An artificial immune system for phishing detection

The amazing nature of biological immune systems on protecting humans from pathogens inspired people to develop artificial immune systems. Designed to simulate the functionalities of biological immune systems, artificial immune systems are suggested to be mainly applied in the domain of computer security. In this paper, we propose an artificial immune system for phishing detection. The system is to detect phishing emails through memory detectors and mature detectors. The memory detectors are generated from the training data set, which, in turn, contains the phishing emails previously seen by the system. The immature detectors are reproduced through the system's mutation process. To the best of our knowledge, this is the first time such a system is ever proposed. We believe that the system is more adaptive than any other existing phishing detection techniques.

[1]  Ismail Musirin,et al.  Artificial Immune-Based Optimization Technique for Solving Economic Dispatch in Power System , 2005, WIRN/NAIS.

[2]  Gerry V. Dozier,et al.  Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA's genetic arms race , 2005, SAC '05.

[3]  Jeffrey O. Kephart,et al.  A biologically inspired immune system for computers , 1994 .

[4]  Stephanie Forrest,et al.  Immunity by design: an artificial immune system , 1999 .

[5]  Jun Zhu,et al.  Artificial immunity using constraint-based detectors , 2002, Proceedings of the 5th Biannual World Automation Congress.

[6]  Stephanie Forrest,et al.  Architecture for an Artificial Immune System , 2000, Evolutionary Computation.

[7]  Fabio A. González,et al.  An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..

[8]  Justin Zhijun Zhan,et al.  Phishing detection using stochastic learning-based weak estimators , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).

[9]  Jonathan Timmis,et al.  On Diversity and Artificial Immune Systems: Incorporating a Diversity Operator into aiNet , 2005, WIRN/NAIS.

[10]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[11]  Dawn Xiaodong Song,et al.  Design and Evaluation of a Real-Time URL Spam Filtering Service , 2011, 2011 IEEE Symposium on Security and Privacy.

[12]  M. Eaman Immune system. , 2000, Nursing standard (Royal College of Nursing (Great Britain) : 1987).

[13]  B. John Oommen,et al.  Stochastic learning-based weak estimation of multinomial random variables and its applications to pattern recognition in non-stationary environments , 2006, Pattern Recognit..

[14]  Archana Bhattarai,et al.  Characterizing comment spam in the blogosphere through content analysis , 2009, 2009 IEEE Symposium on Computational Intelligence in Cyber Security.

[15]  Jonathan A. Zdziarski,et al.  Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification , 2005 .