SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016
DOI:10.5121/ijcax.2016.3302 19
SPAM FILTERING SECURITY EVALUATION
FRAMEWORK USING SVM, LR AND MILR
Kunjali Pawar1
and Madhuri Patil2
1
M.E. Student, Dr. D.Y.Patil School of Engg. And Technology, Lohegaon, Pune,
Savitribai Phule Pune University, India.
2
Assistant Professor, Dr. D.Y.Patil School of Engg. And Technology, Lohegaon, Pune,
Savitribai Phule Pune University, India.
ABSTRACT
The Pattern classification system classifies the pattern into feature space within a boundary. In case
adversarial applications use, for example Spam Filtering, the Network Intrusion Detection System (NIDS),
Biometric Authentication, the pattern classification systems are used. Spam filtering is an adversary
application in which data can be employed by humans to attenuate perspective operations. To appraise the
security issue related Spam Filtering voluminous machine learning systems. We presented a framework for
the experimental evaluation of the classifier security in an adversarial environments, that combines and
constructs on the arms race and security by design, Adversary modelling and Data distribution under
attack. Furthermore, we presented a SVM, LR and MILR classifier for classification to categorize email as
legitimate (ham) or spam emails on the basis of thee text samples.
KEYWORDS
Adversary Model, Multiple Instance Logistic Regression, Pattern Classification, Security Evaluation, Spam
Filtering
1. INTRODUCTION
This Machine learning systems bid an unparalleled resilience in acting with emerging input in a
variation of applications, such as Intrusion Detection Systems (IDS) [1] and the spam filtering of
e-mails. Whenever machine learning is used to prevent illegal or unsanctioned activity [2] and
there is an economic incentive, adversaries will attempt to avoid the stability provided.
Constraints on how adversaries can employs the training data (TR) and test data (TS) for
classifiers used to encounter incredulous behaviour make problems in this area tractable and
interesting. Pattern classification has earned eminence in different fields which contains security
concerned applications like the Spam Filtering, the Network Intrusion Detection System (NIDS),
and Biometric Authentication to distinguish between the legitimate and malicious samples [3].
In specific, there are three main clear issues can be recognized: (a) examining the weaknesses
(vulnerabilities) of classification algorithms, and the corresponding attacks; (b) creating the novel
methodologies to assess the classifier security under these attacks, which is not possible using the
classical performance evaluation methodologies; (c) establishing the design methods [4] to
guarantee the classifier security in an adversarial environment. The goal of attacker is to defeat
the normal process of spam filters so that they can send spams [5].
International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016
20
The respite of the paper is unionized as follows: The section II, scrutinize about the problem
definition on the Security Evaluation. The section III, discuss a proposed system framework for
Spam Filtering Security Evaluation. The section IV scrutinizes the algorithms and evaluation of
these algorithms using examples. The remainder of section V covers expected results of
classifiers. The section VI, summarize the conclusion and the future scope.
2. PROBLEM STATEMENT
2.1. Problem statement
• Existing methods address one of the main open issues of evaluating at design phase the
security of pattern classifiers.
• Even though the design phase of secure classifiers is a different issue than security
evaluation, existing framework could be exploited to this end. For instance spam filtering
existing system considers SVM and LR classifier.
• To apply an empirical security evaluation framework and provide security to Spam
Filtering application and use best classifier in our framework.
2.2. Solving approach
The proposed system focuses on multiple instance logistic regression (MILR) strategy. In the
recommended strategy, emails are treated as bags of multiple instances [6] and a logistic model at
the instance level is indirectly learned by exploiting the bag level binomial log-likelihood
function [14].
3. PROPOSED FRAMEWORK
The contribution of this paper is-
• Classification of email using SVM, LR and MILR classifiers.
• Intent to increase classification results, classifier called Multiple Instance Logistic
Regression (MILR) is used.
• MILR differs from a single instance supervised learning [7], such that by splitting an
email into several instances, a MI learner will be capable to identify the spam part of the
text mail even though text mail has been injected with good words which solve the
efficiency issue for GWI attack [14].
The data distribution gives the training data and testing data separately [8]. The testing data can
be manually generated by the user during the compose emails. The assumptions can be given with
the help of Adversary Model [9]. Modelling the adversary is dependent on the attack scenarios. It
consists of goal, knowledge, capability, strategies of the adversary as shown in figure 1.
The classification application can be authenticated by authenticator. It consists of three classifiers
like SVM, LR and MILR. The classifiers acts like an algorithms. These classifiers give its
classification results either the email is spam or legitimate or normal. The training data can be
already trained by admin. This user can be an attacker or an authorized person. For this
application user can perform classification techniques (SVM, LR, and MILR) by means of
analysis. This training region subsists of all types of mails such as spam or ham. For classification
of testing part/mail using training part, different classifiers are used. SVM, LR and MILR
classifiers are used for classification and result analysis [11].
International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016
21
Figure1. Security Evaluation Framework using Spam Filtering
The Pattern classifier classifies or distinguishes the pattern (which is combination of feature
which can be characterized by the individuals) into the feature space or word space within a
boundary [10], [12], [13]. The goal is to partition the feature or word space in the class labeled
decision regions. Therefore, for the ambition of model selection considers that the developer
wants to appoint a Support Vector Machine (SVM) with a linear kernel, a Logistic Regression
(LR) classifier, and Multiple Instance Logistic Regression (MILR). In the proposed system, for
the classification purpose SVMs are actualized with the LibSVM, Logistic Regression (LR) and
Multiple Instance Logistic Regression (MILR) is used for practical analysis.
4. ALGORITHMS WITH EXAMPLE
Firstly, a framework is presented for the empirical evaluation of classifier based on simulation of
potential attack scenarios. The existing system considers SVM and LR classifiers [11]. The
proposed system focuses on multiple instance logistic regression (MILR) strategy.
4.1. SVM Classifier
Algorithm: SVM classifier
Input:
Set of email data ,
(Combination of positively and negatively labeled data)
Output: Classified email data (Spam/Ham)
International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016
22
Process:
Step1: Distribution of positively and negatively labeled data according to features.
Step2: Compute Mapping function Ø().
Step3: Set bias as 1 to every vectors
Step4: Compute dot (.) products equations
Step5: Calculate the value of discriminate Hyperplanes α1, α2, α3,..
Step6: Predict positive and negative samples
Example:
Figure 2 shows the evaluation of SVM classifier with an example.
Figure2. SVM example
4.2. LR Classifier
Algorithm: LR classifier
Consider y= 1, if word spam and y=0, if word is not Spam (Ham).
For Spam Filtering, classification of words as spam or ham
International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016
23
The probability of word is
The probability for spam per word is
The probability for ham per word is
And
Example:
Figure 3 shows the evaluation of LR classifier with an example.
Figure3. LR example
4.2. MILR Classifier
Algorithm: MILR classifier
Input:
Set of email data ,
Be probability that the ith
email is Positive,
Be probability that the ith
email is Negative
International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016
24
Is a vector of the word frequency counts (or tf-idf weight) of unique terms in every email.
Process:
Step 1: Binomial log-likelihood function is:
Step 2: In a single instance setting, probability has sigmoid response function as:
Step 3: In multiple instances, setting estimate the instance-level class probabilities
has a sigmoidal response function as:
Where, is the jth
instance in the ith
data, and and are the parameters that need to be
estimated.
Step 4: In a single instance setting, probability has sigmoid response function as:
Step 5: In multiple instance setting estimate the instance-level class probabilities
has a sigmoidal response function as:
5. EXPECTED RESULTS
The experimental results of the classification of legitimate (normal) and Spam e-mails are
computed using the accuracy of the classifiers. The input of the proposed system is the number of
testing samples. The computations of results are based on different mails. Some mails are trained
before test and some new mails are also tested in proposed system. The analysis shows that MILR
approach perform better as compare to SVM and LR algorithm by considering parameters like
time, mean absolute error, etc. The accuracy can be calculated using following formula,
Classification accuracy:
t
c
N
N
Ac =
Where, = Number of words which are correctly classified
= Total number of words
In this experiment, the efficiency of SVM, LR and MILR [11], [14] is evaluated to test the ability
of classifiers [15]. Figure2 shows the output of accuracy on every classifier. Here we use the
Spring Tool Suite (STS) with wampserver for database connectivity. Table 1 shows the accuracy
result for queries M1, M2, M3 and M4 mail in terms of percentage (%).
International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016
25
M1: Code demonstrates how to get input from user.
M2: This is too dirty place. Please clean otherwise wash it.
M3: I hate you idiot. I will kill you idiot.
M4: The Indian Mujahideen claimed responsibility for the Jaipur bombings through an email sent
to Indian media and declared open war against India.
TABLE I: Classification Accuracy
Figure2. Graphical representation of classification accuracy
M1 M2 M3 M4
SVM 58.93 61.24 74.49 58.93
LR 55.24 60.2 65.48 58.93
MILR 64.73 68.75 73.33 64.58
International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016
26
6. CONCLUSION
This paper focused on experimental security evaluation of the pattern classifiers which improve
prediction accuracy of spam filtering application. For classification and analysis three classifiers
are used, are called SVM, LR and MILR. The proposed framework acquainted on a model of the
adversary, and on a model of data distribution; accommodates an analytical approach for the
training and testing sets generation that accredits security evaluation and can furnish the
application distinct techniques. In the future, we will extend the data classification algorithm that
will improve accuracy and performance of the system by means of spam detection.
ACKNOWLEDGEMENTS
We would like to thank the researchers as well as publishers for making their resources available
and teachers for their guidance. We are thankful to the authorities of Savitribai Phule Pune
University and concern members for their constant guidelines and support. We are also thankful
to reviewer for their valuable suggestions and also thank the college authorities for providing the
required infrastructure and support.
REFERENCES
[1] A. A. Cardenas, J.S. Baras, and K. Seamon, A Framework for the Evaluation of Intrusion Detection
Systems, Proc. IEEE Symp. Security and Privacy, pp. 63-77, 2006.
[2] D.B. Skillicorn, Adversarial Knowledge Discovery, IEEE Intelligent Systems, vol. 24, no. 6,
Nov./Dec. 2009.
[3] M. Barreno, B. Nelson, R. Sears, A.D. Joseph, and J.D. Tygar, Can Machine Learning be Secure?
Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp. 16-25, 2006.
[4] Kunjali Pawar and Madhuri Patil, A Review on Security Evaluation for Pattern Classifier against
Attack, International Journal of Computer Applications (IJCA) Proceedings on National Conference
on Advances in Computing NCAC-2015(4): 19-22, December 2015. (ISSN: 0975-8887).
[5] Y. Song, Z. Zhuang, W. C. Lee, H. Li, C.L. Giles and J. Li Q. Zhao, Real-Time Automatic Tag
Recommendation, Proc. 31st Ann. Intl ACM SIGIR Conf. Research and Development in
Information Retrieval (SIGIR 08), pp. 515-522, 2008.
[6] A. Kolcz and C.H. Teo, Feature Weighting for Improved Classifier Robustness, Proc. Sixth Conf.
Email and Anti- Spam, 2009.
[7] P. Laskov and R. Lippmann, Machine Learning in Adversarial Environments, Machine Learning,
vol. 81, pp. 115- 119, 2010.
[8] M. Barreno, B. Nelson, A. Joseph, and J. Tygar, The Security of Machine Learning, Machine
Learning, vol. 81, pp. 121- 148, 2010.
[9] D.B. Skillicorn, Adversarial Knowledge Discovery, IEEE Intelligent Systems, vol. 24, no. 6,
Nov./Dec. 2009.
[10] P. Laskov and M. Kloft, A Framework for Quantitative Security Analysis of Machine Learning,
Proc. Second ACM Workshop Security and Artificial Intelligence, pp. 1-4, 2009.
[11] B. Biggio, G. Fumera, and F. Roli, Security Evaluation of Pattern Classifiers under Attack, IEEE
Transactions On knowledge and Data engg., vol. 26, No. 4, April 2014.
[12] D. Lowd and C. Meek, Good Word Attacks on Statistical Spam Filters, Proc. Second Conf. Email
and Anti-Spam, 2005.
[13] R.O. Duda, P.E. Hart, and D.G. Stork, Pattern Classification, Wiley-Interscience Publication, 2000.
[14] Z. Jorgensen, Y. Zhou, and M. Inge, A Multiple Instance Learning Strategy for Combating Good
Word Attacks on Spam Filters, J. Machine Learning Research, vol. 9, pp. 1115-1146, 2008.
[15] Kunjali Pawar and Madhuri Patil, Pattern Classification under Attack on Spam Filtering, IEEE
International Conference on Research in Computational Intelligence and Communication Networks
(ICRCICN-2015), November 2015.
International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016
27
AUTHORS
Ms. Kunjali Pawar received Bachelor of Engineering degree in Computer Science &
Engineering in 2014 and now pursuing Post Graduation (M.E.) in the department of
Computer Engineering from Dr. D.Y.Patil School of Engineering and Technology in
the current academic year 2015-16. She is now studying for the domain Data Mining
and Information Retrieval as research purpose on Security Evaluation of Pattern
Classifier against attack using Spam filtering during her academic year.
Prof. Mrs. Madhuri Patil. She is presently working as an Assistant Professor in the
department of computer engineering, Dr. D. Y. Patil School of Engineering and
Technology, Pune, Maharashtra, India. She has 6 years experience in teaching field and
her research area is Data Mining and Information Retrieval.

More Related Content

What's hot

NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique Sujeet Suryawanshi
 
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWAREMINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWAREIJNSA Journal
 
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWAREMINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWAREIJNSA Journal
 
Intelligent Intrusion Detection System Based on MLP, RBF and SVM Classificati...
Intelligent Intrusion Detection System Based on MLP, RBF and SVM Classificati...Intelligent Intrusion Detection System Based on MLP, RBF and SVM Classificati...
Intelligent Intrusion Detection System Based on MLP, RBF and SVM Classificati...IJCSIS Research Publications
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectioneSAT Publishing House
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectioneSAT Journals
 
414351_Iason_Papapanagiotakis-bousy_Iason_Papapanagiotakis_Thesis_2360661_357...
414351_Iason_Papapanagiotakis-bousy_Iason_Papapanagiotakis_Thesis_2360661_357...414351_Iason_Papapanagiotakis-bousy_Iason_Papapanagiotakis_Thesis_2360661_357...
414351_Iason_Papapanagiotakis-bousy_Iason_Papapanagiotakis_Thesis_2360661_357...Jason Papapanagiotakis
 
IRJET- Effective Technique Used for Malware Detection using Machine Learning
IRJET-  	  Effective Technique Used for Malware Detection using Machine LearningIRJET-  	  Effective Technique Used for Malware Detection using Machine Learning
IRJET- Effective Technique Used for Malware Detection using Machine LearningIRJET Journal
 
The comparison of the text classification methods to be used for the analysis...
The comparison of the text classification methods to be used for the analysis...The comparison of the text classification methods to be used for the analysis...
The comparison of the text classification methods to be used for the analysis...ijcsit
 
Selecting Prominent API Calls and Labeling Malicious Samples for Effective Ma...
Selecting Prominent API Calls and Labeling Malicious Samples for Effective Ma...Selecting Prominent API Calls and Labeling Malicious Samples for Effective Ma...
Selecting Prominent API Calls and Labeling Malicious Samples for Effective Ma...IJCSIS Research Publications
 
Who is responsible for adversarial defense
Who is responsible for adversarial defenseWho is responsible for adversarial defense
Who is responsible for adversarial defenseKishor Datta Gupta
 
Network Based Intrusion Detection System using Filter Based Feature Selection...
Network Based Intrusion Detection System using Filter Based Feature Selection...Network Based Intrusion Detection System using Filter Based Feature Selection...
Network Based Intrusion Detection System using Filter Based Feature Selection...IRJET Journal
 
Genetic algorithm based approach for
Genetic algorithm based approach forGenetic algorithm based approach for
Genetic algorithm based approach forIJCSES Journal
 
Multibiometric Secure Index Value Code Generation for Authentication and Retr...
Multibiometric Secure Index Value Code Generation for Authentication and Retr...Multibiometric Secure Index Value Code Generation for Authentication and Retr...
Multibiometric Secure Index Value Code Generation for Authentication and Retr...ijsrd.com
 

What's hot (16)

NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
NSL KDD Cup 99 dataset Anomaly Detection using Machine Learning Technique
 
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWAREMINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
 
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWAREMINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
MINING PATTERNS OF SEQUENTIAL MALICIOUS APIS TO DETECT MALWARE
 
Intelligent Intrusion Detection System Based on MLP, RBF and SVM Classificati...
Intelligent Intrusion Detection System Based on MLP, RBF and SVM Classificati...Intelligent Intrusion Detection System Based on MLP, RBF and SVM Classificati...
Intelligent Intrusion Detection System Based on MLP, RBF and SVM Classificati...
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
 
414351_Iason_Papapanagiotakis-bousy_Iason_Papapanagiotakis_Thesis_2360661_357...
414351_Iason_Papapanagiotakis-bousy_Iason_Papapanagiotakis_Thesis_2360661_357...414351_Iason_Papapanagiotakis-bousy_Iason_Papapanagiotakis_Thesis_2360661_357...
414351_Iason_Papapanagiotakis-bousy_Iason_Papapanagiotakis_Thesis_2360661_357...
 
IRJET- Effective Technique Used for Malware Detection using Machine Learning
IRJET-  	  Effective Technique Used for Malware Detection using Machine LearningIRJET-  	  Effective Technique Used for Malware Detection using Machine Learning
IRJET- Effective Technique Used for Malware Detection using Machine Learning
 
20170412 om patri pres 153pdf
20170412 om patri pres 153pdf20170412 om patri pres 153pdf
20170412 om patri pres 153pdf
 
The comparison of the text classification methods to be used for the analysis...
The comparison of the text classification methods to be used for the analysis...The comparison of the text classification methods to be used for the analysis...
The comparison of the text classification methods to be used for the analysis...
 
Selecting Prominent API Calls and Labeling Malicious Samples for Effective Ma...
Selecting Prominent API Calls and Labeling Malicious Samples for Effective Ma...Selecting Prominent API Calls and Labeling Malicious Samples for Effective Ma...
Selecting Prominent API Calls and Labeling Malicious Samples for Effective Ma...
 
Who is responsible for adversarial defense
Who is responsible for adversarial defenseWho is responsible for adversarial defense
Who is responsible for adversarial defense
 
Network Based Intrusion Detection System using Filter Based Feature Selection...
Network Based Intrusion Detection System using Filter Based Feature Selection...Network Based Intrusion Detection System using Filter Based Feature Selection...
Network Based Intrusion Detection System using Filter Based Feature Selection...
 
Genetic algorithm based approach for
Genetic algorithm based approach forGenetic algorithm based approach for
Genetic algorithm based approach for
 
Multibiometric Secure Index Value Code Generation for Authentication and Retr...
Multibiometric Secure Index Value Code Generation for Authentication and Retr...Multibiometric Secure Index Value Code Generation for Authentication and Retr...
Multibiometric Secure Index Value Code Generation for Authentication and Retr...
 
Abstract
AbstractAbstract
Abstract
 

Similar to SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR

Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attackSecurity evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attackShakas Technologies
 
JPJ1425 Security Evaluation of Pattern Classifiers under Attack
JPJ1425  Security Evaluation of Pattern Classifiers under AttackJPJ1425  Security Evaluation of Pattern Classifiers under Attack
JPJ1425 Security Evaluation of Pattern Classifiers under Attackchennaijp
 
A Survey of Security of Multimodal Biometric Systems
A Survey of Security of Multimodal Biometric SystemsA Survey of Security of Multimodal Biometric Systems
A Survey of Security of Multimodal Biometric SystemsIJERA Editor
 
security evaluation of pattern classifiers under attack
security evaluation of pattern classifiers under attacksecurity evaluation of pattern classifiers under attack
security evaluation of pattern classifiers under attackswathi78
 
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...IEEEMEMTECHSTUDENTSPROJECTS
 
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...IEEEFINALYEARSTUDENTPROJECTS
 
Evasion Attack Detection using Adaboost Learning Classifier
Evasion Attack Detection using Adaboost Learning ClassifierEvasion Attack Detection using Adaboost Learning Classifier
Evasion Attack Detection using Adaboost Learning ClassifierIRJET Journal
 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Papitha Velumani
 
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...IJMER
 
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...IRJET Journal
 
A web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tamA web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tameSAT Journals
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectioneSAT Publishing House
 
Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Drjabez
 
Improved spambase dataset prediction using svm rbf kernel with adaptive boost
Improved spambase dataset prediction using svm rbf kernel with adaptive boostImproved spambase dataset prediction using svm rbf kernel with adaptive boost
Improved spambase dataset prediction using svm rbf kernel with adaptive boosteSAT Journals
 
Email Spam Detection Using Machine Learning
Email Spam Detection Using Machine LearningEmail Spam Detection Using Machine Learning
Email Spam Detection Using Machine LearningIRJET Journal
 
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion DetectionMulti Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion DetectionIJNSA Journal
 
Adversarial Attacks and Defenses in Malware Classification: A Survey
Adversarial Attacks and Defenses in Malware Classification: A SurveyAdversarial Attacks and Defenses in Malware Classification: A Survey
Adversarial Attacks and Defenses in Malware Classification: A SurveyCSCJournals
 
Progress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection SystemsProgress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection Systemsijcisjournal
 

Similar to SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR (20)

Spam email filtering
Spam email filteringSpam email filtering
Spam email filtering
 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attackSecurity evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack
 
JPJ1425 Security Evaluation of Pattern Classifiers under Attack
JPJ1425  Security Evaluation of Pattern Classifiers under AttackJPJ1425  Security Evaluation of Pattern Classifiers under Attack
JPJ1425 Security Evaluation of Pattern Classifiers under Attack
 
A Survey of Security of Multimodal Biometric Systems
A Survey of Security of Multimodal Biometric SystemsA Survey of Security of Multimodal Biometric Systems
A Survey of Security of Multimodal Biometric Systems
 
security evaluation of pattern classifiers under attack
security evaluation of pattern classifiers under attacksecurity evaluation of pattern classifiers under attack
security evaluation of pattern classifiers under attack
 
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...
2014 IEEE JAVA DATA MINING PROJECT Security evaluation of pattern classifiers...
 
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
IEEE 2014 JAVA DATA MINING PROJECTS Security evaluation of pattern classifier...
 
Evasion Attack Detection using Adaboost Learning Classifier
Evasion Attack Detection using Adaboost Learning ClassifierEvasion Attack Detection using Adaboost Learning Classifier
Evasion Attack Detection using Adaboost Learning Classifier
 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack
 
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...Classification Rule Discovery Using Ant-Miner Algorithm: An  Application Of N...
Classification Rule Discovery Using Ant-Miner Algorithm: An Application Of N...
 
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...An Approach for Malicious Spam Detection in Email with Comparison of Differen...
An Approach for Malicious Spam Detection in Email with Comparison of Differen...
 
A web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tamA web application detecting dos attack using mca and tam
A web application detecting dos attack using mca and tam
 
A multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detectionA multi classifier prediction model for phishing detection
A multi classifier prediction model for phishing detection
 
Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools Anomaly detection by using CFS subset and neural network with WEKA tools
Anomaly detection by using CFS subset and neural network with WEKA tools
 
Improved spambase dataset prediction using svm rbf kernel with adaptive boost
Improved spambase dataset prediction using svm rbf kernel with adaptive boostImproved spambase dataset prediction using svm rbf kernel with adaptive boost
Improved spambase dataset prediction using svm rbf kernel with adaptive boost
 
Email Spam Detection Using Machine Learning
Email Spam Detection Using Machine LearningEmail Spam Detection Using Machine Learning
Email Spam Detection Using Machine Learning
 
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion DetectionMulti Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
Multi Stage Filter Using Enhanced Adaboost for Network Intrusion Detection
 
Ij2514951500
Ij2514951500Ij2514951500
Ij2514951500
 
Adversarial Attacks and Defenses in Malware Classification: A Survey
Adversarial Attacks and Defenses in Malware Classification: A SurveyAdversarial Attacks and Defenses in Malware Classification: A Survey
Adversarial Attacks and Defenses in Malware Classification: A Survey
 
Progress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection SystemsProgress of Machine Learning in the Field of Intrusion Detection Systems
Progress of Machine Learning in the Field of Intrusion Detection Systems
 

More from ijcax

NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGESNEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGESijcax
 
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEMTHE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEMijcax
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...ijcax
 
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation ijcax
 
On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems ijcax
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING ijcax
 
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR ijcax
 
BLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDBLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDijcax
 
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...ijcax
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
TRACE LENGTH CALCULATION ON PCBS
TRACE LENGTH CALCULATION ON PCBSTRACE LENGTH CALCULATION ON PCBS
TRACE LENGTH CALCULATION ON PCBSijcax
 
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...ijcax
 
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...ijcax
 
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...ijcax
 
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR ijcax
 
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...Developing Product Configurator Tool Using CADs’ API with the help of Paramet...
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...ijcax
 
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...ijcax
 
BLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDBLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDijcax
 
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION ijcax
 

More from ijcax (20)

NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGESNEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
 
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEMTHE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
 
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
 
On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
 
BLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDBLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLIND
 
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
TRACE LENGTH CALCULATION ON PCBS
TRACE LENGTH CALCULATION ON PCBSTRACE LENGTH CALCULATION ON PCBS
TRACE LENGTH CALCULATION ON PCBS
 
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
 
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...
 
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...
 
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
 
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...Developing Product Configurator Tool Using CADs’ API with the help of Paramet...
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...
 
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...
 
BLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDBLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLIND
 
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION
 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 

Recently uploaded (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 

SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR

  • 1. International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016 DOI:10.5121/ijcax.2016.3302 19 SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR Kunjali Pawar1 and Madhuri Patil2 1 M.E. Student, Dr. D.Y.Patil School of Engg. And Technology, Lohegaon, Pune, Savitribai Phule Pune University, India. 2 Assistant Professor, Dr. D.Y.Patil School of Engg. And Technology, Lohegaon, Pune, Savitribai Phule Pune University, India. ABSTRACT The Pattern classification system classifies the pattern into feature space within a boundary. In case adversarial applications use, for example Spam Filtering, the Network Intrusion Detection System (NIDS), Biometric Authentication, the pattern classification systems are used. Spam filtering is an adversary application in which data can be employed by humans to attenuate perspective operations. To appraise the security issue related Spam Filtering voluminous machine learning systems. We presented a framework for the experimental evaluation of the classifier security in an adversarial environments, that combines and constructs on the arms race and security by design, Adversary modelling and Data distribution under attack. Furthermore, we presented a SVM, LR and MILR classifier for classification to categorize email as legitimate (ham) or spam emails on the basis of thee text samples. KEYWORDS Adversary Model, Multiple Instance Logistic Regression, Pattern Classification, Security Evaluation, Spam Filtering 1. INTRODUCTION This Machine learning systems bid an unparalleled resilience in acting with emerging input in a variation of applications, such as Intrusion Detection Systems (IDS) [1] and the spam filtering of e-mails. Whenever machine learning is used to prevent illegal or unsanctioned activity [2] and there is an economic incentive, adversaries will attempt to avoid the stability provided. Constraints on how adversaries can employs the training data (TR) and test data (TS) for classifiers used to encounter incredulous behaviour make problems in this area tractable and interesting. Pattern classification has earned eminence in different fields which contains security concerned applications like the Spam Filtering, the Network Intrusion Detection System (NIDS), and Biometric Authentication to distinguish between the legitimate and malicious samples [3]. In specific, there are three main clear issues can be recognized: (a) examining the weaknesses (vulnerabilities) of classification algorithms, and the corresponding attacks; (b) creating the novel methodologies to assess the classifier security under these attacks, which is not possible using the classical performance evaluation methodologies; (c) establishing the design methods [4] to guarantee the classifier security in an adversarial environment. The goal of attacker is to defeat the normal process of spam filters so that they can send spams [5].
  • 2. International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016 20 The respite of the paper is unionized as follows: The section II, scrutinize about the problem definition on the Security Evaluation. The section III, discuss a proposed system framework for Spam Filtering Security Evaluation. The section IV scrutinizes the algorithms and evaluation of these algorithms using examples. The remainder of section V covers expected results of classifiers. The section VI, summarize the conclusion and the future scope. 2. PROBLEM STATEMENT 2.1. Problem statement • Existing methods address one of the main open issues of evaluating at design phase the security of pattern classifiers. • Even though the design phase of secure classifiers is a different issue than security evaluation, existing framework could be exploited to this end. For instance spam filtering existing system considers SVM and LR classifier. • To apply an empirical security evaluation framework and provide security to Spam Filtering application and use best classifier in our framework. 2.2. Solving approach The proposed system focuses on multiple instance logistic regression (MILR) strategy. In the recommended strategy, emails are treated as bags of multiple instances [6] and a logistic model at the instance level is indirectly learned by exploiting the bag level binomial log-likelihood function [14]. 3. PROPOSED FRAMEWORK The contribution of this paper is- • Classification of email using SVM, LR and MILR classifiers. • Intent to increase classification results, classifier called Multiple Instance Logistic Regression (MILR) is used. • MILR differs from a single instance supervised learning [7], such that by splitting an email into several instances, a MI learner will be capable to identify the spam part of the text mail even though text mail has been injected with good words which solve the efficiency issue for GWI attack [14]. The data distribution gives the training data and testing data separately [8]. The testing data can be manually generated by the user during the compose emails. The assumptions can be given with the help of Adversary Model [9]. Modelling the adversary is dependent on the attack scenarios. It consists of goal, knowledge, capability, strategies of the adversary as shown in figure 1. The classification application can be authenticated by authenticator. It consists of three classifiers like SVM, LR and MILR. The classifiers acts like an algorithms. These classifiers give its classification results either the email is spam or legitimate or normal. The training data can be already trained by admin. This user can be an attacker or an authorized person. For this application user can perform classification techniques (SVM, LR, and MILR) by means of analysis. This training region subsists of all types of mails such as spam or ham. For classification of testing part/mail using training part, different classifiers are used. SVM, LR and MILR classifiers are used for classification and result analysis [11].
  • 3. International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016 21 Figure1. Security Evaluation Framework using Spam Filtering The Pattern classifier classifies or distinguishes the pattern (which is combination of feature which can be characterized by the individuals) into the feature space or word space within a boundary [10], [12], [13]. The goal is to partition the feature or word space in the class labeled decision regions. Therefore, for the ambition of model selection considers that the developer wants to appoint a Support Vector Machine (SVM) with a linear kernel, a Logistic Regression (LR) classifier, and Multiple Instance Logistic Regression (MILR). In the proposed system, for the classification purpose SVMs are actualized with the LibSVM, Logistic Regression (LR) and Multiple Instance Logistic Regression (MILR) is used for practical analysis. 4. ALGORITHMS WITH EXAMPLE Firstly, a framework is presented for the empirical evaluation of classifier based on simulation of potential attack scenarios. The existing system considers SVM and LR classifiers [11]. The proposed system focuses on multiple instance logistic regression (MILR) strategy. 4.1. SVM Classifier Algorithm: SVM classifier Input: Set of email data , (Combination of positively and negatively labeled data) Output: Classified email data (Spam/Ham)
  • 4. International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016 22 Process: Step1: Distribution of positively and negatively labeled data according to features. Step2: Compute Mapping function Ø(). Step3: Set bias as 1 to every vectors Step4: Compute dot (.) products equations Step5: Calculate the value of discriminate Hyperplanes α1, α2, α3,.. Step6: Predict positive and negative samples Example: Figure 2 shows the evaluation of SVM classifier with an example. Figure2. SVM example 4.2. LR Classifier Algorithm: LR classifier Consider y= 1, if word spam and y=0, if word is not Spam (Ham). For Spam Filtering, classification of words as spam or ham
  • 5. International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016 23 The probability of word is The probability for spam per word is The probability for ham per word is And Example: Figure 3 shows the evaluation of LR classifier with an example. Figure3. LR example 4.2. MILR Classifier Algorithm: MILR classifier Input: Set of email data , Be probability that the ith email is Positive, Be probability that the ith email is Negative
  • 6. International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016 24 Is a vector of the word frequency counts (or tf-idf weight) of unique terms in every email. Process: Step 1: Binomial log-likelihood function is: Step 2: In a single instance setting, probability has sigmoid response function as: Step 3: In multiple instances, setting estimate the instance-level class probabilities has a sigmoidal response function as: Where, is the jth instance in the ith data, and and are the parameters that need to be estimated. Step 4: In a single instance setting, probability has sigmoid response function as: Step 5: In multiple instance setting estimate the instance-level class probabilities has a sigmoidal response function as: 5. EXPECTED RESULTS The experimental results of the classification of legitimate (normal) and Spam e-mails are computed using the accuracy of the classifiers. The input of the proposed system is the number of testing samples. The computations of results are based on different mails. Some mails are trained before test and some new mails are also tested in proposed system. The analysis shows that MILR approach perform better as compare to SVM and LR algorithm by considering parameters like time, mean absolute error, etc. The accuracy can be calculated using following formula, Classification accuracy: t c N N Ac = Where, = Number of words which are correctly classified = Total number of words In this experiment, the efficiency of SVM, LR and MILR [11], [14] is evaluated to test the ability of classifiers [15]. Figure2 shows the output of accuracy on every classifier. Here we use the Spring Tool Suite (STS) with wampserver for database connectivity. Table 1 shows the accuracy result for queries M1, M2, M3 and M4 mail in terms of percentage (%).
  • 7. International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016 25 M1: Code demonstrates how to get input from user. M2: This is too dirty place. Please clean otherwise wash it. M3: I hate you idiot. I will kill you idiot. M4: The Indian Mujahideen claimed responsibility for the Jaipur bombings through an email sent to Indian media and declared open war against India. TABLE I: Classification Accuracy Figure2. Graphical representation of classification accuracy M1 M2 M3 M4 SVM 58.93 61.24 74.49 58.93 LR 55.24 60.2 65.48 58.93 MILR 64.73 68.75 73.33 64.58
  • 8. International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016 26 6. CONCLUSION This paper focused on experimental security evaluation of the pattern classifiers which improve prediction accuracy of spam filtering application. For classification and analysis three classifiers are used, are called SVM, LR and MILR. The proposed framework acquainted on a model of the adversary, and on a model of data distribution; accommodates an analytical approach for the training and testing sets generation that accredits security evaluation and can furnish the application distinct techniques. In the future, we will extend the data classification algorithm that will improve accuracy and performance of the system by means of spam detection. ACKNOWLEDGEMENTS We would like to thank the researchers as well as publishers for making their resources available and teachers for their guidance. We are thankful to the authorities of Savitribai Phule Pune University and concern members for their constant guidelines and support. We are also thankful to reviewer for their valuable suggestions and also thank the college authorities for providing the required infrastructure and support. REFERENCES [1] A. A. Cardenas, J.S. Baras, and K. Seamon, A Framework for the Evaluation of Intrusion Detection Systems, Proc. IEEE Symp. Security and Privacy, pp. 63-77, 2006. [2] D.B. Skillicorn, Adversarial Knowledge Discovery, IEEE Intelligent Systems, vol. 24, no. 6, Nov./Dec. 2009. [3] M. Barreno, B. Nelson, R. Sears, A.D. Joseph, and J.D. Tygar, Can Machine Learning be Secure? Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp. 16-25, 2006. [4] Kunjali Pawar and Madhuri Patil, A Review on Security Evaluation for Pattern Classifier against Attack, International Journal of Computer Applications (IJCA) Proceedings on National Conference on Advances in Computing NCAC-2015(4): 19-22, December 2015. (ISSN: 0975-8887). [5] Y. Song, Z. Zhuang, W. C. Lee, H. Li, C.L. Giles and J. Li Q. Zhao, Real-Time Automatic Tag Recommendation, Proc. 31st Ann. Intl ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR 08), pp. 515-522, 2008. [6] A. Kolcz and C.H. Teo, Feature Weighting for Improved Classifier Robustness, Proc. Sixth Conf. Email and Anti- Spam, 2009. [7] P. Laskov and R. Lippmann, Machine Learning in Adversarial Environments, Machine Learning, vol. 81, pp. 115- 119, 2010. [8] M. Barreno, B. Nelson, A. Joseph, and J. Tygar, The Security of Machine Learning, Machine Learning, vol. 81, pp. 121- 148, 2010. [9] D.B. Skillicorn, Adversarial Knowledge Discovery, IEEE Intelligent Systems, vol. 24, no. 6, Nov./Dec. 2009. [10] P. Laskov and M. Kloft, A Framework for Quantitative Security Analysis of Machine Learning, Proc. Second ACM Workshop Security and Artificial Intelligence, pp. 1-4, 2009. [11] B. Biggio, G. Fumera, and F. Roli, Security Evaluation of Pattern Classifiers under Attack, IEEE Transactions On knowledge and Data engg., vol. 26, No. 4, April 2014. [12] D. Lowd and C. Meek, Good Word Attacks on Statistical Spam Filters, Proc. Second Conf. Email and Anti-Spam, 2005. [13] R.O. Duda, P.E. Hart, and D.G. Stork, Pattern Classification, Wiley-Interscience Publication, 2000. [14] Z. Jorgensen, Y. Zhou, and M. Inge, A Multiple Instance Learning Strategy for Combating Good Word Attacks on Spam Filters, J. Machine Learning Research, vol. 9, pp. 1115-1146, 2008. [15] Kunjali Pawar and Madhuri Patil, Pattern Classification under Attack on Spam Filtering, IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN-2015), November 2015.
  • 9. International Journal of Computer- Aided Technologies (IJCAx) Vol.3, No. 2/3, July 2016 27 AUTHORS Ms. Kunjali Pawar received Bachelor of Engineering degree in Computer Science & Engineering in 2014 and now pursuing Post Graduation (M.E.) in the department of Computer Engineering from Dr. D.Y.Patil School of Engineering and Technology in the current academic year 2015-16. She is now studying for the domain Data Mining and Information Retrieval as research purpose on Security Evaluation of Pattern Classifier against attack using Spam filtering during her academic year. Prof. Mrs. Madhuri Patil. She is presently working as an Assistant Professor in the department of computer engineering, Dr. D. Y. Patil School of Engineering and Technology, Pune, Maharashtra, India. She has 6 years experience in teaching field and her research area is Data Mining and Information Retrieval.