Stability and Effective Process Control for Secure Email Filtering

Main Article Content

Yashaswini A R
Shruthi N
Nandini S R
Santhosh B J
Namitha A R
K. R. Swetha

Abstract

A fantastic tool for both commercial and personal communication is electronic mail. It has increasingly become a necessary component of our working life since it is straightforward, available, and simple to use. Spam emails have started to tarnish internet experiences and threaten the integrity of email. Due to the exponential growth of spam, both people and organisations are under a great deal of financial and other strain. In order to prevent the future of email itself from being in jeopardy, a solution to the spam problem must be discovered. There is an urgent need to solve the Email spam issue since spam volume has been rising over the last several decades. As part of this effort, many effects of spam emails on businesses and people were noted and thoroughly examined. In order to properly assess current technologies, solutions, and methods, a comprehensive literature review was conducted throughout the procedures. The goals of this work is to develop new methodologies for the implementation of new strategies for the efficient management of email spam and to construct a proof-of-concept software system for the Process controlled assessment of such strategies.

Article Details

How to Cite
A R, Y. ., N, S. ., S R, N. ., B J, S. ., A R, N. ., & Swetha, K. R. . (2022). Stability and Effective Process Control for Secure Email Filtering . International Journal on Recent and Innovation Trends in Computing and Communication, 10(11), 63–70. https://doi.org/10.17762/ijritcc.v10i11.5781
Section
Articles

References

E.M. Bahgat, S. Rady, W. Gad An e-mail filtering approach using classification techniques The 1st International Conference on Advanced Intelligent System and Informatics (AISI2015), November 28-30, 2018, Springer International Publishing, BeniSuef, Egypt (2018), pp. 321-331.

A. P, A. Sharma, S. B. M, P. Pavankumar, N. K. Darwante, "Performance Monitoring and Dynamic Scaling Algorithm for Queue Based Internet of Things," 2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES), pp. 1-7, (2022) doi: 10.1109/ICSES55317.2022.9914108.

AlMahmoud, Abdelrahman, et al. "Spamdoop: A privacy-preserving Big Data platform for collaborative spam detection." IEEE Transactions on Big Data (2019).

Puneeth Kumar, B.S., Ramesh Naidu, P., Sridhara, S.B. (2023). Internet of Things and Cognitive Radio Networks: Applications, Challenges and Future. In: Yadav, S., Chaudhary, K., Gahlot, A., Arya, Y., Dahiya, A., Garg, N. (eds) Recent Advances in Metrology . Lecture Notes in Electrical Engineering, vol 906. Springer, Singapore. https://doi.org/10.1007/978-981-19-2468-2_3.

S. B. Sridhara, M. Ramesha, “Recent advances in graph theory and its applications,” Advances in Mathematics:Scientific Journal, vol. 10, no. 3, pp. 1407–1412, 2021, doi: 10.37418/amsj.10.3.29.

Avinash Sharma, B. Kameswara Rao, Ravi Shankar, Parismita Sarma, Abhay Chaturvedi, Naziya Hussain, Industrial quality healthcare services using Internet of Things and fog computing approach, Measurement: Sensors, Volume 24, 2022, 100517, ISSN 2665-9174, https://doi.org/10.1016/j.measen.2022.100517 .

K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song, ‘‘Design and evaluation of a real-time URL spam filtering service,’’ in Proc. IEEE Symp. Secur. Privacy, Jun. 2011, pp. 447–462.

A. P, A. Sharma, A. Singla, N. Sharma, "IoT Group Key Management using Incremental Gaussian Mixture Model," 2022 3rd International Conference on Electronics and Sustainable Communication Systems (ICESC), 2022, pp. 469-474, doi: 10.1109/ICESC54411.2022.9885644.

C. Yang, R. C. Harkreader, and G. Gu, ‘‘Die free or live hard? Empirical evaluation and new design for fighting evolving Twitter spammers,’’ in Proc. Int. Workshop Recent Adv. Intrusion Detection, 2019, pp. 318–337.

Kishore, D. V. Gowda, Shivashankar, and S. Mehta, “MANET topology for disaster management using wireless sensor network,” in International Conference on Communication and Signal Processing, ICCSP 2016, 2016, pp. 0736–0740, doi: 10.1109/ICCSP.2016.7754242.

Pai, G.N., Sridhara, S.B., Shashidhara, K.S., Gangadhara, “Signal Analysis and Filtering using one Dimensional HilbertTransform,” Journal of Physics:Conference Series 1706(1),2020, https://doi.org/10.1088/1742-6596/1706/1/012107.

Sharma, K. S and M. R. Arun, "Priority Queueing Model-Based IoT Middleware for Load Balancing," 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS), 2022, pp. 425-430, doi: 10.1109/ICICCS53718.2022.9788218.

S. Dhanaraj, V. Karthikeyani A study on e-mail image spam filtering techniques Paper presented at the International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME) (2018)

M. Nagabushanam, H. G. Govardhana Reddy & K. Raghavendra (2022) Vector space modelling-based intelligent binary image encryption for secure communication, Journal of Discrete Mathematical Sciences and Cryptography, 25:4, 1157-1171, DOI: 10.1080/09720529.2022.2075090.

P. Ramesh Naidu, N. Guruprasad, “Design and implementation of cryptcloud system for securing files in cloud,” Adv. Math. Sci. J., vol. 9, no. 7, pp. 4485–4493, 2020, doi: 10.37418/amsj.9.7.17.

K. R. Swetha, Namitha A R, Manu Y M, Rashmi G R and Veera Sivakumar Chinamuttevi (2022), IOT Based Smart Health Care System to Monitor Covid-19 Patients. IJEER, 10(1), 36-40. DOI: 10.37391/IJEER.100105.

M. Sheikhalishahi, A. Saracino, M. Mejri, N. Tawbi, and F. Martinelli. Fast and effective clustering of spam emails based on structural similarity. In International Symposium on Foundations and Practice of Security, pages 195–211. Springer, 2018.

R. Fontugne, J. Mazel, and K. Fukuda. Hashdoop: A mapreduce framework for network anomaly detection. In Computer Communications Workshops (INFOCOM WKSHPS), pages 494–499. IEEE, 2019

P. Ramesh Naidu and N. Guruprasad (2021), A High-Availability and Integrity Layer for Cloud Storage, Cloud Computing Security: From Single to Multi-Clouds, Journal of Physics: Conference Series, 1921 (1), pp. 012072. https://doi.org/10.1088/1742-6596/1921/1/012072.

Lazzari, Lorenzo, Marco Mari, and Agostino Poggi. Cafe-collaborative agents for filtering emails. In Enabling Technologies: Infrastructure for Collaborative Enterprise, 2005. 14th IEEE International Workshops on, pp. 356-361. IEEE, 2015.

Lu, Wei, Yanyan Shen, Su Chen, and Beng Chin Ooi. Efficient processing of k nearest neighbor joins using mapreduce. In Proceedings of the VLDB Endowment vol.5, no.10 pp. 1016-1027. 2019.

Duan, Zhenhai, Peng Chen, Fernando Sanchez, Yingfei Dong, Mary Stephenson, and James Michael Barker. Detecting spam zombies by monitoring outgoing messages. Dependable and Secure Computing, IEEE Transactions on vol.9, no. 2 pp. 198-210. 2018.