An empirical study of supervised email classification in Internet of Things: Practical performance and key influencing factors

Wenjuan Li, Lishan Ke, Weizhi Meng, Jinguang Han

Research output: Journal article publicationJournal articleAcademic researchpeer-review

24 Citations (Scopus)

Abstract

Internet of Things (IoT) is gradually adopted by many organizations to facilitate the information collection and sharing. In an organization, an IoT node usually can receive and send an email for event notification and reminder. However, unwanted and malicious emails are a big security challenge to IoT systems. For example, attackers may intrude a network by sending emails with phishing links. To mitigate this issue, email classification is an important solution with the aim of distinguishing legitimate and spam emails. Artificial intelligence especially machine learning is a major tool for helping detect malicious emails, but the performance might be fluctuant according to specific datasets. The previous research figured out that supervised learning could be acceptable in practice, and that practical evaluation and users' feedback are important. Motivated by these observations, we conduct an empirical study to validate the performance of common learning algorithms under three different environments for email classification. With over 900 users, our study results validate prior observations and indicate that LibSVM and SMO-SVM can achieve better performance than other selected algorithms.

Original languageEnglish
Pages (from-to)287-304
Number of pages18
JournalInternational Journal of Intelligent Systems
Volume37
Issue number1
DOIs
Publication statusPublished - Jan 2022

Keywords

  • artificial intelligence
  • email classification
  • IoT security
  • spam detection
  • supervised learning

ASJC Scopus subject areas

  • Software
  • Theoretical Computer Science
  • Human-Computer Interaction
  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'An empirical study of supervised email classification in Internet of Things: Practical performance and key influencing factors'. Together they form a unique fingerprint.

Cite this