An artificial immunity-based spam detection system

Spam is considered a significant security problem for computer users everywhere. Spammers exploit a variety of tricks to conceal parts of messages that can be used to identify spam. A number of different spam detection techniques have been proposed using a large number of message features, heuristic rules, or evidences from other detectors. This paper presents an email feature extraction technique for spam detection based on artificial immune systems. The proposed method extracts a set of four features that can be used as inputs to a spam detection model. The performance evaluation against a standard spam collection and reference systems shows that the proposed spam detection system performs well compared to other systems with large sets of features, rules, or external evidences. The detection performance of the best system in this study is 0.91% and 1.95% of false positive and false negative rates, respectively.

[1]  Leandro Nunes de Castro,et al.  An Overview of Artificial Immune Systems , 2004 .

[2]  Stephanie Forrest,et al.  Infect Recognize Destroy , 1996 .

[3]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[4]  Peter J. Bentley,et al.  An evaluation of negative selection in an artificial immune system for network intrusion detection , 2001 .

[5]  Peter J. Bentley,et al.  Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[6]  Tony White,et al.  Increasing the accuracy of a spam-detecting artificial immune system , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..

[7]  Tony White,et al.  Developing an Immunity to Spam , 2003, GECCO.

[8]  Dipankar Dasgupta,et al.  Immunity-Based Intrusion Detection System: A General Framework , 1999 .

[9]  Gerard Salton,et al.  Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..

[10]  Fabio A. González,et al.  An immunity-based technique to characterize intrusions in computer networks , 2002, IEEE Trans. Evol. Comput..

[11]  D. Dasgupta,et al.  Immunity-based systems: a survey , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[12]  Peter J. Bentley,et al.  Immune Memory in the Dynamic Clonal Selection Algorithm , 2002 .

[13]  Peter J. Bentley,et al.  Immune Memory and Gene Library Evolution in the Dynamic Clonal Selection Algorithm , 2004, Genetic Programming and Evolvable Machines.