An Efficient Approach : Deep Learning Based Model for Adaptive SPAM Detection in IoT Networks
Keywords:
SPAM, Python, Classification, DL, ML and CNN-LSTMAbstract
The Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to large numbers of recipients for the purpose of commercial advertising, for the purpose of non-commercial proselytizing, for any prohibited purpose, or simply repeatedly sending the same message to the same user. Internet of Things (IoT) enables convergence and implementations between the real-world objects irrespective of their geographical locations. Implementation of IOT network management and control makes privacy and protection strategies utmost important and challenging in such an environment. This dissertation presents an adaptive approach based on deep learning for detecting of spam in the IOT network. The CNN-LSTM techniques is applied and optimized for better performance than others. For each topic, the existing problems are analyzed, and then, current solutions to these problems are presented and discussed. The simulation results show that the proposed sentiment analysis method has higher precision, recall and F1 score. The method is proved to be effective with high accuracy. The simulation and analysis are done using the python spider 3.7 software. The overall accuracy achieved by the proposed work is 94.25 % while previous it is achieved 92.8 %. The error rate of proposed technique is 4.37 % while 8.2 % in existing work. Therefore, it is clear from the simulation results; the proposed work is achieved significant better results than existing work.
References
- A. Makkar, S. Garg, N. Kumar, M. S. Hossain, A. Ghoneim and M. Alrashoud, "An Efficient Spam Detection Technique for IoT Devices Using Machine Learning," in IEEE Transactions on Industrial Informatics, vol. 17, no. 2, pp. 903-912, Feb. 2021, doi: 10.1109/TII.2020.2968927.
- F. Hossain, M. N. Uddin and R. K. Halder, "Analysis of Optimized Machine Learning and Deep Learning Techniques for Spam Detection," 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), 2021, pp. 1-7, doi: 10.1109/IEMTRONICS52119.2021.9422508.
- A. Makkar, U. Ghosh, P. K. Sharma and A. Javed, "A Fuzzy-based approach to Enhance Cyber Defence Security for Next-generation IoT," in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2021.3053326.
- G. Fortino, F. Messina, D. Rosaci and G. M. L. Sarne, "ResIoT: An IoT social framework resilient to malicious activities," in IEEE/CAA Journal of Automatica Sinica, vol. 7, no. 5, pp. 1263-1278, September 2020, doi: 10.1109/JAS.2020.1003330.
- K. A. Al-Thelaya, T. S. Al-Nethary and E. Y. Ramadan, "Social Networks Spam Detection Using Graph-Based Features Analysis and Sequence of Interactions Between Users," 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), 2020, pp. 206-211, doi: 10.1109/ICIoT48696.2020.9089509.
- T. Y. Ho, W. Chen, M. Sun and C. Huang, "Visualizing the Malicious of Your Network Traffic by Explained Deep Learning," 2020 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), 2020, pp. 687- 692, doi: 10.1109/ICAIIC48513.2020.9065247.
- J. Zhang, Q. Yan and M. Wang, "Evasion Attacks Based on Wasserstein Generative Adversarial Network," 2019 Computing, Communications and IoT Applications (ComComAp), 2019, pp. 454-459, doi: 10.1109/ComComAp46287.2019.9018647.
- A. Makkar, N. Kumar and M. Guizani, "The Power of AI in IoT : Cognitive IoT- based Scheme for Web Spam Detection," 2019 IEEE Symposium Series on
- Computational Intelligence (SSCI), 2019, pp. 3132-3138, doi: 10.1109/SSCI44817.2019.9002885.
- A. K. Singh, S. Bhushan and S. Vij, "Filtering spam messages and mails using fuzzy C means algorithm," 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU), 2019, pp. 1-5, doi: 10.1109/IoT- SIU.2019.8777483.
- T. Lange and H. Kettani, "On Security Threats of Botnets to Cyber Systems," 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN), 2019, pp. 176-183, doi: 10.1109/SPIN.2019.8711780.
- T. Qiu, H. Wang, K. Li, H. Ning, A. K. Sangaiah and B. Chen, "SIGMM: A Novel Machine Learning Algorithm for Spammer Identification in Industrial Mobile Cloud Computing," in IEEE Transactions on Industrial Informatics, vol. 15, no. 4, pp. 2349- 2359, April 2019, doi: 10.1109/TII.2018.2799907.
- G. Kumar and V. Rishiwal, "Statistical Analysis of Tweeter Data Using Language Model With KLD," 2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU), 2018, pp. 1-6, doi: 10.1109/IoT- SIU.2018.8519938.
- E. Anthi, L. Williams and P. Burnap, "Pulse: An adaptive intrusion detection for the Internet of Things," Living in the Internet of Things: Cybersecurity of the IoT - 2018, 2018, pp. 1-4, doi: 10.1049/cp.2018.0035.
- A. Kaushik and S. Talati, "Securing IoT using layer characterstics," 2017 3rd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), 2017, pp. 290-298, doi: 10.1109/ICATCCT.2017.8389150.
- İ. Ü. Oğul, C. Özcan and Ö. Hakdağlı, "Fast text classification with Naive Bayes method on Apache Spark," 2017 25th Signal Processing and Communications Applications Conference (SIU), 2017, pp. 1-4, doi: 10.1109/SIU.2017.7960721.
- Z. Lv, J. Lloret, H. Song, J. Shen and W. Mazurczyk, "Guest Editorial: Secure Communications Over the Internet of Artificially Intelligent Things," in IEEE Internet of Things Magazine, vol. 5, no. 1, pp. 58-60, March 2022, doi: 10.1109/MIOT.2022.9773087.
- B. W. Khoueiry and M. R. Soleymani, "A Novel Machine-to-Machine Communication Strategy Using Rateless Coding for the Internet of Things," in IEEE
- Internet of Things Journal, vol. 3, no. 6, pp. 937-950, Dec. 2016, doi: 10.1109/JIOT.2016.2518925.
- J. S. Jang, Y. L. Kim and J. H. Park, "A study on the optimization of the uplink period using machine learning in the future IoT network," 2016 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops), 2016, pp. 1-3, doi: 10.1109/PERCOMW.2016.7457131.
- M. Condoluci, G. Araniti, T. Mahmoodi and M. Dohler, "Enabling the IoT Machine Age With 5G: Machine-Type Multicast Services for Innovative Real-Time Applications," in IEEE Access, vol. 4, pp. 5555-5569, 2016, doi: 10.1109/ACCESS.2016.2573678.
- R. K. Deore, V. R. Sonawane and P. H. Satpute, "Internet of Thing Based Home Appliances Control," 2015 International Conference on Computational Intelligence and Communication Networks (CICN), 2015, pp. 898-902, doi: 10.1109/CICN.2015.177.
- V. Selis and A. Marshall, "MEDA: A machine emulation detection algorithm," 2015 12th International Joint Conference on e-Business and Telecommunications (ICETE), 2015, pp. 228-235.
- D. Singh, G. Tripathi and A. Jara, "Secure layers based architecture for Internet of Things," 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 2015, pp. 321-326, doi: 10.1109/WF-IoT.2015.7389074.
- R. Parada, J. Melià-Seguí, A. Carreras, M. Morenza-Cinos and R. Pous, "Measuring user-object interactions in IoT spaces," 2015 IEEE International Conference on RFID Technology and Applications (RFID-TA), 2015, pp. 52-58, doi: 10.1109/RFID- TA.2015.7379797.
- V. P. Kafle, Y. Fukushima and H. Harai, "ID-based communication for realizing IoT and M2M in future heterogeneous mobile networks," 2015 International Conference on Recent Advances in Internet of Things (RIoT), 2015, pp. 1-6, doi: 10.1109/RIOT.2015.7104908.
- S. Cirani, M. Picone, P. Gonizzi, L. Veltri and G. Ferrari, "IoT-OAS: An OAuth- Based Authorization Service Architecture for Secure Services in IoT Scenarios," in IEEE Sensors Journal, vol. 15, no. 2, pp. 1224-1234, Feb. 2015, doi: 10.1109/JSEN.2014.2361406.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.