SPAM FILTERING USING MACHINE LEARNING TECHNIQUES IMPLEMENTED WITH DESIGN TREE CLASSIFIER
USER'S INSTRUCTIONS: The project work you are about to view is on "spam filtering using machine learning techniques implemented with design tree classifier". Please, sit back and study the below research material carefully. This project topic"spam filtering using machine learning techniques implemented with design tree classifier"have complete 5(five) Chapters. The complete Project Material/writeup include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.Our aim of providing this"spam filtering using machine learning techniques implemented with design tree classifier" project research material is to reduce the stress of moving from one school library to another all in the name of searching for"spam filtering using machine learning techniques implemented with design tree classifier"research materials. We are not encouraging any form of plagiarism. This service is legal because, all institutions permit their students to read previous projects, books, articles or papers while developing their own works.
TITLE PAGE
BY
---
--/H2013/01430
DEPARTMENT OF ----
SCHOOL OF ---
INSTITUTE OF ---
APPROVAL PAGE
This is to certify that the research work,"spam filtering using machine learning techniques implemented with design tree classifier"by ---, Reg. No. --/H2007/01430 submitted in partial fulfillment of the requirement award of a Higher National Diploma on --- has been approved.
By
--- . ---
Supervisor Head of Department.
Signature………………. Signature……………….
……………………………….
---
External Invigilator
DEDICATION
This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my --- for his financial support and moral care towards me.Also to my mentor --- for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.
ACKNOWLEDGEMENT
The successful completion of this project work could not have been a reality without the encouragement of my --- and other people. My immensely appreciation goes to my humble and able supervisor mr. --- for his kindness in supervising this project.
My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. ---, and Dr. ---. I also recognize the support of some of the staff of --- among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. --- and the ---. Finally, my appreciation goes to my elder sister ---, my lovely friends mercy ---, ---, --- and many others who were quite helpful.
PROJECT DESCRIPTION: This work"spam filtering using machine learning techniques implemented with design tree classifier"research material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We made Preliminary pages, Abstract and Chapter one of"spam filtering using machine learning techniques implemented with design tree classifier"visible for everyone, then the complete material on"spam filtering using machine learning techniques implemented with design tree classifier"is to be ordered for. Happy viewing!!!
A spam filter is a program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox. E-mail spam, known as unsolicited bulk Email (UBE), junk mail, or unsolicited commercial email (UCE), is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients. Spam is prevalent on the Internet because the transaction cost of electronic communications is radically less than any alternate form of communication. There are many spam filters using different approaches to identify the incoming message as spam, ranging from white list / black list, Bayesian analysis, keyword matching, mail header analysis, postage, legislation, and content scanning etc. Even though we are still flooded with spam emails everyday. This is not because the filters are not powerful enough, it is due to the swift adoption of new techniques by the spammers and the inflexibility of spam filters to adapt the changes. In our work, we employed supervised machine learning techniques to filter the email spam messages. Widely used supervised machine learning techniques namely C 4.5 Decision tree classifier, Multilayer Perceptron, Naïve Bayes Classifier are used for learning the features of spam emails and the model is built by training with known spam emails and legitimate emails. The results of the models are discussed.
TABLE OF CONTENTS
COVER PAGE
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
CHAPTER ONE
- INTRODUCTION
- BACKGROUND OF THE STUDY
- PROBLEM STATEMENT
- AIM AND OBJECTIVES OF THE STUDY
- SCOPE OF THE STUDY
- SIGNIFICANCE OF THE STUDY
- MOTIVATION OF THE STUDY
- BENEFIT OF THE STUDY
CHAPTER TWO
LITERATURE REVIEW
- OVERVIEW OF SPAM FILTERING
- TYPES OF SPAM FILTERS
- REVIEW OF SPAM FILTERING METHODS
- INBOUND AND OUTBOUND FILTERING
- REVIEW OF RELATED STUDIES
- SPAM FILTER ARCHITECTURE AND METHODS
CHAPTER THREE
METHODOLOGY
- INTRODUCTION
- SOURCES OF DATA
- DATA COLLECTION PROCESS
- TREE CLASSIFIER MODEL
- FEATURE EXTRACTION
CHAPTER FOUR
- EXPERIMENT AND RESULT
CHAPTER FIVE
- CONCLUSION
- RECOMMENDATION
REFERENCES
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE STUDY
The internet has become an integral part of everyday life and e-mail has become a powerful tool for information exchange. Along with the growth of the Internet and e-mail, there has been a dramatic growth in spam in recent years. Spam can originate from any location across the globe where Internet access is available. Despite the development of anti- spam services and technologies, the number of spam messages continues to increase rapidly (Gaurav et al., 2020). In order to address the growing problem, each organization must analyze the tools available to determine how best to counter spam in its environment. Tools, such as the corporate e-mail system, e-mail filtering gateways, contracted anti-spam services, and end-user training, provide an important arsenal for any organization. However, users cannot avoid the very serious problem of attempting to deal with large amounts of spam on a regular basis (Ablel-Rheem et al., 2020). If there are no anti-spam activities, spam will inundate network systems, kill employee productivity, steal bandwidth, and still be there tomorrow.
It is impossible to tell exactly who was the first one to come upon a simple idea that if you send out an advertisement to millions of people, then at least one person will react to it no matter what is the proposal. E-mail provides a perfect way to send these millions of advertisements at no cost for the sender, and this unfortunate fact is nowadays extensively exploited by several organizations. As a result, the e-mailboxes of millions of people get cluttered with all this so-called unsolicited bulk e-mail also known as “spam” or “junk mail”. Being increadibly cheap to send, spam causes a lot of trouble to the Internet community: large amounts of spam-traffic between servers cause delays in delivery of legitimate e- mail, people with dial-up Internet access have to spend bandwidth downloading junk mail (Ablel-Rheem et al., 2020). Sorting out the unwanted messages takes time and introduces a risk of deleting normal mail by mistake. Finally, there is quite an amount of pornographic spam that should not be exposed to children.
1.2 PROBLEM STATEMENT
Spam email is a nuisance that will clog up ones’ inboxes and overload one’s servers. Spam is also dangerous — the entry point for serious attacks that could damage your computers, your computer network, your bottom line, and even company’s reputation. That is why there is need for a spam filter solution as the key first line of defense.
The spam problem is an ongoing issue since 2018 and 14.5 billion spam e-mails were sent per day (Bauer, 2018). According to the Internet Security Threat Report released in 2019 by Symantec, spam levels for their customers increased in 2018 (Symantec Internet Security Threat Report, 2019). What draws the attention is that small enterprises were attacked more often than large companies, and e-mail malware reached stable levels. Therefore, there is a need to tailor even simple tools for detection and filtering of spam in all organizations. The increasing number of spam e-mails has created a strong need to develop more reliable and efficient anti-spam filters, including ones based on machine-learning tools - spam filter using machine language which is design with tree classifier (Dada et al., 2019). Tree classifier is implemented here because is easy to implement and easy to understand. It provides an overall satisfactory performance as far as spam mail detection is concerned.
1.3 AIM AND OBJECTIVES OF THE STUDY
The main aim of this work is to design a machine learning-based approach for spam filtering that is implemented with a tree classifier. The objectives of the work are:
- To design the system model using tree classifier
- To detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox.
- To experiment a program that will successfully detect, filter spam emails and improve Internet Security.
1.4 SCOPE OF THE STUDY
The scope of this work covers building a fast and precise selection of machine-learning tree classifiers for spam filtering. It allows for quick selection of interesting parameters, which is essential for working with large datasets.
1.5 SIGNIFICANCE OF THE STUDY
Business email system without spam filtering is highly vulnerable, if not unusable. It is important to stop as much spam as you can, to protect your network from the many possible risks: viruses, phishing attacks, compromised web links and other malicious content.
Spam filters also protect your servers from being overloaded with non-essential emails, and the worse problem of being infected with spam software that may turn them into spam servers themselves.
This study will provide means of identification of the best-performing machine- learning-based classifiers and selection of the one with the leading parameters. The system allows for quick analysis of data of higher dimensionality. This is especially important if large datasets are to be analyzed and we want to assure the proper scalability of our system. The study will also show how to find a database to train a machine-learning model used for spam detection
1.6 MOTIVATION OF THE STUDY
Common uses for mail filters include organizing incoming email and removal of spam and computer viruses. A less common use is to inspect outgoing email at some companies to ensure that employees comply with appropriate policies and laws. Users might also employ a mail filter to prioritize messages, and to sort them into folders based on subject matter or other criteria.
1.7 BENEFIT OF THE STUDY
Spam filters detect unsolicited, unwanted, and virus-infested email (called spam) and stop it from getting into email inboxes. Internet Service Providers (ISPs) use spam filters to make sure they aren’t distributing spam. Small- to medium- sized businesses (SMBs) also use spam filters to protect their employees and networks.
Spam filters are applied to both inbound email (email entering the network) and outbound email (email leaving the network). ISPs use both methods to protect their customers. SMBs typically focus on inbound filters.
CHAPTER FIVE
5.0 CONCLUSION AND RECOMMENDATION
5.1 CONCLUSION
Although there are many email spam filtering tools exists in the world, due to the existence of spammers and adoption of new techniques, email spam filtering becomes a challenging problem to the researchers.
Spam is becoming a serious threat for regular users of emails, businesses and corporate firms. In this paper we have applied three different decision tree algorithms on the set of emails which consist of spam and ham mails collected from our sources. Considering overall performance we conclude that tree classifier can be used safely for building reliable spam filters application.
5.2 RECOMMENDATION
Spam filters are essential to protect ones business. When you decide to invest or upgrade your spam filter solution, know that there are countless spam filter programs out there and it will take time to figure out which one works best for your business.
I recommend that when one wants to use spam filter the user should look for:
- At a minimum, the solution you choose must block spam. This might sound like a given, but not all spam filter software is up to the job (or doesn’t keep up to date with the evolving world of spam attacks).
- The solution you choose must provide the security you need for your network, but not stop the legitimate emails your employees need to conduct their business.
- Administrators must have the ability to edit and create rules over and above predefined rule settings so that the solution meets your organizational needs. This customization should be easy, even for unsophisticated computer users.
CHAPTER TWO: The chapter one of this work has been displayed above. The complete chapter two of"spam filtering using machine learning techniques implemented with design tree classifier" is also available. Order full work to download. Chapter two of"spam filtering using machine learning techniques implemented with design tree classifier"consists of the literature review. In this chapter all the related work on"spam filtering using machine learning techniques implemented with design tree classifier"was reviewed.
CHAPTER THREE: The complete chapter three of"spam filtering using machine learning techniques implemented with design tree classifier"is available. Order full work to download. Chapter three of"spam filtering using machine learning techniques implemented with design tree classifier"consists of the methodology. In this chapter all the method used in carrying out this work was discussed.
CHAPTER FOUR: The complete chapter four of"spam filtering using machine learning techniques implemented with design tree classifier"is available. Order full work to download. Chapter four of"spam filtering using machine learning techniques implemented with design tree classifier"consists of all the test conducted during the work and the result gotten after the whole work
CHAPTER FIVE: The complete chapter five of"spam filtering using machine learning techniques implemented with design tree classifier"is available. Order full work to download. Chapter five of"spam filtering using machine learning techniques implemented with design tree classifier"consist of conclusion, recommendation and references.
To "DOWNLOAD" the complete material on this particular topic above click "HERE"
Do you want our Bank Accounts? please click HERE
To view other related topics click HERE
To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE
Do you want us to research your new topic? if yes, click "HERE"
Do you have any question concerning our post/services? click HERE for answers to your questions
For more information contact us through any of the following means:
Mobile No :+2348146561114 or +2347015391124 [Mr. Innocent]
Email address :engr4project@gmail.com
COUNTRIES THAT FOUND OUR SERVICES USEFUL
Australia, Botswana, Canada, Europe, Ghana, Ireland, India, Kenya, Liberia, Malaysia, Namibia, New Zealand, Nigeria, Pakistan, Philippines, Singapore, Sierra Leone, South Africa, Uganda, United States, United Kindom, Zambia, Zimbabwe, etc
Support: +234 8146561114 or +2347015391124
Watsapp No
:+2348146561114
Email Address
:engr4project@gmail.com
FOLLOW / VISIT US VIA: