Content-based SMS spam filtering based on the

63 downloads 0 Views 455KB Size Report
based on the Scaled Conjugate Gradient backpropagation algorithm. ... [10] I. Joe, and H. Shim, “An SMS spam filtering system using support vector machine, ...
Content-based SMS spam filtering based on the Scaled Conjugate Gradient backpropagation algorithm Waddah Waheeb, Rozaida Ghazali, Mustafa Mat Deris

Waheeb, W., Ghazali, R., & Deris, M. M. (2015, August). Content-based SMS spam filtering based on the Scaled Conjugate Gradient backpropagation algorithm. In Fuzzy Systems and Knowledge Discovery (FSKD), 2015 12th International Conference on (pp. 675-680). IEEE. doi: 10.1109/FSKD.2015.7382023 URL: HTTP ://IEEEXPLORE. IEEE.ORG/STAMP/STAMP . JSP ?TP =&ARNUMBER=7382023& ISNU MBER =7381900

Abstract—Content-based filtering is one of the most preferred methods to combat Short Message Service (SMS) spam. Memory usage and classification time are essential in SMS spam filtering, especially when working with limited resources. Therefore, suitable feature selection metric and proper filtering technique should be used. In this paper, we investigate how a learnt Artificial Neural Network with the Scaled Conjugate Gradient method (ANN-SCG) is suitable for contentbased SMS spam filtering using a small size of features selected by Gini Index (GI) metric. The performance of ANN-SCG is evaluated in terms of true positive rate against false positive rate, Matthews Correlation Coefficient (MCC) and classification time. The evaluation results show the ability of ANN-SCG to filter SMS spam successfully with only one hundred features and a short classification time around to six microseconds. Thus, memory size and filtering time are reduced. An additional testing using unseen SMS messages is done to validate ANN-SCG with the one hundred features. The result again proves the efficiency of ANN-SCG with the one hundred features for SMS spam filtering with accuracy equal to 99.1%.

The full text of this paper can be downloaded from my HomePage.

REFERENCES [1] GSMA, GSMA: the mobile economy 2013. 2013. [2] GSMA, SMS spam and mobile messaging attacks: introduction, trends and examples. GSMA: spam reporting service, 2011. [3] G. Liu, and Y. Fengxia, “The application of data mining in the classification of spam messages,” In 2012 International Conference on Computer Science and Information Processing (CSIP), pp. 1315-1317, 2012. doi:10.1109/CSIP.2012.6309104 [4] S. J. Delany, M. Buckley, and D. Greene, “SMS spam filtering: methods and data,” Expert Systems with Applications 39, no. 10, 2012, pp. 9899-9908. [5] T. A. Almeida, J. M. G. Hidalgo, and A. Yamakami, “Contributions to the study of SMS spam filtering: new collection and results,” In Proceedings of the 11th ACM symposium on Document Engineering, pp. 259-262. ACM, 2011. doi:10.1145/2034691.2034742 [6] J. M. G. Hidalgo, G. C. Bringas, E. P. Sanz, and F. C. Garcia, “Content based SMS spam filtering,” In Proceedings of the 2006 ACM symposium on Document Engineering, pp. 107-114. ACM, 2006. doi:10.1145/1166160.1166191 [7] T. A. Almeida, J. M. G. Hidalgo, and T. P. Silva, “Towards SMS spam filtering: results under a new dataset,” International Journal of Information Security Science 2, no. 1, 2013, pp. 1-18. [8] T. S. Guzella, and W. M. Caminhas, “A review of machine learning approaches to spam filtering,” Expert Systems with Applications 36, no.7, 2009, pp. 10206-10222. [9] D. N. Sohn, J. T. Lee, K. S. Han, and H. C. Rim, “Contentbased mobile spam classification using stylistically motivated features, ” Pattern Recognition Letters 33, no. 3, 2012, pp. 364-369. doi:10.1016/j.patrec.2011.10.017. [10] I. Joe, and H. Shim, “An SMS spam filtering system using support vector machine, ” In Future Generation Information Technology, pp. 577-584. Springer Berlin Heidelberg, 2010. [11] A. K. Uysal, S. Gunal, S. Ergin, and E. S. Gunal, “A novel framework for SMS spam filtering, ” In Innovations in Intelligent Systems and Applications (INISTA), 2012 International Symposium on, pp. 1-4. IEEE, 2012. [12] H. Ogura, A. Hiromi, and M. Kondo, “Comparison of metrics for feature selection in imbalanced text classification,” Expert Systems with Applications 38, no. 5, 2011, pp. 4978-4989. [13] W. Shang, H. Huang, H. Zhu, Y. Lin, Y. Qu, and Z. Wang, “A novel feature selection algorithm for text categorization,” Expert Systems with Applications 33, no. 1, 2007, pp. 1-5. [14] M. F. Moller, “A scaled conjugate gradient algorithm for fast supervised learning,” Neural networks 6, no. 4, 1993, pp. 525-533. [15] K. Bache, M. Lichman, UCI Machine Learning Repository [http://archive.ics.uci.edu/ml].Irvine, CA: University of California, School of Information and Computer Science,2013 [16] M. T. Nuruzzaman, C. Lee, and D. Choi, “Independent and personal SMS spam filtering,” In Computer and Information Technology (CIT), 2011 IEEE 11th International Conference on, pp. 429-435. IEEE, 2011. doi:10.1109/CIT.2011.23 [17] M. F. Porter, “An algorithm for suffix stripping,” Program 14, no. 3, 1980, pp. 130-137. [18] G. Salton, A. Wong, and C.S. Yang, “A vector space model for automatic indexing,” Communications of the ACM 18, no. 11, 1975, pp. 613-620. [19] Y. Liu, H. T. Loh, and A. Sun, “Imbalanced text classification: a term weighting approach,” Expert systems with Applicat ions 36, no. 1, 2009, pp. 690-701. [20] S. Haykin, Neural networks and learning machines, Vol. 3, Upper Saddle River: Pearson Education, 2009. [21] M. Smith, Neural networks for statistical modeling, Thomson Learning, 1993. [22] L. Wang, and X. Fu, Data mining with computational intelligence, Springer Science & Business Media, 2006. [23] G. P. Zhang, “Neural networks for classification: a survey,” Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on 30, no. 4, 2000, pp. 451-462. doi:10.1109/5326.897072 [24] S. Samarasinghe, Neural networks for applied sciences and engineering: from fundamentals to complex pattern recognition, CRC Press, 2006. [25] I. A. Basheer, and M. Hajmeer, “Artificial neural networks: fundamentals, computing, design, and applic ation,” Journal of microbiological methods 43, no. 1, 2000, pp. 3-31. [26] V. Mitra, C. J. Wang, and S. Banerjee, “Lidar detection of underwater objects using a neuro-SVM-based architecture,” Neural Networks, IEEE Transactions on 17, no. 3, 2006, pp. 717-731. doi:10.1109/TNN.2006.873279 [27] D. E. Rumelhart, J. L. McClelland, and C. PDP Research Group, “Parallel Distributed Processing: Explorations in the Microstructure of Cognition,” , Vol. 1: Foundations, MIT Press, Cambridge, MA, USA, 1986. [28] M. T. Hagan, and M. B. Menhaj, “Training feedforward networks with the Marquardt algorithm,” Neural Networks, IEEE Transactions on 5, no. 6, 1994, pp. 989-993. [29] H. Demuth, M. Beale, and M. Hagan, Neural network toolbox 6, Users guide, 2008. [30] C. Ozkan, and F. S. Erbek, “The comparison of activation functions for multispectral Landsat TM image classification,” Photogrammetric Engineering & Remote Sensing 69, no. 11, 2003, pp. 1225-1234. doi:http://dx.doi.org/10.14358/PERS.69.11.1225 [31] B. W. Matthews, “Comparison of the predicted and observed secondary structure of T4 phage lysozyme,” Biochimica et Biophysica Acta: Protein Structure and Molecular Enzymology, vol. 405, pp. 442-51, 1975. [32] G. Jurman, S. Riccadonna, and C. Furlanello, “A comparison of MCC and CEN error measures in multi-class prediction,” PloS one 7, no. 8, 2012, e41882. [33] T. Chen, and M. Y. Kan, “Creating a live, public short message service corpus: the NUS SMS corpus,” Language Resources and Evaluation 47, no. 2, 2013, pp. 299-335. doi:10.1007/s10579-012-9197-9