Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

TF-IDF Feature-Based Spam Filtering of Mobile SMS Using Machine Learning Approach

Version 1 : Received: 13 September 2021 / Approved: 15 September 2021 / Online: 15 September 2021 (09:42:19 CEST)

How to cite: Hossain, S.M.M.; Kamal, K.M.A.; Sen, A.; Sarker, I.H. TF-IDF Feature-Based Spam Filtering of Mobile SMS Using Machine Learning Approach. Preprints 2021, 2021090251. https://doi.org/10.20944/preprints202109.0251.v1 Hossain, S.M.M.; Kamal, K.M.A.; Sen, A.; Sarker, I.H. TF-IDF Feature-Based Spam Filtering of Mobile SMS Using Machine Learning Approach. Preprints 2021, 2021090251. https://doi.org/10.20944/preprints202109.0251.v1

Abstract

Short Message Service (SMS) is becoming the secure medium of communication due to large-scale global coverage, reliability, and power efficiency. As person--to--person (P2P) messaging is less secure than application-to-person (A2P) messaging, anyone can send a message, leading to the attack. Attackers mistreat this opportunity to spread malicious content, perform harmful activities, and abuse other people, commonly known as spam. Moreover, such messages can waste a lot of time, and important messages are sometimes overlooked. As a result, accurate spam detection in SMS and its computational time are burning issues. In this paper, we conduct six different experiments to detect SMS spam from the dataset of 5574 messages using machine learning classifiers such as Multinomial Naïve Bayes (MNB) and Support Vector Machine (SVM), considering variations of \textit{Term Frequency-- Inverse Document Frequency (TF--IDF)} features for exploring the trade-off among accuracy, F1-score and computational time. The experiments achieve the best result of the accuracy of 98.50\%, F1--score of 98\%, and area under roc curve (AUC) of 0.97 for multinomial naïve bayes classifier with TF--IDF after stemming.

Keywords

Spam detection; SMS; Security; Machine learning

Subject

Computer Science and Mathematics, Information Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.