Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology
ISSN: 2321-3337 Impact Factor:1.521 Volume:6 Issue:3 Year: 22 April,2024 Pages:1886-1893
In general, Spam has become the platform of choice use by cyber-criminals to spread malicious payloads such as viruses and trojans. Collaborative spam detection techniques can deal with large scale e-mail data contributed by multiple sources; however, they have the well-known problem of requiring disclosure of e-mail content. In our Project, we are designing Social media like web page to filter the Spam messages that are getting posted. This will filter the irrelevant and spam posts so that wrong information can be avoided. Phishing URLs are also avoided in order to remove the duplicate websites. Wrong information can be removed based on the public votes. We are using Big Data and Block chain Technology for further Data analysis and data security process. Hadoop distributed File System (HDFS), is used for Big Data analysis. In Block chain, 4 different Algorithms are used namely, Asymmetric Key Algorithm, Digital Signature Algorithm, Secured Hash 256 (SHA256) Algorithm & Merkle hash Tree Algorithm.
spam detection, Phishing links, Big data, Hadoop distributed file System, Block chain.
[1] Abishek Sharma, Arjun N. Spam Detection Using Machine Learning Techniques Network Security, Vol:4, Pages 1 – 11, 2023. [2]Nruthya Ganapathy B , Keerthan Kumar, Poojary Shreya Jaya, Rajath D Shetty, Dr. Shreekumar T, Fake product detection using blockchain technology ,Vol:10, pages 1–5, 2022. [3]Mrs.Sarika Dhurgude, Varun Awargaonkar, Omkar Doiphode, Pratik More,Abhijeet Shilawant, phishing url detection using machine learning, Vol:11, pages 1–3, 2023. [4]Isra’a AbdulNabi, Qussai Yaseen, Spam Email Detection Using Deep Learning Techniques, http://creativecommons.org/licenses/by-nc-nd/4.0/, pages 1–6, 2021. [5] Pooja Sinha, OshinMaini, Gunjan Malik and Rishabh Kaushal, Ecosystem of Spamming on Twitter: Analysis of Spam Reporters and Spam Reportees Vol.13, pages 1–7, 2022. [6]G. Cormack. Email spam filtering: A systematic review. Foundations and Trends in Information Retrieval, Vol. 1: Pages 335–455, 2007. [7]A. Khraisat, A. Alazab, M. Hobbs, J. Abawajy, and A. Azab. “Trends in Crime Toolkit Development” in Network Security Technologies: Design and Applications: Design and Applications. IGI Global. Ch-2, pages 28-43, 2014. [8] B. Stone-Gross, T. Holz, G. Stringhini, and G. Vigna. The underground economy of spam: A botmaster’s perspective of coordinating large-scale spam campaigns. USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), Vol. 11: Page 4, 2011. [9]M.Crawford T. Khoshgoftaar J. Prusa. “Surve of review spam detection using machine learning techniques”. Journal Of Big Data, Vol.2, pages 23, 2015. [10] M. Sheikhalishahi, A. Saracino, M. Mejri, N. Tawbi, and F. Martinelli. Fast and effective clustering of spam emails based on structural similarity. In International Symposium on Foundations and Practice of Security, pages 195–211. Springer, 2015. [11] J. Francois, S. Wang, W. Bronzi, R. State, and T. Engel. Botcloud: Detecting botnets using mapreduce. In IEEE International Workshop on Information Forensics and Security (WIFS), pages 1–6. IEEE, 2011. [12] M. V. Gayoso, A´ . F. Herna´ndez, and E. L. Herna´ndez. In Proceedings of the International Conference on Security and Management (SAM), pages 1–7. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), 2014. [13] L. Zhuang, J. Dunagan, D. Simon, H. Wang, I. Osipkov, and D. Tygar. Characterizing botnets from email spam records. USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), Vol. 8: Pages 1–9, 2008. [14] J. Chen, R. Fontugne, A. Kato, and K. Fukuda. Clustering spam campaigns with fuzzy hashing. In Proceedings of the Asian Internet Engineering Conference, ACM, 2014.