducted on the “multi-class SMS dataset” with 7,398 messages, which are differentiated into 5 classes. The accuracy obtained from the experiment was 97%.
This document discusses a system for detecting suspicious emails using machine learning algorithms. It presents a model that filters emails containing images and PDFs to improve performance over existing text-based spam filtering systems. The model uses data collection, preprocessing, machine learning classification algorithms like Naive Bayes, Support Vector Machines, and Decision Trees. It aims to achieve acceptable recall and precision values. The document also reviews related work on email spam detection using machine learning and discusses the future scope of applying the algorithm to embedded images/PDFs and larger datasets.
Improved spambase dataset prediction using svm rbf kernel with adaptive boosteSAT Journals
Abstract Spam is no more garbage but risk as it includes virus attachments and spyware agents which make the recipients’ system ruined, therefore, there is an emerging need for spam detection. Many spam detection techniques based on machine learning algorithms have been proposed. As the amount of spam has been increased tremendously using bulk mailing tools, spam detection techniques should deal with it. In this paper we have proposed Hybrid classifier Adaptive boost with support vector machine RBF kernel on Spambase dataset. We have also extracted the features first by Principal component analysis. General Terms: Email Spam classification. Keywords: Adaboost, classifier, ensemble, machine learning, spam email, SVM.
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmEditor IJCATR
Sensor network consists of a large number of small nods, strongly interacting with the physical environment, takes
environmental data through sensors, and reacts after processing on information. Wireless network technologies are widely used in most
applications. As wireless sensor networks have many activities in the field of information transmission, network congestion cannot be
thus avoided. So it seems necessary that some new methods can control congestion and use existing resources for providing better traffic
demands. Congestion increases packet loss and retransmission of removed packets and also wastes of energy. In this paper, a novel
method is presented for congestion control in wireless sensor networks using genetic algorithm. The results of simulation show that the
proposed method, in comparison with the algorithm LEACH, can significantly improve congestion control at high speeds.
Pattern recognition system based on support vector machinesAlexander Decker
This document describes a study that uses support vector machines (SVM) to develop quantitative structure-activity relationship (QSAR) models for predicting the anti-HIV activity of 1,3,4-oxadiazole substituted naphthyridine derivatives based on their molecular descriptors. The SVM model achieved a cross-validation R2 value of 0.90 and RMSE of 0.145, outperforming artificial neural network and multiple linear regression models. An external validation on an independent test set found the SVM model had an R value of 0.96 and RMSE of 0.166, demonstrating good predictive ability.
Progress of Machine Learning in the Field of Intrusion Detection Systemsijcisjournal
This document summarizes a research paper that proposes a new support vector machine (SVM) model for intrusion detection systems. The paper begins with background on machine learning and SVMs for intrusion detection. It then discusses related work applying SVMs and feature selection to intrusion detection. The proposed solution uses the CICIDS2017 dataset to select important features and train an SVM classifier to detect attacks. Testing shows the model achieves 97-99% precision in detecting attacks from the dataset. The results demonstrate the effectiveness of the proposed SVM model for intrusion detection.
11421ijcPROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYST...ijcisjournal
With the growth in the use of the Internet and local area networks, malicious attacks and intrusions into computer systems are increasing. Implementing intrusion detection systems have become extremely important to help maintain good network security. Support vector machines (SVMs), a classic pattern recognition tool, have been widely used in intrusion detection. They can handle very large data with high efficiency, are easy to use, and exhibit good prediction behavior. This paper presents a new SVM model enriched with a Gaussian kernel function based on the features of the training data for intrusion detection. The new model is tested with the CICIDS2017 dataset. The test proves better results in terms of detection efficiency and false alarm rate, which can give better coverage and make detection more efficient.
DETECTING SPAM BY USING NAÏVE BAYES IN MACHINE LEARNINGazziefaazahar
This document discusses using Naive Bayes machine learning to detect spam. It begins with background on spamming and how machine learning can help detect spam. It then outlines the objectives of the project, which are to study Naive Bayes techniques for classifying spam, apply Naive Bayes in a Kaggle machine learning platform using a dataset, and test the algorithm. The document also provides information on the student conducting the research.
Online stream mining approach for clustering network trafficeSAT Journals
Abstract A large number of research have been proposed on intrusion detection system, which leads to the implementation of agent based intelligent IDS (IIDS), Non – intelligent IDS (NIDS), signature based IDS etc. While building such IDS models, learning algorithms from flow of network traffic plays crucial role in accuracy of IDS systems. The proposed work focuses on implementing the novel method to cluster network traffic which eliminates the limitations in existing online clustering algorithms and prove the robustness and accuracy over large stream of network traffic arriving at extremely high rate. We compare the existing algorithm with novel methods to analyse the accuracy and complexity. Keywords— NIDS, Data Stream Mining, Online Clustering, RAH algorithm, Online Efficient Incremental Clustering algorithm
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document summarizes various papers on developing intrusion detection systems using neural networks. It discusses different algorithms researchers have used to train neural networks for intrusion detection, including feed-forward neural networks, self-organizing maps, test driven development neural networks, combinations of supervised and unsupervised learning techniques, differential evolution, and backpropagation neural networks. Each algorithm has advantages and disadvantages. The document concludes that neural networks provide a flexible approach to intrusion detection and can learn new intrusion patterns, and proposes developing an additional level of protection using self-organizing maps to better detect intrusions.
This document summarizes a research paper that evaluates and compares neural network and hidden Markov model classifiers for handwritten word recognition. It begins by introducing the topic of handwritten word recognition and defining the problem. It then provides background on common approaches, including segmentation-based and segmentation-free. The methodology section outlines the proposed system, which uses both a neural network classifier based on multilayer perceptron trained with backpropagation, and a hidden Markov model classifier with two states. It describes training both classifiers on data and then using them to recognize input words by comparing their scores. The paper aims to take advantage of both classifiers by combining their results.
A Heuristic Approach for Network Data Clusteringidescitation
In this growing world of technology there are lots of security threats received by
each and every area of computer networks. Most of the time the network security threats
produce high false positive and negative ratios, this creates an obstacle for any security
system to work improperly. The overwhelming threats make it challenging to understand
and manage the network data.
To address this problem we present a novel approach which eventually understand the
network data by clustering them without background knowledge of any threats according to
various parameters like source IP, Destination IP etc. And this approach saves
administrator’s time and energy in processing of large amount threats.
Integration of feature sets with machine learning techniquesiaemedu
This document summarizes a research paper that proposes a novel approach for spam filtering using selective feature sets combined with machine learning techniques. The paper presents an algorithm and system architecture that extracts feature sets from emails and uses machine learning to classify emails and generate rules to identify spam. Several metrics are identified to evaluate the efficiency of the feature sets, including false positive rate. An experiment is described that uses keyword lists as feature sets to train filters and compares the proposed approach to other spam filtering methods.
A multi layer architecture for spam-detection systemcsandit
As the email is becoming a prominent mode of commun
ication so are the attempts to misuse it to
take undue advantage of its low cost and high reach
ability. However, as email communication
is very cheap, spammers are taking advantage of it
for advertising their products, for
committing cybercrimes. So, researchers are working
hard to combat with the spammers. Many
spam detections techniques and systems are built to
fight spammers. But the spammers are
continuously finding new ways to defeat the existin
g filters. This paper describes the existing
spam filters techniques and proposes a multi-level
architecture for spam email detection. We
present the analysis of the architecture to prove t
he effectiveness of the architecture
A multi layer architecture for spam-detection systemcsandit
As the email is becoming a prominent mode of communication so are the attempts to misuse it to
take undue advantage of its low cost and high reachability. However, as email communication
is very cheap, spammers are taking advantage of it for advertising their products, for
committing cybercrimes. So, researchers are working hard to combat with the spammers. Many
spam detections techniques and systems are built to fight spammers. But the spammers are
continuously finding new ways to defeat the existing filters. This paper describes the existing
spam filters techniques and proposes a multi-level architecture for spam email detection. We
present the analysis of the architecture to prove the effectiveness of the architecture.
Pre-filters in-transit malware packets detection in the networkTELKOMNIKA JOURNAL
Conventional malware detection systems cannot detect most of the new malware in the network
without the availability of their signatures. In order to solve this problem, this paper proposes a technique
to detect both metamorphic (mutated malware) and general (non-mutated) malware in the network using a
combination of known malware sub-signature and machine learning classification. This network-based
malware detection is achieved through a middle path for efficient processing of non-malware packets.
The proposed technique has been tested and verified using multiple data sets (metamorphic malware,
non-mutated malware, and UTM real traffic), this technique can detect most of malware packets in
the network-based before they reached the host better than the previous works which detect malware in
host-based. Experimental results showed that the proposed technique can speed up the transmission of
more than 98% normal packets without sending them to the slow path, and more than 97% of malware
packets are detected and dropped in the middle path. Furthermore, more than 75% of metamorphic
malware packets in the test dataset could be detected. The proposed technique is 37 times faster than
existing technique.
Detection of Spam in Emails using Machine LearningIRJET Journal
The document discusses detecting spam emails using machine learning techniques. It evaluates various machine learning algorithms for classifying emails as spam or ham (not spam) and finds that the Multinomial Naive Bayes algorithm provides the highest accuracy. The study uses an email dataset to train classifiers including Naive Bayes, Decision Trees, Random Forest, KNN, SVM and evaluates their performance based on precision, accuracy and other metrics. It finds that while Naive Bayes performs best, it has some limitations and ensemble methods like random forests generally provide more robust performance. The paper contributes to improving email spam detection through comparative analysis of machine learning algorithms.
A Survey on Spam Filtering Methods and Mapreduce with SVMIRJET Journal
This document summarizes a research paper that surveys different spam filtering techniques, including machine learning approaches like Naive Bayes, KNN, decision trees, and SVM. It discusses how SVM is commonly used for spam filtering due to its ability to handle large datasets, but it has drawbacks of being slow for training on large data. The paper proposes using MapReduce with SVM to address this issue by enabling parallel processing of large input datasets to speed up SVM training for spam filtering. It provides background on various machine learning techniques used for spam filtering and discusses how MapReduce can help improve the scalability of SVM for classification of large volumes of email data as spam or not spam.
EMAIL SPAM DETECTION USING HYBRID ALGORITHMIRJET Journal
The document describes a study that introduces a hybrid machine learning algorithm for email spam detection. The algorithm combines logistic regression and neural networks. Logistic regression is first used to identify spam indicators in emails, which are then further analyzed using neural networks for deeper analysis and classification. The hybrid approach achieves higher accuracy than individual models alone in differentiating spam from legitimate emails. The document provides background on the problem of email spam, describes related work on spam detection techniques, and outlines the methodology used to develop and evaluate the hybrid machine learning model.
An intelligent auto-response short message service categorization model using...IJECEIAES
Short message service (SMS) is one of the quickest and easiest ways used for communication, used by businesses, government organizations, and banks to send short messages to large groups of people. Categorization of SMS under different message types in their inboxes will provide a concise view for receivers. Former studies on the said problem are at the binary level as ham or spam which triggered the masking of specific messages that were useful to the end user but were treated as spam. Further, it is extended with multi labels such as ham, spam, and others which is not sufficient to meet all the necessities of end users. Hence, a multi-class SMS categorization is needed based on the semantics (information) embedded in it. This paper introduces an intelligent auto-response model using a semantic index for categorizing SMS messages into 5 categories: ham, spam, info, transactions, and one time password’s, using the multi-layer perceptron (MLP) algorithm. In this approach, each SMS is classified into one of the predefined categories. This experiment was conducted on the “multi-class SMS dataset” with 7,398 messages, which are differentiated into 5 classes. The accuracy obtained from the experiment was 97%.
This document discusses a system for detecting suspicious emails using machine learning algorithms. It presents a model that filters emails containing images and PDFs to improve performance over existing text-based spam filtering systems. The model uses data collection, preprocessing, machine learning classification algorithms like Naive Bayes, Support Vector Machines, and Decision Trees. It aims to achieve acceptable recall and precision values. The document also reviews related work on email spam detection using machine learning and discusses the future scope of applying the algorithm to embedded images/PDFs and larger datasets.
Improved spambase dataset prediction using svm rbf kernel with adaptive boosteSAT Journals
Abstract Spam is no more garbage but risk as it includes virus attachments and spyware agents which make the recipients’ system ruined, therefore, there is an emerging need for spam detection. Many spam detection techniques based on machine learning algorithms have been proposed. As the amount of spam has been increased tremendously using bulk mailing tools, spam detection techniques should deal with it. In this paper we have proposed Hybrid classifier Adaptive boost with support vector machine RBF kernel on Spambase dataset. We have also extracted the features first by Principal component analysis. General Terms: Email Spam classification. Keywords: Adaboost, classifier, ensemble, machine learning, spam email, SVM.
Congestion Control in Wireless Sensor Networks Using Genetic AlgorithmEditor IJCATR
Sensor network consists of a large number of small nods, strongly interacting with the physical environment, takes
environmental data through sensors, and reacts after processing on information. Wireless network technologies are widely used in most
applications. As wireless sensor networks have many activities in the field of information transmission, network congestion cannot be
thus avoided. So it seems necessary that some new methods can control congestion and use existing resources for providing better traffic
demands. Congestion increases packet loss and retransmission of removed packets and also wastes of energy. In this paper, a novel
method is presented for congestion control in wireless sensor networks using genetic algorithm. The results of simulation show that the
proposed method, in comparison with the algorithm LEACH, can significantly improve congestion control at high speeds.
Pattern recognition system based on support vector machinesAlexander Decker
This document describes a study that uses support vector machines (SVM) to develop quantitative structure-activity relationship (QSAR) models for predicting the anti-HIV activity of 1,3,4-oxadiazole substituted naphthyridine derivatives based on their molecular descriptors. The SVM model achieved a cross-validation R2 value of 0.90 and RMSE of 0.145, outperforming artificial neural network and multiple linear regression models. An external validation on an independent test set found the SVM model had an R value of 0.96 and RMSE of 0.166, demonstrating good predictive ability.
Progress of Machine Learning in the Field of Intrusion Detection Systemsijcisjournal
This document summarizes a research paper that proposes a new support vector machine (SVM) model for intrusion detection systems. The paper begins with background on machine learning and SVMs for intrusion detection. It then discusses related work applying SVMs and feature selection to intrusion detection. The proposed solution uses the CICIDS2017 dataset to select important features and train an SVM classifier to detect attacks. Testing shows the model achieves 97-99% precision in detecting attacks from the dataset. The results demonstrate the effectiveness of the proposed SVM model for intrusion detection.
11421ijcPROGRESS OF MACHINE LEARNING IN THE FIELD OF INTRUSION DETECTION SYST...ijcisjournal
With the growth in the use of the Internet and local area networks, malicious attacks and intrusions into computer systems are increasing. Implementing intrusion detection systems have become extremely important to help maintain good network security. Support vector machines (SVMs), a classic pattern recognition tool, have been widely used in intrusion detection. They can handle very large data with high efficiency, are easy to use, and exhibit good prediction behavior. This paper presents a new SVM model enriched with a Gaussian kernel function based on the features of the training data for intrusion detection. The new model is tested with the CICIDS2017 dataset. The test proves better results in terms of detection efficiency and false alarm rate, which can give better coverage and make detection more efficient.
DETECTING SPAM BY USING NAÏVE BAYES IN MACHINE LEARNINGazziefaazahar
This document discusses using Naive Bayes machine learning to detect spam. It begins with background on spamming and how machine learning can help detect spam. It then outlines the objectives of the project, which are to study Naive Bayes techniques for classifying spam, apply Naive Bayes in a Kaggle machine learning platform using a dataset, and test the algorithm. The document also provides information on the student conducting the research.
Online stream mining approach for clustering network trafficeSAT Journals
Abstract A large number of research have been proposed on intrusion detection system, which leads to the implementation of agent based intelligent IDS (IIDS), Non – intelligent IDS (NIDS), signature based IDS etc. While building such IDS models, learning algorithms from flow of network traffic plays crucial role in accuracy of IDS systems. The proposed work focuses on implementing the novel method to cluster network traffic which eliminates the limitations in existing online clustering algorithms and prove the robustness and accuracy over large stream of network traffic arriving at extremely high rate. We compare the existing algorithm with novel methods to analyse the accuracy and complexity. Keywords— NIDS, Data Stream Mining, Online Clustering, RAH algorithm, Online Efficient Incremental Clustering algorithm
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document summarizes various papers on developing intrusion detection systems using neural networks. It discusses different algorithms researchers have used to train neural networks for intrusion detection, including feed-forward neural networks, self-organizing maps, test driven development neural networks, combinations of supervised and unsupervised learning techniques, differential evolution, and backpropagation neural networks. Each algorithm has advantages and disadvantages. The document concludes that neural networks provide a flexible approach to intrusion detection and can learn new intrusion patterns, and proposes developing an additional level of protection using self-organizing maps to better detect intrusions.
This document summarizes a research paper that evaluates and compares neural network and hidden Markov model classifiers for handwritten word recognition. It begins by introducing the topic of handwritten word recognition and defining the problem. It then provides background on common approaches, including segmentation-based and segmentation-free. The methodology section outlines the proposed system, which uses both a neural network classifier based on multilayer perceptron trained with backpropagation, and a hidden Markov model classifier with two states. It describes training both classifiers on data and then using them to recognize input words by comparing their scores. The paper aims to take advantage of both classifiers by combining their results.
Ähnlich wie EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PARTICLE SWARM OPTIMIZATION (20)
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...amsjournal
The Fourth Industrial Revolution is transforming industries, including healthcare, by integrating digital,
physical, and biological technologies. This study examines the integration of 4.0 technologies into
healthcare, identifying success factors and challenges through interviews with 70 stakeholders from 33
countries. Healthcare is evolving significantly, with varied objectives across nations aiming to improve
population health. The study explores stakeholders' perceptions on critical success factors, identifying
challenges such as insufficiently trained personnel, organizational silos, and structural barriers to data
exchange. Facilitators for integration include cost reduction initiatives and interoperability policies.
Technologies like IoT, Big Data, AI, Machine Learning, and robotics enhance diagnostics, treatment
precision, and real-time monitoring, reducing errors and optimizing resource utilization. Automation
improves employee satisfaction and patient care, while Blockchain and telemedicine drive cost reductions.
Successful integration requires skilled professionals and supportive policies, promising efficient resource
use, lower error rates, and accelerated processes, leading to optimized global healthcare outcomes.
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...
EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PARTICLE SWARM OPTIMIZATION
1. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.4, July 2016
DOI: 10.5121/ijnsa.2016.8402 17
EMAIL SPAM CLASSIFICATION USING HYBRID
APPROACH OF RBF NEURAL NETWORK AND
PARTICLE SWARM OPTIMIZATION
Mohammed Awad1
and Monir Foqaha2
1
Department of Computer Systems Engineering, Arab American University-Jenin,
Palestine
2
Department of Computer Science, Arab American University-Jenin, Palestine
ABSTRACT
Email is one of the most popular communication media in the current century; it has become an effective
and fast method to share and information exchangeall over the world. In recent years, emails users are
facing problem which is spam emails. Spam emails are unsolicited, bulk emails are sent by spammers. It
consumes storage of mail servers, waste of time and consumes network bandwidth.Many methods used for
spam filtering to classify email messages into two groups spam and non-spam. In general, one of the most
powerful tools used for data classification is Artificial Neural Networks (ANNs); it has the capability of
dealing a huge amount of data with high dimensionality in better accuracy. One important type of ANNs is
the Radial Basis Function Neural Networks (RBFNN) that will be used in this work to classify spam
message. In this paper, we present a new approach of spam filtering technique which combinesRBFNN and
Particles Swarm Optimization (PSO) algorithm (HC-RBFPSO). The proposed approach uses PSO
algorithm to optimize the RBFNN parameters, depending on the evolutionary heuristic search process of
PSO. PSO use to optimize the best position of the RBFNN centers c. The Radii r optimize using K-Nearest
Neighbors algorithmand the weights w optimize using Singular Value Decomposition algorithm within
each iterative process of PSO depending the fitness (error) function. The experiments are conducted on
spam dataset namely SPAMBASE downloaded from UCI Machine Learning Repository. The experimental
results show that our approach is performed in accuracy compared with other approaches that use the
same dataset.
KEYWORDS
Email Spam, Classification, Radial Basis Function Neural Networks, Particles Swarm Optimization.
1. INTRODUCTION
Email in the twenty-first century hasbecome one of the most important methods for
communication among people; this is due to its free availability, fast and free or lower cost. The
major problem has become in email messages is anunwanted message (spam). The person that
sends the spam messagesis called spammer who collects email addresses from websites, chat
rooms, and viruses. The spam traffic volume is so large,which negatively affects email servers
storage space, networks bandwidth, processing power and user time [1].According to the statistics
conducted between 2010-2014, 18% of the traffic is spam [2]. Another statistic according to [3]
they found 13 billion of unwanted commercial email nearly 50% of all email sent. On the other
hand, Kaspersky security bulletin in 2013 appeared that the counted spam during 2013
approximately equal 70% of the total email traffic [4]. Also, according to University of California
– Irvine statistical, the total of blocked messages reached 690,849,027 on November 30, 2013 [5].
There are many classification techniques used to classify data into categories, including
probabilistic, decision tree, artificial immune system [6], support vector machine (SVM) [7],
2. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.4, July 2016
18
artificial neural networks (ANN) [8], and case-based technique [9]. In general, it is possible to use
these classification techniques for spam filtering by using content-based filtering approach that
will identify attributes (usually keywords often used in spam emails). The Frequency occurrence
of these attributes within email determine the probabilities for each attribute within email, then it
is compared to threshold value. Email messages that exceed the threshold value are classified as
spam [10]. ANN is a non-linear model that tries to simulate the functions of biological neural
networks. It consists of simple processing unit called neurons and processes information to do
computation operations [11, 12]. Many types of researchused aneural network to classify spam
using content-based filtering,these methods determines attributes to calculate the frequency of
keywords or patterns in the email messages. Neural Network algorithms that are used in email
filtering achieve reasonable classification performance. The most famous algorithms are
Multilayer Perceptron Neural Networks (MLPNNs) and Radial Base Function Neural Networks
(RBFNN). Researchers used MLPNNas aclassifier for spam filtering but very too few of them
used RBFNNas aclassifier.In this paper, we will use RBFNN for spam filtering. RBFNN is one of
the most important types of ANNs; which are characterized by other types of ANNs, including
better approximation, better classification, simpler network structures and faster-learning
algorithms [13].
Evolutionary algorithms (EAs), which are optimization techniques that avoid various
mathematical complications, manage populations of solutions, trying to identify individuals
representing the best solutions for the problem [14].There are many previous studies that
combined Genetic Algorithms and Neural Networks [15] to improve the performance of neural
network algorithms. A similar method of evolutionary computation techniques such as Genetic
Algorithms (GAs) is Particle Swarm Optimization (PSO), which is a method for optimizing
several continuous nonlinear functions and classification method. PSO is inspired by the social
behavior of bird flocks and school of fishes, it used in many applications, like aneural network,
telecommunications, signal processing, data mining, and several other applications. PSO
algorithm operates on a population (swarm), with the characteristic of no crossover and mutation
calculation like genetic algorithm; which makes it is easy to implement. PSO only evolve their
social behavior accordingly their movement towards the best solutions [16].
In this paper, we proposed a hybrid approach that combines RBFNN with PSO algorithm (HC-
RBFPSO) for spam email filtering. We use Particle swarm Algorithm to optimize the centers of
RBFNN. KNN and SVD algorithms used to optimize the radii and the weights respectively within
the PSO iterative process, which means in each iterative process of PSO, the weights and Radii
are updated depend the fitness (error) function. Each particle in PSO consists of centers of hidden
neuron for RBFNN. After running PSO algorithm a number of iterations, the process selects the
best values of the centersc, radii r and weights w. To determine the optimal number of RBF
(Neurons); we use the incremental method which depends on increasing the number of RBF by 1
in each iteration, and terminated when the process gets the threshold value.
This paper is organized as follows; section 2, presents related works of the proposed field. Section
3, describes the RBFNN in details. Section 4, explains the PSO algorithm in details. Section 5,
shows the methodology. Section 6, shows the experimental results of our approach, conclusions
are presented in Section 7.
2.RELATED WORK
The most widely used methods for spam filtering are artificial neural networks (ANN) and
Bayesian method, also support vector machines, there are many techniques described for mail
filtering and spam detection. Initially, in [17], they present a LINGER based on ANN; LINGER
is theANN-based system used for automatic email classification. Although LINGER was tested in
3. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.4, July 2016
19
the email classification field, LINGER is a public architecture for all text classifications. LINGER
is flexible, adaptive system and compatible for most operations. ANN can be effective to be used
for spam filtering and automated email filing into mailboxes.In [18], they proposed spam filtering
approach for Turkish in particular. Their approach is dynamic and depends on Artificial Neural
Networks (ANN) and Bayesian Networks. This approach is dealing with the characteristics of the
incoming e-mails. Through their experiments for 750 e-mails (410 spams and 340 hams) the
accuracy achieved about 90%.
In [19], they combined Support Vector Machine (SVM) and Genetic Algorithm (GA) namely
GA-SVM, GA is used to select features that are most favorite to SVM classifier. The experiments
show that GA-SVM approachesbetter results than main SVM.In [20], they present a novel
approach of spam filtering includes the seven several steps, that depends on using the history of
previous mails and spam mails which are specific for each mailbox of theuser. Using the
knowledge base, detection of spam mails is performed by using artificial neural network
techniques. It also using keywords list to get some words in the incoming mail, then perform the
detection operation. The proposed approach works well with all kinds of spam mails (text spam
and image spam). Experiments results show that the detected spam at least 98.17 %. But the
limitation of this approach is needed higher memory space and more hardware for execution. So
to implement this approach for large mail servers, we need intelligent mail servers. In [21], they
present Continuous Learning Approach Artificial Neural Network CLA_ANN, which
includesmodifying core modifications on ANN in the input layers, which allow the input layers to
be changed over time and to replace useless layers with new promising layers which give best
results. The experiment result of CLA_ANN by using 300 input layers and using Spam Assassin
dataset, achieves results with 0.534 % false positive and 3.668% false negative.In [22], they
present a new technique for filtering spam; this technique consisted of a single perceptron that
was designed to distinguish between spam and legitimate mail messages. The perceptron
algorithm gives suitable detection rates; this is due to the incorporation of a continuous learning
feature. The results show that the best false positive value is found when the number of iterations
is 900.In [23], they proposed PSO-LM approach which is a new learning method for process
neural networks (PNNs) based on the Gaussian mixture functions and particle swarm
optimization (PSO).According to experiments results, PSO-LM had better performance on time-
series prediction and pattern recognition than basis function expansion based learning (BFE-LM)
and back propagation neural networks (BPNNs). But in PSO-LM approach, it needed more
computations for the global search strategy of PSO.
3.RADIAL BASIS FUNCTION NEURAL NETWORKS
Radial Basis Function Neural Networks are thetype of neural networks whose activation
functions in the hidden layer are radially symmetrical.Its output depends on the distance between
a vector that stores the input data and a vector of weights, which is called the center. RBFNN has
been used in many applications, such as function approximation, system control, speech
recognition, time-series prediction, and classification. [24]. The RBFNN has three feed-forward
layers: the input layer, the hidden layer, and output layer. The input data flow from theinput layer
to send the information to the hidden layer. The hidden layer neurons are activated depending on
the distance between each input pattern with the centroid stores each hidden neuron, which
determines the structure behavior of network. In hidden layer may be used different types of
activation functions, but the most type commonly used in themost application is the Gaussian
Function. The output layer calculates the linear sum of values of the hidden neuron and outputs it
[25]. Figure 1 shows the architecture of RBFNN that including three layers for classification into
two categories.
4. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.4, July 2016
20
Figure 1. Architecture of RBFNN
Two groups of parameters need to be determined in RBFNN [26]: the first category is the center
and radii, and the second one is the connection weights between the hidden layer and output
layer. The Gaussian activation function in the hidden layer ( Φ ) is calculated as follows in
equation 1:
( )
2
2
x cj
Φ exp
2σj
− −
= (1)
Where x = (x1, x2, x3 . . . , xn) is the input data, cjis the center of j-th hidden neuron, and σjis the
width of j-th hidden neuron. The output of RBFNN for each category is calculated as in the
following equation 2:
1
*Φ ( )
m
k
Y Wjk j x
=
= ∑ (2)
Where k=1, 2, 3 . . . , m is the number of nodes in the hidden layer. Wjkare the connection weights
values between the j-th hidden layer nodes and the k-th output nodes.
In RBFNN to reach the best classification, each output node computes a sort of score for the
associated category. Generally, classification decision is done by assigning the input to the
category with the highest score. The score is computed by taking a weighted sum of the activation
values from every RBF neuron.
One important parameter of RBFNN is the determination of the suitable number of neurons in
hidden layer, which affects the network complexity and the generalization of the RBFNN. If the
number of neurons is too small, the accuracy of the output will decrease. On the other hand, if the
number of neurons is too large, this cause over-fitting for the input data [27, 28]. In this paper, we
use the incremental method to compute classification accuracy for a specific number of neurons.
5. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.4, July 2016
21
3.PARTICLE SWARM OPTIMIZATION
Particle Swarm Optimization mimics the behaviors of birds flocking. In bird flocking, a group of
birds is randomly searching food in thecertain area. All the birds do not know where the food is
found, but they know how far the food in each iteration. PSO algorithm is a fast optimization
method due to need to adjust few parameters, which has fast convergence speed, high robustness,
and strong global search capability, does not require gradient information and is easy to
implement [29].
The population in PSO is called swarm that is constitute of particles (solutions) and then searches
for theoptimal position of particles by updating it for all iterations. In all iterations, each particle
is updated by following two best fitness values that are evaluated by using proper fitness function
according to theproblem. The first value is the best position it has achieved so far for each
particle; this value is called personal best (pbest). Another value is the best position for the entire
swarm obtained so far by any particle in the swarm; this best value is called a global best (gbest).
All particles have avelocity which determines thedirection of the particles and moves it to the new
position.
The basic algorithm of PSO is as following steps:
• Initialize each particle i of the swarm, with random values for theposition(Xi) and velocity
(Vi) in the search space according to the dimensionality of theproblem.
• Evaluate fitness value of particle by using fitness function.
• Compare the value obtained from the fitness function from particlei with the value of
Pbest.
• If the value of the fitness function is better than the Pbest value, then update the particle
position to takes the place of Pbest.
• If the value of Pbestform any particle is better than gbest, then update gbest = Pbest.
• Modify the position Xi and velocity Vi of the particles using equations 3 and 4,
respectively.
• If the maximum number of iterations or the ending criteria is not achieved so far, then
return to step 2.
•
( ) ( ) ( ) ( )
( ) ( )
Vid t 1 ω*Vid t c1r1 Pid t Xid t c2r2(Pgd t Xid(t))
+ = + − + − (3)
( ) ( ) ( )
Xid t 1 Xid t Vid t 1
+ = + + (4)
Where i = 1,2,…,M ; d = 1,2,…,n, t+1 is the current iteration number, t is the previous iteration
number, ω is the inertia weight, c1 and c2are the acceleration constant which is usually between
[0,2], Pi = (Pi1, Pi2,…, Pin) is the best previous position of particleiknew as the personal best
position (pbest), Pg = (Pg1, Pg2,…, Pgn) is the position of the best particle among all the particles in
the swarm known as the global best position (gbest), and r1and r2 are random numbers
distributed uniformly in (0, 1). The fitness function that is used in step 2 of PSO is Root Mean
Square Error (RMSE) for this paper; RMSE is shown in equation 5.
n
i 1
1
RMSE (T Y)²
n =
= −
∑ (5)
Where n is the number of input data, T is the target output, and Y is the real output.
6. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.4, July 2016
22
4.METHODOLOGY
PSO has been used to optimizethe parameters of RBFNN in several sides like network
architecture, learning algorithm, and network connections. In PSO every single solution is called
a particle. Using fitness function (RMSE) to evaluate the particles for theoptimal solution. In this
paper, we present a novel approach called HC-RBFPSO; this approach is a combined RBFNN
with PSO to reduce the number of neurons for RBFNN and improve classification accuracy for
spam filtering by using RBFNN, here select the best values of RBFNN centers by using PSO. The
remaining parameters of RBF, we use tradition algorithms namely Knn and SVD to optimize radii
and weight respectively within the PSO iterative process, which means in each iterative process
of PSO, the weights and Radii are updated depending the fitness (error) function [41]. HC-
RBFPSO approach is explained in the following pseudo code:
Start with one RBF (Neuron).
Initialize RBFNN parameters.
• Initialize the centers c randomly from theSPAMBASE dataset.
• Use Knn to initialize Radii r.
• Use SVD to initialize Weights w.
Start optimizing centers of RBFNN using PSO.
Initialize particles position randomly from the dataset and initialize velocity
randomly between (0, 1)
While not reach the maximum numbers of iteration do
For each particle do
Calculate fitness value (RMSE between Real output of RBFNN and Target)
If fitness value is better than best fitness value pbest in particle then
Set current position aspbest
End
Selectgbest of the particle which the best fitness value among all particles in
current iteration
Calculate particle velocity based on equation 3.
Update particle position (centers) based on equation 4.
End
End
Take the pbest of particle as centers c of RBFNN,
Complete training RBFNN using Knn and SVD.
Calculate the real output of RBFNN.
Calculate the classification accuracy for training and testing phase.
Repeat
It should be noted that inertia weight ω in PSO was first introduced by Shi and Eberhart [30] in
order to control the search speed and make particles converge to local minima quickly. Inertia
weight ω often have restricted between two numbers during a run. Here in this work, we calculate
the inertia weight by using equation 6.
( )
ωmax ωmin *t
ω ωmax
Tmax
−
= − (6)
Where ω is the inertia weight, ωmax is the maximum of ω (here ωmax=0.9), ωmin is the minimum of
ω (here ωmin=0.4), t is the current iteration number, and Tmax is the maximum iteration number.
In this paper, the training RBFNN is stopped when reaches the maximum number of iterations or
got the percentage of given accuracy. K-Nearest Neighbors is used to determining the width r of
7. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.4, July 2016
23
each RBF. Knn is a simple algorithm used for classification and regression [31]. Knn stores all
available cases and classifies new cases based on a similarity measure (e.g. Euclidean distance
functions). Knn is types of thelazy learning algorithm, where the function is only approximated
locally and all computation continues until classification [32] but this algorithm has been
successful in many numbers of classification and regression problems; such as handwritten digits
and satellite image scenes [33]. The number k is used to decide how many neighbors influence
the classification for new value. Mathematical calculations regarding Knn algorithm; shown in
equation 7.
[ ]
2
1
( , ) ( )
k
n
i
D x y sqrt xi yi
=
= −
∑ (7)
We use Singular Value Decomposition (SVD) to optimize the weights of output layer for RBF,
SVD is a powerful and useful matrix decomposition has been used in many fields such as data
analysis, reducing dimension transformations of images, data compression, signal processing, and
pattern analysis [34]. If mxn
A R
∈ , there exist orthogonal matrices mxm
S R
∈ and nxn
H R
∈ such
that:
1
( ,..., )
T
p
S A H diag σ σ
= (8)
Where p is the minimum of (m,n), σ are the singular values of A. The use of SVD technique to
calculate the optimal weights w of the RBFNN depends on using matrix notation described in the
following reducing expression:
Y w
= Φ
u
r r
(9)
Where Y is the real output of RBFNN, w are the weights vector, and Φ is the Gaussian activation
function matrix. Using the next following expression:
1
( ) T
A H diag S
k
= (10)
Where 1
( ,..., )
p
k diag σ σ
= , by replacing Φ in (9), using (10); the weights vector (11):
1
( ) T
w H diag S y
k
=
r r
(11)
SVD can solve any equation system. In the proposed case SVD effect in reducing the of the
output error, it can also be used to remove any RBF when its associated singular value had a
small value or if the approximation error can't affect the result.
4.1 Dataset
In this paper, we use SPAMBASE dataset to classify email as spam or non-spam. It is
downloaded from UCI Machine Learning Repository site [35]. SPAMBASE was proposed by
Mark Hopkinsand in his colleagues. SPAMBASE dataset is multivariate dataset contains data
from a single email account. SPAMBASE contains 4601 record previously identified – 1813
classified as non-spam (39.4%) and 2788 classified as spam (60.6%).SPAMBASE is containing
fifty-seven data attributes and one classification attribute to determine the type email (value 0 for
non-spam and value 1 for spam). Most of the attributes (1-54) express particular words or
characters were frequently in anemail. The attributes (55-57) measure the length of sequences of
consecutive capital letters.
8. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.4, July 2016
24
Here we will introduce definitions of the attributes:
• Attributes (1-48) 48 continuous real attributes of type word_freq_WORD = percentage of
words in the e-mail that match WORD.
• Attributes (49-54) 6 continuous real attributes of type char_freq_CHAR = percentage of
characters in the e-mail that match CHAR.
• Attribute (55) 1 continuous real attribute of type capital_run_length_average = average
length of uninterrupted sequences of capital letters.
• Attribute (56) 1 continuous integer attribute of type capital_run_length_longest = length
of longest uninterrupted sequence of capital letters.
• Attribute (57) 1 continuous integer attribute of type capital_run_length_total = sum of
thelength of uninterrupted sequences of capital letters = a total number of capital letters in
the e-mail.
4.2 Preprocessing
The available data in the SPAMBASE dataset is in numeric form. All thefifty-seven attributes in
the SPAMBASE dataset mostly represent frequencies of various words and characters in emails;
we wish to normalize this data before running HC-RBFPSO approach. Normalization processing
is an important stage due to speeding up model, convergence and reducing the effect of imbalance
in data to the classifier. In the training and testing stages for this paper, normalize the data in the
range [0, 1].
5. EXPERIMENTS AND RESULTS
In the file SPAMBASE.data from UCI repository site, each column contains attribute value for
each email, in each record, the data is delimited by commas. In this research, we use the
SPAMBASE dataset after converted to CSV (Comma Separated Values) file compatible with
Matlab environment. We will split the data into two phases, training set (70% data) and testing set
(30% data). Then the performance was measured by evaluating the accuracy for each phase. To
eliminate any data particular behavior, the data is selected randomly from thedataset for training
and testing sets.In our approach HC-RBFPSO, we use the most common approach to
finding the performance of spam filtering is the classification accuracy [36].Classification
Accuracyis the proportion of instances which are correctly classified. We compute Classification
Accuracy as shown in equation 12.
( )
TP TN
Accuracy
N
+
= (12)
Where TP is the True Positive, TN is the True Negative, and N is the size of samples data.To
compare the classification accuracy of our approach, we conduct multiple experiments of this
work including run the proposed approach (HC-RBFPSO) on the training data and test data for a
different number of neurons, after that we compare our results with other previous works.
The proposed approach HC-RBFPSO is experimented using MATLAB 2012 under Windows 7
with i5-3210M CPU 2.5GHz, 4GB RAM memory.
The parameters of the PSO algorithm that are used in this paper were set as inertia weight ω in
calculated based on the equation 6, the rests of parameters are illustrated in table 1.
9. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.4, July 2016
25
Table 1. Parameters for PSO used in HC-RBFPSO
Parameter Value
Iteration 100
c1 1.4
c2 1.4
The particle size is an important factor in HC-RBFPSO when the algorithm uses small particle
numbers it produce poor performance. But, large particle number produces a very residual
improvement compared to the improvement that occurs when using Median particle size but
increases the computational cost of the algorithms. From the results obtained you can see that
HC-RBFPSO approach has a good performance in the classification accuracy. As shown the
Table 2, the proposed approach used little number of neurons, therefore, asmall amount of the
computational cost.Now, we present the results for training and testing of HC-RBFPSO approach.
The experiments are a number of conducted by using adifferent number of neurons in
RBFNNhidden layer as shown in table 2. We recorded the results when using 10, 20, 30, 40, and
50 neurons for each class.
Table 2. Experiment result and comparison
Approach # Hidden Neuron Accuracy
[37] – RBF --- 84.3 %
[38] – MLP --- 93.28 %
[39] – ANN 30 91 %
[40] – MLP --- 91.85 %
Proposed Approach
HC-RBFPSO
10
Training phase 89.5 %
Testing phase 88.5 %
20
Training phase 91 %
Testing phase 90.1 %
30
Training phase 91.8 %
Testing phase 90.9 %
40
Training phase 92.5 %
Testing phase 91.4 %
50
Training phase 93.1 %
Testing phase 90.6 %
From table 2, we note that most previous studies compute the classification accuracy without
determines the number of hidden neurons but in our approach for each experiment determines the
number of neurons used and the classification accuracy. We note that from experiments on our
approach be effective in spam filtering messages using a small number of neurons in a large
dataset.
6. CONCLUSION
Radial Basis Function Neural Networks (RBFNN) is one of the most important types of artificial
neural networks (ANNs). It is characterized bybetter approximation, simpler network structures,
and faster learning algorithms. In this paper, we proposed a hybrid approach (HC-RBFPSO), that
combining RBFNN and PSO in the purpose to classifyEmail spam problems. PSO has been used
to improve RBFNN in several sides like network architecture, learning algorithm and network
connections. In this paper, we use PSO to find optimal centers of hidden neurons in RBFNN; it is
10. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.4, July 2016
26
also used traditional Knn algorithm to optimize the width of the RBFNN and SVD technique to
optimize the weight of RBFNN. The proposed method applied used large SPAMBASE dataset,
which presents a collection of spam and non-spam emails with 57 attributes. The results obtained
from the experiments are comparable with other approaches those that use the same dataset show
that better performance in terms of accuracy of the proposed approach.The results of the
simulations show that HC-RBFPSO is an effective method that is a reliable alternative for
classification. The quality of the results improves the convergence. Generally, we can conclude
that the main contributions of this paper which have been achieved through the application of the
proposed method HC-RBFPSO on the benchmark of spam dataset. This method has enabled build
a spam filtering system based on combining RBFNN and PSO.
REFERENCES
[1] De Morais Fonseca, O. H., Fazzion, E., Cunha, I., Las-Casas, P., Guedes, D., Meira, W., ...& Chaves,
M. (2016) “Measuring Characterizing, and Avoiding Spam Traffic Costs” IEEE Internet Computing
Volume:PP , Issue: 99.
[2] Email Statistical Report, http://www.radicati.com/wp/wp-content/uploads/2010/04/Email-Statistics-
Report-2010-2014-Executive-Summary2.pdf.
[3] Gaikwad, B. U., &Halkarnikar, P. P. (2014) “Random Forest Technique for E-mail Classification”,
International Journal of Scientific & Engineering Research, 5(3), 145-153.
[4] Gudkova, D. (2013) Kaspersky Security Bulletin, Spam Evolution 2013.
[5] UC Irvine Spam Stat istics (2013) http://www.oit .uci.edu/email/spam/stats/
[6] Bahgat, E. M., Rady, S., & Gad, W. (2016). “ An e-mail filtering approach using classification
techniques”. In The 1st International Conference on Advanced Intelligent System and Informatics
(AISI2015), November 28-30, 2015, BeniSuef, Egypt (pp. 321-331). Springer International
Publishing.
[7] Bouguila, N., &Amayri, O. (2009) “A discrete mixture-based kernel for SVMs: application to spam
and image categorization”, Information Processing & Management, 45(6), 631-642.
[8] Cao, Y., Liao, X., & Li, Y. (2004) “An e-mail filtering approach using neural network”, In
International Symposium on Neural Networks (pp. 688-694). Springer Berlin Heidelberg.
[9] Fdez-Riverola, F., Iglesias, E. L., Diaz, F., Méndez, J. R., &Corchado, J. M. (2007) “SpamHunting:
An instance-based reasoning system for spam labelling and filtering”, Decision Support Systems,
43(3), 722-736.
[10] S. Mason. New Law Designed to Limit Amount of Spam in e-mail.
[11] Stuart, I., Cha, S. H., &Tappert, C. (2004) “A neural network classifier for junk e-mail”, In Document
Analysis Systems VI (pp. 442-450). Springer Berlin Heidelberg.
[12] Han, J., Kamber, M., & Pei, J. (2011) Data mining: concepts and techniques, Elsevier.
[13] Lee, C. C., Chung, p. C., Tsai, J. R., & Chang, C. I. (1999) “Robust Radial Basis Function Neural
Networks”, Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE ,29, 674 – 685.
[14] Qasem, S. N., Shamsuddin, S. M., & Zain, A. M. (2012) “Multi-objective hybrid evolutionary
algorithms for radial basis function neural network design”, Knowledge-Based Systems, 27, 475-497
[15] Schaffer, J. D., Whitley, D., &Eshelman, L. (1992) “Combinations of genetic algorithms and neural
networks: a survey of the state of the art”, Combinations of Genetic Algorithms and Neural Networks,
1–37.
[16] Elbeltagi, E., Hegazy, T., & Grierson, D. (2005) “Comparison among five evolutionary-based
optimization algorithms”, Advanced Engineering Informatics, 19, 43 – 53.
[17] Clark, J., Koprinska, I., & Poon, J. (2003) “A neural network based approach to automated e-mail
classification”,In null (p. 702). IEEE.
[18] Özgür, L., Güngör, T., &Gürgen, F. (2004) “Adaptive anti-spam filtering for agglutinative languages:
a special case for Turkish”, Pattern Recognition Letters, 25(16), 1819-1831.
[19] Wang, H. B., Yu, Y., & Liu, Z. (2005) “SVM classifier incorporating feature selection using GA for
spam detection”, In Embedded and Ubiquitous Computing–EUC 2005 (pp. 1147-1154). Springer
Berlin Heidelberg.
[20] Tak, G. K., &Tapaswi, S. (2010) “Query Based approach towards spam attacks using artificial neural
network”, International Journal of Artificial Intelligence & Applications (IJAIA), 1(4).
11. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.4, July 2016
27
[21] Sabri, A. T., Mohammads, A. H., Al-Shargabi, B., &Hamdeh, M. A. (2010) ”Developing new
continuous learning approach for spam detection using artificial neural network (CLA_ANN)”,
European Journal of Scientific Research, 42(3), 525-535.
[22] Kufandirimbwa, O., &Gotora, R. (2012) “Spam Detection using Artificial Neural Networks
(Perceptron Learning Rule)”, Online J Phys Environ Sci Res, 1(2), 22-29.
[23] Liu, K., Tan, Y., & He, X. (2010) “Particle swarm optimization based learning method for process
neural networks”, In Advances in Neural Networks-ISNN 2010 (pp. 280-287). Springer Berlin
Heidelberg.
[24] Niu, D., Lu, Y., Xu, X., & Li, B. (2014) “Short-Term Power Load Point Prediction Based on the
Sharp Degree and Chaotic RBF Neural Network”, Mathematical Problems in Engineering, 2015, 8.
[25] Sangwan, O. P., Bhatia, P. K., & Singh, Y. (2011) “Radial basis function neural network based
approach to test oracle”, ACM SIGSOFT Software Engineering Notes, 36(5), 1- 5.
[26] Han, H. G., Chen, Q. L., &Qiao, J. F. (2011) “An efficient self-organizing RBF neural network for
water quality prediction”, Neural Networks, 24(7), 717-725.
[27] Mashor, M. Y. (1999) “Some Properties of RBF Network with Applications to System
Identification”, International Journal of Computer and Engineering Management, 7.
[28] Ou, Y. Y., Gromiha, M. M., Chen, S. A., &Suwa, M. (2008)“TMBETADISC-RBF: Discrimination of
β-barrel membrane proteins using RBF networks and PSSM profiles”, Computational Biology and
Chemistry, 32(3), 227–231.
[29] Modares, H., Alfi, A., & Sistani, M. N. (2010) “Parameter estimation of bilinear systems based on an
adaptive particle swarm optimization”, Engineering Applications of Artificial Intelligence, 23(7),
1105-1111.
[30] Shi, Y., &Eberhart, R. (1998) “A Modified Particle Swarm Optimizer”, Evolutionary Computation
Proceedings, IEEE World Congress on Computational Intelligence (pp. 1945–1950).
[31] Altman, N. S. (1992) “An introduction to kernel and nearest-neighbor nonparametric regression”, The
American Statistician, 46 (3), 175–185.
[32] Song, Y., Huang J., Zhou, D., Zha, H., & Giles, C. L. (2007) “IKNN: Informative K-Nearest
Neighbor Pattern Classification”, Knowledge Discovery in Databases, 4702, 248–264.
[33] Weinberger, K. Q., & Saul, L. K. (2009)“Distance Metric Learning for Large Margin Nearest
Neighbor Classification”, Journal of Machine Learning Research, 10, 207-244.
[34] Golub, G. H., & Van Loan, C. F. (2013) Matrix Computations, Hopkins University Press.
[35] Spambase Data Set https://archive.ics.uci.edu/ml/datasets/Spambase. 18/4/2016, 22:35.
[36] Sokolova, M., Japkowicz, N., &Szpakowicz, S. (2006) “Beyond accuracy, F-score and ROC: a family
of discriminant measures for performance evaluation”, In AI 2006: Advances in Artificial Intelligence
(pp. 1015-1021). Springer Berlin Heidelberg.
[37] Costa, K., Ribeiro, P., Camargo, A., Rossi, V., Martins, H., Neves, M., & Papa, J. P.
(2014)“Comparison of the Intelligent Techniques for Data Mining in Spam Detection to Computer
Networks”.
[38] Sharma, S., & Arora, A. (2013) “Adaptive approach for spam detection”, IJCSI International Journal
of Computer Science Issues, 10(4), 23-26.
[39] Jukic, S., Azemovic, J.,Keco, D., &Kevric, J. (2015) “COMPARISON OF MACHINE LEARNING
TECHNIQUES IN SPAM E-MAIL CLASSIFICATION”, Southeast Europe Journal of Soft
Computing, 4(1).
[40] Faris, H., Jaradat, K., Al-Zewairi, M., &Adwan, O. (2015)“Improving knowledge based spam
detection methods: The effect of malicious related features in imbalance data distribution”,
International Journal of Communications, Network and System Sciences, 8(5), 118.
[41] Monir Foqaha Mohammed Awad, (2016) “Hybrid Approach to Optimize the Centers of Radial Basis
Function Neural Network Using Particle Swarm Optimization”, Journal of Computers (JCP), Volume
12, Number 5, 2016.
12. International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.4, July 2016
AUTHORS
Mohammed Awad received the Ph.D. degrees in Computer Engineering from the
Granada University Spain. From 2005 to 2006, he was a contract Researcher at
Granada University. Since Feb. 2006, he has been an Assistant Professor in Computer
Engineering Department, College o
American University. At 2010 he has been an associate Professor in Computer
Engineering. He worked for more than 10 years at the Arab American University in
academic Position, in parallel with various Academ
(Departments Chairman and Dean Assistant, and Dean of Scientific Research/Editor
AAUJ). Through the research and educational experience, he has developed strong research record. His
research interests include: Artificial Intelligence, Neural Networks, Function Approximation of Complex
Systems, Clustering Algorithms, Input Variable Selection, Fuzzy Expert Systems ,Genetic Algorithms and
Particle Swarm Optimization.
Monir Foqaha is Master Student in Compu
Engineering and Information Technology at Arab American University of Jenin,
Palestine. He received his Bachelor's degree in Computer Science from An
National University of Nablus, Palestine in 2007. His research
Networks and optimization algorithms.
International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.4, July 2016
received the Ph.D. degrees in Computer Engineering from the
Granada University Spain. From 2005 to 2006, he was a contract Researcher at
Granada University. Since Feb. 2006, he has been an Assistant Professor in Computer
Engineering Department, College of Engineering and Information Technology at Arab
American University. At 2010 he has been an associate Professor in Computer
Engineering. He worked for more than 10 years at the Arab American University in
academic Position, in parallel with various Academic administrative positions.
(Departments Chairman and Dean Assistant, and Dean of Scientific Research/Editor-In-Chief, Journal of
AAUJ). Through the research and educational experience, he has developed strong research record. His
de: Artificial Intelligence, Neural Networks, Function Approximation of Complex
Systems, Clustering Algorithms, Input Variable Selection, Fuzzy Expert Systems ,Genetic Algorithms and
is Master Student in Computer Science programin the Faculty of
Engineering and Information Technology at Arab American University of Jenin,
He received his Bachelor's degree in Computer Science from An-Najah
National University of Nablus, Palestine in 2007. His research interests include Neural
Networks and optimization algorithms.
International Journal of Network Security & Its Applications (IJNSA) Vol.8, No.4, July 2016
28
Chief, Journal of
AAUJ). Through the research and educational experience, he has developed strong research record. His
de: Artificial Intelligence, Neural Networks, Function Approximation of Complex
Systems, Clustering Algorithms, Input Variable Selection, Fuzzy Expert Systems ,Genetic Algorithms and