International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)

Published By: MECS Press

IJITCS Vol.9, No.7, Jul. 2017

A Systematic Literature Review on SMS Spam Detection Techniques

Full Text (PDF, 289KB), PP.42-50

Views:125   Downloads:5


Lutfun Nahar Lota, B M Mainul Hossain

Index Terms

SMS Spam Filtering;SMS Spam Detection;Systematic Literature Review;Machine Learning


Spam SMSes are unsolicited messages to users, which are disturbing and sometimes harmful. There are a lot of survey papers available on email spam detection techniques. But, SMS spam detection is comparatively a new area and systematic literature review on this area is insufficient. In this paper, we perform a systematic literature review on SMS spam detection techniques. For that purpose, we consider the available published research works from 2006 to 2016. We choose 17 papers for our study and reviewed their used techniques, approaches and algorithms, their advantages and disadvantages, evaluation measures, discussion on datasets and finally result comparison of the studies. Although, the SMS spam detection techniques are more challenging than email spam detection techniques because of the regional contents, use of abbreviated words, unfortunately none of the existing research addresses these challenges. There is a huge scope of future research in this area and this survey can act as a reference point for the future direction of research.

Cite This Paper

Lutfun Nahar Lota, B M Mainul Hossain,"A Systematic Literature Review on SMS Spam Detection Techniques", International Journal of Information Technology and Computer Science(IJITCS), Vol.9, No.7, pp.42-50, 2017. DOI: 10.5815/ijitcs.2017.07.05


[1]K. Yadav, S. K. Saha, P. Kumaraguru, and R. Kumra, “Take control of your smses: Designing an usable spam sms filtering system,” in 2012 IEEE 13th International Conference on Mobile Data Management. IEEE, 2012, pp. 352–355.

[2]S. J. Warade, P. A. Tijare, and S. N. Sawalkar, “An approach for sms spam detection.”

[3]A. Narayan and P. Saxena, “The curse of 140 characters: evaluating the efficacy of sms spam detection on android,” in Proceedings of the Third ACM workshop on Security and privacy in smartphones & mobile devices. ACM, 2013, pp. 33–42.

[4]A. S. Onashoga, O. O. Abayomi-Alli, A. S. Sodiya, and D. A. Ojo, “An adaptive and collaborative server side sms spam filtering scheme using artificial immune system,” Information Security Journal: A Global Perspective, vol. 24, no. 4-6, pp. 133–145, 2015.

[5]J. W. Yoon, H. Kim, and J. H. Huh, “Hybrid spam filtering for mobile communication,” computers & security, vol. 29, no. 4, pp. 446–459, 2010.

[6]S. J. Delany, M. Buckley, and D. Greene, “Sms spam filtering: methods and data,” Expert Systems with Applications, vol. 39, no. 10, pp. 9899–9908, 2012.

[7]Q. Xu, E. W. Xiang, Q. Yang, J. Du, and J. Zhong, “Sms spam detection using noncontent features,” IEEE Intelligent Systems, vol. 27, no. 6, pp. 44–51, 2012.

[8]G. V. Cormack, J. M. G. Hidalgo, and E. P. S´anz, “Feature engineering for mobile (sms) spam filtering,” in Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval. ACM, 2007, pp. 871–872.

[9]S. Keele, “Guidelines for performing systematic literature reviews in software engineering,” in Technical report, Ver. 2.3 EBSE Technical Report. EBSE, 2007.

[10]T. M. Mahmoud and A. M. Mahfouz, “Sms spam filtering technique based on artificial immune system,” IJCSI International Journal of Computer Science Issues, vol. 9, no. 1, pp. 589–597, 2012.

[11]I. Ahmed, D. Guan, and T. C. Chung, “Sms classification based on naïve bayes classifier and apriori algorithm frequent itemset,” International Journal of machine Learning and computing, vol. 4, no. 2, p. 183, 2014.

[12]J. M. G´omez Hidalgo, G. C. Bringas, E. P. S´anz, and F. C. Garc´ıa, “Content based sms spam filtering,” in Proceedings of the 2006 ACM symposium on Document engineering. ACM, 2006, pp. 107–114.

[13]M. Poorshahsavari and O. Pourgalehdari, “Enhancing the rate of accuracy and precision in spam filtering in farsi sms.”

[14]T. A. Almeida, J. M. G. Hidalgo, and A. Yamakami, “Contributions to the study of sms spam filtering: new collection and results,” in Proceedings of the 11th ACM symposium on Document engineering. ACM, 2011, pp. 259–262.

[15]K. Yadav, P. Kumaraguru, A. Goyal, A. Gupta, and V. Naik, “Smsassassin: crowdsourcing driven mobile-based system for sms spam filtering,” in Proceedings of the 12th Workshop on Mobile Computing Systems and Applications. ACM, 2011, pp. 1–6.

[16]G. V. Cormack, J. M. G´omez Hidalgo, and E. P. S´anz, “Spam filtering for short messages,” in Proceedings of the sixteenth ACM conference on Conference on information and knowledge management. ACM, 2007, pp. 313–320.

[17]Q. Sun, H. Qiao, and Z. Luo, “The feature updating algorithm for short message content filtering,” Information Technology Journal, vol. 7, no. 5, pp. 790–795, 2008.

[18]S.-E. Kim, J.-T. Jo, and S. [18] S.-E. Kim, J.-T. Jo, and S.-H. Choi, “A spam message filtering method: focus on run time,” 2014.

[19]A Brief History of Text Messaging, [Last Accessed: 05-11-2016]

[20]Almeida, Tiago, José María Gómez Hidalgo, and Tiago Pasqualini Silva. "Towards sms spam filtering: Results under a new dataset." (2013): 1-18.

[21]Mujtaba, G., and M. Yasin. "SMS spam detection using simple message content features." J. Basic Appl. Sci. Res 4 (2014): 275-279. 

[22]Shirani-Mehr, Houshmand. "SMS spam detection using machine learning approach." (2013): 1-4.

[23]Ahmed, Ishtiaq, et al. "Semi-supervised learning using frequent itemset and ensemble learning for SMS classification." Expert Systems with Applications42.3 (2015): 1065-1073.

[24] [Last Accessed: 05-11-2016]

[25] [Last Accessed: 05-11-2016]

[26] [Last Accessed: 05-11-2016]

[27] [Last Accessed: 05-11-2016]

[28] [Last Accessed: 05-11-2016]

[29]Iqbal, Muhammad, et al. "Study on the Effectiveness of Spam Detection Technologies." (2016).

[30] [Last Accessed: 05-11-2016]

[31] [Last Accessed: 05-11-2016]

[32] [Last Accessed: 05-11-2016]

[33] [Last Accessed: 05-11-2016]

[34] [Last Accessed: 05-11-2016]

[35] [Last Accessed: 05-11-2016]