Evaluating spam detection techniques using ranking algorithm in email network at Hanoi University
Author affiliations
DOI:
https://doi.org/10.15625/1813-9663/30/3/3253Keywords:
Spam detection, email network, clustering, PageRank algorithm, user rankingAbstract
In this paper, four spam-filtering approaches based on user ranking in the mail networks: Clustering, Extended Clustering Coefficient, PageRank Algorithm and Weighted PageRank Algorithm are analyzed. We also propose a couple of fully worked-out datasets from the email network of Hanoi University against which the experimental comparisons with the respect to the accuracy of email user ranking and spam filtering are conducted. The results indicate that PageRank Algorithm and Extended Clustering Coefficient approaches are better than others. The rate of true detection is over 99.5%, while the failed alarm remains below 0.5%.Metrics
Metrics Loading ...
Downloads
Published
25-08-2014
How to Cite
[1]
V. M. Tuan, T. Q. Anh, and H. Q. Minh, “Evaluating spam detection techniques using ranking algorithm in email network at Hanoi University”, JCC, vol. 30, no. 3, pp. 203–215, Aug. 2014.
Issue
Section
Computer Science
License
1. We hereby assign copyright of our article (the Work) in all forms of media, whether now known or hereafter developed, to the Journal of Computer Science and Cybernetics. We understand that the Journal of Computer Science and Cybernetics will act on my/our behalf to publish, reproduce, distribute and transmit the Work.2. This assignment of copyright to the Journal of Computer Science and Cybernetics is done so on the understanding that permission from the Journal of Computer Science and Cybernetics is not required for me/us to reproduce, republish or distribute copies of the Work in whole or in part. We will ensure that all such copies carry a notice of copyright ownership and reference to the original journal publication.
3. We warrant that the Work is our results and has not been published before in its current or a substantially similar form and is not under consideration for another publication, does not contain any unlawful statements and does not infringe any existing copyright.
4. We also warrant that We have obtained the necessary permission from the copyright holder/s to reproduce in the article any materials including tables, diagrams or photographs not owned by me/us.